ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-xwjr-6fj7-fc6h
Local File Inclusion by unauthenticated users
### Impact An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. ### Patches Issue has been patched in Build 469 (v1.0.469) and v1.1.0. ### Workarounds Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png">
{'CVE-2020-15246'}
2022-04-19T19:02:37Z
2020-11-23T19:48:12Z
HIGH
7.5
{'CWE-863', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15246', 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/advisories/GHSA-xwjr-6fj7-fc6h'}
null
GHSA
GHSA-vgg8-72f2-qm23
Critical severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
{'CVE-2017-7657'}
2021-06-10T20:19:51Z
2018-10-19T16:15:34Z
CRITICAL
9.8
{'CWE-444', 'CWE-190'}
{'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-vgg8-72f2-qm23', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657', 'https://www.debian.org/security/2018/dsa-4278', 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0910', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-4mg9-vhxq-vm7j
SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database
### Impact Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability. ### Patches This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0. ### Workarounds You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
null
2021-11-18T19:46:33Z
2021-04-29T21:52:53Z
HIGH
0
{'CWE-89'}
{'https://packagist.org/packages/laravel/framework', 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j', 'https://github.com/advisories/GHSA-4mg9-vhxq-vm7j', 'https://packagist.org/packages/illuminate/database'}
null
GHSA
GHSA-wxrm-2h86-v95f
Malicious Package in pizza-pasta
Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console. ## Recommendation Remove the package from your environment. There are no evidences of further compromise.
null
2021-09-29T20:45:27Z
2020-09-03T21:04:20Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1196', 'https://github.com/advisories/GHSA-wxrm-2h86-v95f'}
null
GHSA
GHSA-vgjp-vh3c-32v3
Directory Traversal in mockserve
Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16146'}
2021-01-08T01:57:26Z
2018-07-23T20:46:55Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16146', 'https://www.npmjs.com/advisories/445', 'https://github.com/advisories/GHSA-vgjp-vh3c-32v3'}
null
GHSA
GHSA-823f-cwm9-4g74
Splash authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. ### Patches Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. ### Workarounds If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues) * [Email us](mailto:opensource@zyte.com)
{'CVE-2021-41124'}
2021-10-06T17:49:23Z
2021-10-06T17:49:23Z
HIGH
7.4
{'CWE-200'}
{'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124', 'https://github.com/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'}
null
GHSA
GHSA-362v-wg5p-64w2
Incorrect Privilege Assignment in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.
{'CVE-2021-42135'}
2021-10-20T17:28:19Z
2021-10-12T18:41:16Z
HIGH
8.1
{'CWE-863', 'CWE-266'}
{'https://github.com/advisories/GHSA-362v-wg5p-64w2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135', 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180', 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'}
null
GHSA
GHSA-4w82-r329-3q67
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{'CVE-2020-8840'}
2022-04-07T22:42:01Z
2020-03-04T20:52:14Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-4w82-r329-3q67', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E'}
null
GHSA
GHSA-fq6p-6334-8gr4
Memory leak in decoding PNG images
### Impact When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. ### Patches We have patched the issue in GitHub commit [ab51e5b813573dc9f51efa335aebcf2994125ee9](https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23585'}
2022-02-11T20:36:40Z
2022-02-09T23:26:08Z
MODERATE
4.3
{'CWE-401'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23585', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4', 'https://github.com/advisories/GHSA-fq6p-6334-8gr4', 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'}
null
GHSA
GHSA-f7p5-w2cr-7cp7
High severity vulnerability that affects puppet
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
{'CVE-2013-3567'}
2021-09-09T21:49:41Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-3567', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html', 'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'https://puppetlabs.com/security/cve/cve-2013-3567/', 'http://www.debian.org/security/2013/dsa-2715', 'https://github.com/advisories/GHSA-f7p5-w2cr-7cp7', 'http://www.ubuntu.com/usn/USN-1886-1', 'http://secunia.com/advisories/54429'}
null
GHSA
GHSA-pjj4-w39g-pw54
Ox gem crashes due to a crafted input
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
{'CVE-2017-15928'}
2022-04-25T22:04:25Z
2017-11-21T18:26:40Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15928', 'https://github.com/advisories/GHSA-pjj4-w39g-pw54', 'https://github.com/ohler55/ox/issues/194', 'https://rubygems.org/gems/ox/versions/2.8.0'}
null
GHSA
GHSA-x7hc-x7fm-f7qh
Cross-Site Scripting in Content Preview (CType menu)
> ### Meta > * CVSS: `AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1) > * CWE-79 > * Status: **DRAFT** ### Problem It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008)
{'CVE-2021-21370'}
2022-04-19T19:02:50Z
2021-03-23T01:54:17Z
LOW
0
{'CWE-79'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh', 'https://packagist.org/packages/typo3/cms-backend', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21370', 'https://github.com/advisories/GHSA-x7hc-x7fm-f7qh', 'https://typo3.org/security/advisory/typo3-core-sa-2021-008'}
null
GHSA
GHSA-cvfm-xjc8-f2vm
Denial of Service in @commercial/subtext
Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 5.1.2 or later.
null
2020-09-03T15:46:36Z
2020-09-03T15:46:36Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1477', 'https://github.com/advisories/GHSA-cvfm-xjc8-f2vm'}
null
GHSA
GHSA-2598-2f59-rmhq
SQL Injection in sequelize
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
{'CVE-2019-10749'}
2021-08-18T22:10:20Z
2019-11-08T17:05:17Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://github.com/advisories/GHSA-2598-2f59-rmhq'}
null
GHSA
GHSA-wh33-4p32-g7vh
Directory Traversal in serverxxx
Affected versions of `serverxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16182'}
2021-01-08T01:56:50Z
2018-07-23T20:43:56Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-wh33-4p32-g7vh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16182', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx', 'https://www.npmjs.com/advisories/455', 'https://nodesecurity.io/advisories/455'}
null
GHSA
GHSA-r5gm-4p5w-pq2p
Remote code execution in verot/class.upload.php
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
{'CVE-2019-19576'}
2021-08-19T16:24:47Z
2020-01-16T22:17:40Z
CRITICAL
9.8
{'CWE-434'}
{'https://www.verot.net/php_class_upload.htm', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://www.verot.net', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://github.com/jra89/CVE-2019-19576', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/advisories/GHSA-r5gm-4p5w-pq2p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'}
null
GHSA
GHSA-cf4h-3jhx-xvhq
Arbitrary Code Execution in underscore
The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
{'CVE-2021-23358'}
2021-08-25T17:37:26Z
2021-05-06T16:09:43Z
HIGH
9.8
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://www.npmjs.com/package/underscore', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4883', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://github.com/jashkenas/underscore/pull/2917', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://www.tenable.com/security/tns-2021-14', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://github.com/advisories/GHSA-cf4h-3jhx-xvhq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html'}
null
GHSA
GHSA-f26x-pr96-vw86
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
{'CVE-2018-11040'}
2021-10-21T21:28:15Z
2018-10-16T17:43:45Z
MODERATE
5.9
{'CWE-829'}
{'https://pivotal.io/security/cve-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html', 'https://github.com/advisories/GHSA-f26x-pr96-vw86'}
null
GHSA
GHSA-32pc-xphx-q4f6
Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers
gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
{'CVE-2018-1000164'}
2022-04-26T18:06:43Z
2018-07-12T20:30:49Z
HIGH
7.5
{'CWE-93'}
{'https://usn.ubuntu.com/4022-1/', 'https://github.com/benoitc/gunicorn/issues/1227', 'https://github.com/advisories/GHSA-32pc-xphx-q4f6', 'https://www.debian.org/security/2018/dsa-4186', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html', 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'}
null
GHSA
GHSA-4g77-cvgw-grvw
Prototype Pollution in putil-merge
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
{'CVE-2021-23470'}
2022-02-11T16:15:46Z
2022-02-05T00:00:31Z
HIGH
8.2
{'CWE-1321'}
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470', 'https://github.com/advisories/GHSA-4g77-cvgw-grvw'}
null
GHSA
GHSA-jmhj-vh4q-hhmq
tkvideo has a memory issue in playing videos
Huge memory consumption even when playing small files. This issue has been patched in 2.0.0. Please upgrade to version 2.0.0 or above.
{'CVE-2022-24902'}
2022-05-03T03:47:34Z
2022-05-03T03:47:34Z
HIGH
0
null
{'https://github.com/PaulleDemon/tkVideoPlayer/security/advisories/GHSA-jmhj-vh4q-hhmq', 'https://github.com/PaulleDemon/tkVideoPlayer/issues/3', 'https://github.com/advisories/GHSA-jmhj-vh4q-hhmq'}
null
GHSA
GHSA-cq8r-fc3q-6hg2
Denial of Service (DoS) via the unsetByPath function in jsjoints
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
{'CVE-2020-28479'}
2021-04-13T15:29:40Z
2021-04-13T15:29:40Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://github.com/advisories/GHSA-cq8r-fc3q-6hg2', 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}
null
GHSA
GHSA-v7ff-8wcx-gmc5
Authorization Before Parsing and Canonicalization in jetty
Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS.
{'CVE-2021-28164'}
2022-04-22T15:49:47Z
2021-04-06T17:31:01Z
MODERATE
5.3
{'CWE-200', 'CWE-551', 'CWE-863'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-v7ff-8wcx-gmc5', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/'}
null
GHSA
GHSA-8m3r-rv5g-fcpq
Moderate severity vulnerability that affects django
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.
{'CVE-2011-0697'}
2021-09-07T19:50:27Z
2018-07-23T21:01:00Z
MODERATE
0
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=676359', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0372', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html', 'http://secunia.com/advisories/43382', 'http://secunia.com/advisories/43426', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://www.vupen.com/english/advisories/2011/0439', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43297', 'http://secunia.com/advisories/43230', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0388', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq', 'http://www.securityfocus.com/bid/46296'}
null
GHSA
GHSA-vx6f-6rp6-f2px
Cross-Site Request Forgery in Jenkins dbCharts Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance.
{'CVE-2022-25205'}
2022-02-26T00:36:45Z
2022-02-16T00:01:17Z
HIGH
8.8
{'CWE-352'}
{'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205', 'https://github.com/advisories/GHSA-vx6f-6rp6-f2px'}
null
GHSA
GHSA-269q-hmxg-m83q
Local Information Disclosure Vulnerability in io.netty:netty-codec-http
### Description ### [GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified. ### Impact ### When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Vulnerability Details ### To fix the vulnerability the code was changed to the following: ```java @SuppressJava6Requirement(reason = "Guarded by version check") public static File createTempFile(String prefix, String suffix, File directory) throws IOException { if (javaVersion() >= 7) { if (directory == null) { return Files.createTempFile(prefix, suffix).toFile(); } return Files.createTempFile(directory.toPath(), prefix, suffix).toFile(); } if (directory == null) { return File.createTempFile(prefix, suffix); } File file = File.createTempFile(prefix, suffix, directory); // Try to adjust the perms, if this fails there is not much else we can do... file.setReadable(false, false); file.setReadable(true, true); return file; } ``` Unfortunately, this logic path was left vulnerable: ```java if (directory == null) { return File.createTempFile(prefix, suffix); } ``` This file is still readable by all local users. ### Patches ### Update to 4.1.77.Final ### Workarounds ### Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above. ### References ### - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information ### If you have any questions or comments about this advisory: Open an issue in [netty](https://github.com/netty/netty)
{'CVE-2022-24823'}
2022-05-10T08:46:52Z
2022-05-10T08:46:50Z
MODERATE
5.5
{'CWE-379', 'CWE-668', 'CWE-378'}
{'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1', 'https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://github.com/advisories/GHSA-269q-hmxg-m83q', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24823'}
null
GHSA
GHSA-p4mf-4qvh-w8g5
Malicious Package in bitcionjslib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:42Z
2020-09-04T15:41:42Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-p4mf-4qvh-w8g5', 'https://www.npmjs.com/advisories/1361'}
null
GHSA
GHSA-6495-8jvh-f28x
File restriction bypass in socket.io-file
All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types. No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T21:23:14Z
2020-10-02T15:39:54Z
HIGH
7.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://www.npmjs.com/advisories/1564'}
null
GHSA
GHSA-rwcq-qpm6-7867
Malicious Package in riped160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:25Z
2020-09-03T17:04:32Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-rwcq-qpm6-7867', 'https://www.npmjs.com/advisories/1403'}
null
GHSA
GHSA-hpr6-f4vq-mxch
Command injection in LocalStack
The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter.
{'CVE-2021-32090'}
2021-06-18T18:38:00Z
2021-06-18T18:38:00Z
MODERATE
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-hpr6-f4vq-mxch', 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32090', 'https://blog.sonarsource.com/hack-the-stack-with-localstack'}
null
GHSA
GHSA-phg2-9c5g-m4q7
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected. # Mitigation Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html
{'CVE-2018-17190'}
2021-09-16T17:32:21Z
2018-11-21T22:19:30Z
CRITICAL
9.8
null
{'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E', 'https://security.gentoo.org/glsa/201903-21', 'http://www.securityfocus.com/bid/105976', 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'}
null
GHSA
GHSA-v98r-gjgc-m9pf
Cross-site Scripting in Jenkins Promoted Builds Plugin
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29045'}
2022-04-22T21:07:38Z
2022-04-13T00:00:16Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-v98r-gjgc-m9pf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
null
GHSA
GHSA-72q2-5rxx-xfff
Downloads Resources over HTTP in gfe-sass
Affected versions of `gfe-sass` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `gfe-sass`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2017-16040'}
2021-01-14T15:56:53Z
2020-09-01T16:12:12Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/291', 'https://github.com/advisories/GHSA-72q2-5rxx-xfff', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16040', 'https://nodesecurity.io/advisories/291'}
null
GHSA
GHSA-8qpm-5c82-rf96
Prototype Pollution in backbone-query-parameters
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in backbone-query-parameters 0.4.0 allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20085'}
2021-05-06T15:52:02Z
2021-05-06T15:52:02Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-8qpm-5c82-rf96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20085', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md'}
null
GHSA
GHSA-qvp5-mm7v-4f36
Cross-site Scripting in Strapi
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
{'CVE-2020-27666'}
2021-01-08T21:22:10Z
2020-10-29T19:40:08Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-qvp5-mm7v-4f36', 'https://github.com/strapi/strapi/pull/8440', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27666', 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}
null
GHSA
GHSA-7rp6-w7mg-h8rw
XML External Entity Reference in Apache Jena
A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.
{'CVE-2021-39239'}
2021-09-21T17:42:33Z
2021-09-20T20:22:05Z
HIGH
0
{'CWE-611'}
{'https://github.com/advisories/GHSA-7rp6-w7mg-h8rw', 'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E'}
null
GHSA
GHSA-jj6m-r8jc-2gp7
Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings
### Impact All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. ### Patches Users should upgrade to `1.4.4`. ### Workarounds There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created. ### For more information If you have any questions or comments about this advisory: * Contact us on [Discord](https://discord.gg/pterodactyl) * Email us at `dane ät pterodactyl dot io`
{'CVE-2021-32699'}
2021-10-21T13:26:04Z
2021-06-23T18:03:18Z
MODERATE
6.5
{'CWE-405'}
{'https://github.com/advisories/GHSA-jj6m-r8jc-2gp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699', 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7', 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}
null
GHSA
GHSA-7wjx-3g7j-8584
Denial of Service in Action Controller Token Authentication
Impact ------ Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this: ``` class PostsController < ApplicationController before_action :authenticate private def authenticate authenticate_or_request_with_http_token do |token, options| # ... end end end ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue: ```ruby module ActionController::HttpAuthentication::Token AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/ end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-http-authentication-dos.patch - Patch for 5.2 series * 6-0-http-authentication-dos.patch - Patch for 6.0 series * 6-1-http-authentication-dos.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!
{'CVE-2021-22904'}
2021-11-01T21:26:00Z
2021-05-05T19:49:12Z
HIGH
7.5
{'CWE-400'}
{'https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://hackerone.com/reports/1101125', 'https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22904', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://github.com/advisories/GHSA-7wjx-3g7j-8584', 'https://github.com/rails/rails/releases/tag/v5.2.4.6'}
null
GHSA
GHSA-86gw-g9jv-8vfg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848.
{'CVE-2020-0833'}
2021-07-28T18:57:55Z
2021-07-28T18:57:55Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0833', 'https://github.com/advisories/GHSA-86gw-g9jv-8vfg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833'}
null
GHSA
GHSA-7r83-w6r8-fh6w
Reflected Cross-site Scripting (XSS) in ACS Commons
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
{'CVE-2021-21043'}
2021-12-13T21:34:09Z
2021-05-13T22:31:14Z
MODERATE
6.1
{'CWE-787', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://github.com/advisories/GHSA-7r83-w6r8-fh6w', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html'}
null
GHSA
GHSA-fhvj-7f9p-w788
Buffer overflow in arr
An issue was discovered in the arr crate through 2020-08-25 for Rust. There is a buffer overflow in Index and IndexMut.
{'CVE-2020-35887'}
2021-08-25T20:48:54Z
2021-08-25T20:48:54Z
CRITICAL
9.8
{'CWE-120'}
{'https://github.com/sjep/array/issues/1', 'https://github.com/advisories/GHSA-fhvj-7f9p-w788', 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35887'}
null
GHSA
GHSA-rwqq-p4p9-5wpq
Wechat-php-sdk is affected by a Cross Site Scripting vulnerability.
Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.
{'CVE-2021-43678'}
2022-01-07T00:00:29Z
2022-01-07T00:00:29Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-rwqq-p4p9-5wpq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43678', 'https://github.com/gaoming13/wechat-php-sdk', 'https://github.com/gaoming13/wechat-php-sdk/issues/30'}
null
GHSA
GHSA-q7j5-9j77-g4gq
Remote code execution in turn extension for TYPO3
The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.
{'CVE-2020-15515'}
2021-07-29T20:50:41Z
2020-07-29T18:07:41Z
HIGH
8.8
{'CWE-74'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515', 'https://typo3.org/help/security-advisories', 'https://github.com/advisories/GHSA-q7j5-9j77-g4gq'}
null
GHSA
GHSA-qc22-qwm9-j8rx
Remote Code Execution in npm-groovy-lint
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
null
2021-12-20T16:59:31Z
2021-12-20T16:59:31Z
CRITICAL
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-qc22-qwm9-j8rx', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}
null
GHSA
GHSA-p6jh-p7q8-pcrg
Prototype Pollution in nodee-utils
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
{'CVE-2020-7722'}
2021-07-29T22:08:42Z
2021-05-06T18:26:21Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/advisories/GHSA-p6jh-p7q8-pcrg', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}
null
GHSA
GHSA-xwr3-fmgj-mmfr
Moderate severity vulnerability that affects bio-basespace-sdk
The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes.
{'CVE-2013-7111'}
2021-09-22T18:21:31Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr', 'http://www.openwall.com/lists/oss-security/2013/12/14/2', 'http://www.openwall.com/lists/oss-security/2013/12/15/5', 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'}
null
GHSA
GHSA-566m-qj78-rww5
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
{'CVE-2021-23382'}
2022-04-19T19:03:24Z
2022-01-07T00:21:36Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://github.com/advisories/GHSA-566m-qj78-rww5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641'}
null
GHSA
GHSA-p99v-5w3c-jqq9
Bypass of access control in Django
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
{'CVE-2021-33571'}
2022-02-14T22:20:19Z
2021-06-10T17:21:12Z
HIGH
7.5
{'CWE-918'}
{'https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33571', 'https://security.netapp.com/advisory/ntap-20210727-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://github.com/advisories/GHSA-p99v-5w3c-jqq9', 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'}
null
GHSA
GHSA-9gqg-3fxr-9hv7
Cross site scripting in apache-airflow
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
{'CVE-2017-17836'}
2022-03-21T18:53:33Z
2019-01-25T16:19:09Z
CRITICAL
9.8
{'CWE-79'}
{'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836', 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}
null
GHSA
GHSA-cqqh-49mx-fq63
Prototype Pollution in merge
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3645'}
2021-09-24T13:11:10Z
2021-09-13T20:16:54Z
MODERATE
6.8
{'CWE-1321', 'CWE-915'}
{'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://github.com/advisories/GHSA-cqqh-49mx-fq63'}
null
GHSA
GHSA-265q-28rp-chq5
Insecure Entropy Source - Math.random() in node-uuid
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's. ## Recommendation Update to version 1.4.4 or later.
{'CVE-2015-8851'}
2021-08-23T15:25:55Z
2020-04-16T03:14:50Z
HIGH
7.5
{'CWE-331'}
{'https://nodesecurity.io/advisories/93', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://www.npmjs.com/advisories/93', 'https://github.com/advisories/GHSA-265q-28rp-chq5', 'https://github.com/broofa/node-uuid/issues/108', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://github.com/broofa/node-uuid/issues/122'}
null
GHSA
GHSA-m6rw-m2v9-7hx4
OS Command Injection in wifiscanner
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
{'CVE-2020-15362'}
2021-07-29T19:48:30Z
2021-05-17T21:00:59Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/thingsSDK/wifiscanner/issues/1', 'https://github.com/advisories/GHSA-m6rw-m2v9-7hx4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15362'}
null
GHSA
GHSA-59cf-m7v5-wh5w
Cross-Site Scripting in SVG Sanitizer
Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting. An updated version 1.0.3 is available from the TYPo3 extension manager and at https://extensions.typo3.org/extension/download/svg_sanitizer/1.0.3/zip/ Users of the extension are advised to update the extension as soon as possible.
{'CVE-2020-11070'}
2022-04-19T19:02:26Z
2020-05-13T22:17:34Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-59cf-m7v5-wh5w', 'https://github.com/TYPO3GmbH/svg_sanitizer/security/advisories/GHSA-59cf-m7v5-wh5w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11070'}
null
GHSA
GHSA-3xph-cp8f-2229
Prototype Pollution in @fabiocaccamo/utils.js
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
{'CVE-2021-3815'}
2021-12-13T13:10:41Z
2021-12-10T20:31:32Z
HIGH
8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-3xph-cp8f-2229', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}
null
GHSA
GHSA-h7qw-mxrm-c6h2
Unauthenticated crypto and weak IV in Magento\Framework\Encryption
The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value.
{'CVE-2016-6485'}
2021-08-18T22:35:44Z
2019-11-20T01:33:05Z
HIGH
7.5
{'CWE-327'}
{'https://github.com/magento/magento2/pull/15017', 'https://github.com/advisories/GHSA-h7qw-mxrm-c6h2', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485', 'http://www.openwall.com/lists/oss-security/2016/07/27/14', 'http://www.openwall.com/lists/oss-security/2016/07/19/3'}
null
GHSA
GHSA-97cc-825c-399g
Cross site scripting in remdex/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4050'}
2021-12-10T20:33:29Z
2021-12-10T20:33:29Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05', 'https://github.com/advisories/GHSA-97cc-825c-399g'}
null
GHSA
GHSA-cff4-rrq6-h78w
Command Injection in command-exists
Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module. ## Recommendation Update to version 1.2.4 or later.
null
2021-08-04T20:40:48Z
2019-06-03T17:31:26Z
CRITICAL
0
{'CWE-77'}
{'https://hackerone.com/reports/324453', 'https://www.npmjs.com/advisories/659', 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94', 'https://github.com/advisories/GHSA-cff4-rrq6-h78w'}
null
GHSA
GHSA-9gqr-xp86-f87h
Code injection in npm git
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released.
{'CVE-2021-23632'}
2022-03-25T16:13:14Z
2022-03-18T00:01:11Z
MODERATE
6.6
{'CWE-94', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23632', 'https://github.com/advisories/GHSA-9gqr-xp86-f87h', 'https://snyk.io/vuln/SNYK-JS-GIT-1568518'}
null
GHSA
GHSA-qc84-gqf4-9926
Improper Restriction of Operations within the Bounds of a Memory Buffer and Race Condition in crossbeam-utils
### Impact The affected version of this crate incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause the following problems: - Unaligned memory accesses - Data race Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. 32-bit targets with `Atomic{I,U}64` and `{i,u}64` have the same alignment are also not affected by this issue. The following is a complete list of the builtin targets that may be affected. (last update: nightly-2022-02-11) - armv7-apple-ios (tier 3) - armv7s-apple-ios (tier 3) - i386-apple-ios (tier 3) - i586-unknown-linux-gnu - i586-unknown-linux-musl - i686-apple-darwin (tier 3) - i686-linux-android - i686-unknown-freebsd - i686-unknown-haiku (tier 3) - i686-unknown-linux-gnu - i686-unknown-linux-musl - i686-unknown-netbsd (tier 3) - i686-unknown-openbsd (tier 3) - i686-wrs-vxworks (tier 3) ([script to get list](https://gist.github.com/taiki-e/3c7891e8c5f5e0cbcb44d7396aabfe10)) ### Patches This has been fixed in crossbeam-utils 0.8.7. Affected 0.8.x releases have been yanked. ### References https://github.com/crossbeam-rs/crossbeam/pull/781
{'CVE-2022-23639'}
2022-02-25T15:42:43Z
2022-02-16T22:36:21Z
CRITICAL
9.8
{'CWE-119', 'CWE-362'}
{'https://github.com/advisories/GHSA-qc84-gqf4-9926', 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926', 'https://github.com/crossbeam-rs/crossbeam/pull/781', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23639', 'https://github.com/crossbeam-rs/crossbeam/releases/tag/crossbeam-utils-0.8.7'}
null
GHSA
GHSA-xrjf-phvv-r4vr
Command injection in strapi
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input.
{'CVE-2022-0764'}
2022-03-09T20:26:22Z
2022-02-27T00:00:15Z
MODERATE
6.1
{'CWE-77', 'CWE-78'}
{'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://github.com/advisories/GHSA-xrjf-phvv-r4vr'}
null
GHSA
GHSA-567x-m4wm-87v8
Infinite loop in Apache Tika
A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.
{'CVE-2021-28657'}
2022-04-22T15:50:03Z
2021-05-10T15:23:25Z
MODERATE
5.5
{'CWE-835', 'CWE-400'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28657', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210507-0004/', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://github.com/advisories/GHSA-567x-m4wm-87v8'}
null
GHSA
GHSA-m5vx-8chx-qvmm
Form validation can be skipped
### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. ### Patches https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 ### Workarounds Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. ### References This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)
{'CVE-2021-32697'}
2022-04-19T19:02:59Z
2021-06-22T15:15:08Z
MODERATE
6.5
{'CWE-20'}
{'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/releases/tag/5.1.3', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/advisories/GHSA-m5vx-8chx-qvmm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm'}
null
GHSA
GHSA-c5hx-w945-j4pq
Memory flaw in zeroize_derive
An issue was discovered in the zeroize_derive crate before 1.1.1 for Rust. Dropped memory is not zeroed out for an enum.
{'CVE-2021-45706'}
2022-01-07T18:29:04Z
2022-01-06T22:08:33Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45706', 'https://rustsec.org/advisories/RUSTSEC-2021-0115.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/zeroize_derive/RUSTSEC-2021-0115.md', 'https://github.com/advisories/GHSA-c5hx-w945-j4pq', 'https://github.com/iqlusioninc/crates/issues/876'}
null
GHSA
GHSA-gp6m-vqhm-5cm5
XML Entity Expansion
XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.
{'CVE-2021-25951'}
2021-07-07T17:12:05Z
2021-07-02T18:37:31Z
HIGH
7.5
{'CWE-776', 'CWE-611'}
{'https://github.com/mcspring/XML2Dict/tree/master', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25951', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951', 'https://pypi.org/project/XML2Dict/', 'https://github.com/advisories/GHSA-gp6m-vqhm-5cm5'}
null
GHSA
GHSA-pf8j-vhg8-xmc3
Injection in karma-mojo
karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument.
{'CVE-2020-7626'}
2022-02-10T23:42:58Z
2022-02-10T23:42:58Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,', 'https://github.com/advisories/GHSA-pf8j-vhg8-xmc3', 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'}
null
GHSA
GHSA-wg85-p6j7-gp3w
Moderate severity vulnerability that affects simplemde
SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with [ and ( characters, which is mishandled during construction of an A element.
{'CVE-2018-19057'}
2021-09-21T19:44:46Z
2018-11-21T22:21:25Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19057', 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w', 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'}
null
GHSA
GHSA-jmxr-w2jc-qp7w
Improper Input Validation in Jenkins Promoted Builds Plugin
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not validate the names of promotions defined in Job DSL, allowing attackers with Job/Configure permission to create a promotion with an unsafe name.
{'CVE-2022-29049'}
2022-04-22T21:07:55Z
2022-04-13T00:00:16Z
MODERATE
4.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-jmxr-w2jc-qp7w', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2655', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29049'}
null
GHSA
GHSA-wx3q-6x7x-jjw4
Downloads Resources over HTTP in mystem
Affected versions of `mystem` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10664'}
2021-01-08T00:47:50Z
2019-02-18T23:44:39Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/259', 'https://github.com/advisories/GHSA-wx3q-6x7x-jjw4', 'https://nodesecurity.io/advisories/259', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10664'}
null
GHSA
GHSA-q2xp-75m7-gv52
Moderate severity vulnerability that affects net.sf.robocode:robocode.api
Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL.
{'CVE-2019-10648'}
2021-07-27T20:33:52Z
2019-04-02T15:36:49Z
CRITICAL
9.8
{'CWE-862', 'CWE-20'}
{'https://sourceforge.net/p/robocode/bugs/406/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'}
null
GHSA
GHSA-3hfw-x7gx-437c
Path traversal in Matrix Synapse
### Impact Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory. The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact. Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected. ### Patches Server administrators should upgrade to 1.47.1 or later. ### Workarounds Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints: * `/_matrix/media/r0/download/{serverName}/{mediaId}` * `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}` * `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}` Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`. ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
{'CVE-2021-41281'}
2021-12-10T18:30:50Z
2021-11-23T21:58:56Z
HIGH
7.5
{'CWE-22'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/', 'https://github.com/advisories/GHSA-3hfw-x7gx-437c', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c'}
null
GHSA
GHSA-2jfv-g3fh-xq3v
Excessive memory usage in tokio-rustls
An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly.
{'CVE-2020-35875'}
2021-08-25T20:46:54Z
2021-08-25T20:46:54Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35875', 'https://github.com/tokio-rs/tls/pull/14', 'https://rustsec.org/advisories/RUSTSEC-2020-0019.html', 'https://github.com/advisories/GHSA-2jfv-g3fh-xq3v'}
null
GHSA
GHSA-h5wh-7h2j-h999
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
SWHKD 1.1.5 consumes the keyboard events of unintended users. This could potentially cause an information leak, but is usually a denial of functionality.
{'CVE-2022-27817'}
2022-04-26T13:04:23Z
2022-04-15T00:00:40Z
MODERATE
4.4
{'CWE-668'}
{'https://github.com/waycrate/swhkd/releases', 'https://github.com/advisories/GHSA-h5wh-7h2j-h999', 'https://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27817'}
null
GHSA
GHSA-g54h-m393-cpwq
devices resource list treated as a blacklist by default
### Impact Contrary to the [OCI runtime specification](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist), `runc`'s implementation of the `linux.resources.devices` list was a black-list by default. This means that users who created their own `config.json` objects and didn't prefix a deny-all rule (`{"allow": false, "permissions": "rwm"}` or equivalent) were not provided protection by the `devices` cgroup. This would allow malicious containers (with sufficient privileges) to create arbitrary device inodes (assuming they have `CAP_MKNOD`) and operate on any device inodes they may have access to (assuming they have regular Unix DAC permissions). However, most (if not all) programs that make use of `runc` include this deny-all rule. This was most likely added before the specification mandated a white-list of devices, and the fact that all programs wrote their own deny-all rule obscured the existence of this bug for several years. In fact, even the specification's examples include a default deny-all rule! We therefore believe that while this is a security bug (and has been fixed as such), it was almost certainly not exploitable in the wild due to the inclusion of default deny-all rules by all known users of `runc` -- hence why this advisory has low severity. ### Patches This issue has been fixed in [a patch that was part of a larger rework of the devices cgroup code in runc](https://github.com/opencontainers/runc/pull/2391) -- which lead to the discovery of this security bug. Users should upgrade to 1.0.0-rc91 as soon as it is released, or wait for your distribution to backport the relevant fixes. ### Workarounds If you are using `runc` directly, ensure that there is a deny-all entry at the beginning of `linux.resources.devices` -- such an entry would look like `{"allow": false, "permissions": "rwm"}` (all other fields are ignored, though `type` must be set to `"a"` or `null` if it is present). Users which consume `runc` through another program should check whether their containers are operating under a white-list -- this can be done by reading `/sys/fs/cgroup/devices/devices.list` inside the container. If the file contains only the entry `a *:* rwm` (meaning the cgroup is in black-list mode, which likely means "allow all device access") then your containers are vulnerable to this issue. As always, we recommend **in the strongest possible terms** that all of our users enable user namespaces on all of their workloads (or pressure their vendors to do so). User namespaces are one of the most significant defense-in-depth protections you can enable for containers, and have prevented many container-related vulnerabilities (both kernel 0days as well as bugs in container runtimes, such as this one). ### References * https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html * [opencontainers/runtime-spec/config-linux.md#device-whitelist](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist) * https://github.com/opencontainers/runc/pull/2391 ### For more information If you have any questions or comments about this advisory: * [Open an issue in this repo](https://github.com/opencontainers/runc/issues/new). * Email us at <security@opencontainers.org>.
null
2022-04-19T19:02:28Z
2021-12-20T18:21:54Z
LOW
0
null
{'https://github.com/advisories/GHSA-g54h-m393-cpwq', 'https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq'}
null
GHSA
GHSA-mrvj-7q4f-5p42
Cross-site scripting in eZ Platform Kernel
### Impact In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims. ### Patches The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at: https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109 ### Important note You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
null
2021-03-19T19:56:42Z
2021-03-19T19:56:42Z
HIGH
0
{'CWE-79'}
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2'}
null
GHSA
GHSA-vcjf-mgcg-jxjq
Cross-site Scripting in CKEditor 4.0
A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).
{'CVE-2020-9281'}
2022-02-08T22:06:54Z
2021-05-07T16:32:17Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/', 'https://github.com/ckeditor/ckeditor4', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/', 'https://github.com/advisories/GHSA-vcjf-mgcg-jxjq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9281', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-jj8r-p9f5-fmvv
Cross-site Scripting in TYPO3 extension
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
{'CVE-2021-36785'}
2021-08-30T17:22:25Z
2021-08-30T17:22:25Z
MODERATE
8.5
{'CWE-79'}
{'https://github.com/advisories/GHSA-jj8r-p9f5-fmvv', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://typo3.org/help/security-advisories/security'}
null
GHSA
GHSA-mr6h-chqp-p9g2
SQL Injection in gogs.io/gogs
SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.
{'CVE-2014-8681'}
2021-06-29T18:32:44Z
2021-06-29T18:32:44Z
MODERATE
6.5
{'CWE-89'}
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681', 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695', 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html', 'https://github.com/gogits/gogs/releases/tag/v0.5.8', 'http://seclists.org/fulldisclosure/2014/Nov/31', 'https://github.com/advisories/GHSA-mr6h-chqp-p9g2', 'http://gogs.io/docs/intro/change_log.html', 'https://www.exploit-db.com/exploits/35237', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681'}
null
GHSA
GHSA-wvh7-5p38-2qfc
Storing Password in Local Storage
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext." Example Code: ```js async () => { const user = Parse.User.current() if (user) { user.setPassword('newpass') await user.save() } } ``` After running the above code, the new password will be stored in localStorage as a property named "password". Proposed Solution: Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object. Configuration: Parse SDK: 2.9.1 Parse Server: 3.9.0
null
2022-04-19T19:02:31Z
2020-07-23T18:20:10Z
MODERATE
0
{'CWE-256'}
{'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
null
GHSA
GHSA-762f-c2wg-m8c8
Denial of Service in protobufjs
Versions of `protobufjs` before 5.0.3 and 6.8.6 are vulnerable to denial of service when parsing crafted invalid *.proto files. ## Recommendation Update to version 5.0.3, 6.8.6 or later.
{'CVE-2018-3738'}
2021-01-08T19:17:23Z
2018-10-09T00:27:15Z
MODERATE
0
{'CWE-770'}
{'https://github.com/dcodeIO/protobuf.js/blob/6.8.5/src/parse.js#L27', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3738', 'https://hackerone.com/reports/319576', 'https://github.com/advisories/GHSA-762f-c2wg-m8c8', 'https://www.npmjs.com/advisories/605'}
null
GHSA
GHSA-8vmx-qmch-mpqg
High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
{'CVE-2019-0232'}
2021-06-15T16:59:54Z
2019-04-18T14:27:35Z
HIGH
8.1
{'CWE-78'}
{'http://seclists.org/fulldisclosure/2019/May/4', 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html', 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784', 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/107906', 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html', 'https://access.redhat.com/errata/RHSA-2019:1712', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://www.synology.com/security/advisory/Synology_SA_19_17', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/', 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E'}
null
GHSA
GHSA-85q4-v37c-wfpc
Malicious Package in bitcion-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:11Z
2020-09-04T15:39:28Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-85q4-v37c-wfpc', 'https://www.npmjs.com/advisories/1359'}
null
GHSA
GHSA-cqr2-xhg6-p268
OS Command Injection in node-mpv
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7632'}
2022-01-07T00:20:27Z
2022-01-07T00:20:27Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-cqr2-xhg6-p268', 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426', 'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632'}
null
GHSA
GHSA-2r2v-q399-qq93
Request injection in Spring Cloud Gateway
Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.
{'CVE-2021-22051'}
2021-11-10T19:45:04Z
2021-11-10T19:45:02Z
MODERATE
6.5
{'CWE-352', 'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22051', 'https://tanzu.vmware.com/security/cve-2021-22051', 'https://github.com/advisories/GHSA-2r2v-q399-qq93'}
null
GHSA
GHSA-w7r7-r8r9-vrg2
Session fixation in change password form
SilverStripe through 4.3.3 allows session fixation in the "change password" form.
{'CVE-2019-12203'}
2021-08-18T22:28:15Z
2019-11-12T23:01:39Z
MODERATE
6.3
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12203', 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/', 'https://github.com/advisories/GHSA-w7r7-r8r9-vrg2', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12203'}
null
GHSA
GHSA-pj4j-287j-f742
Cross-site Scripting in Contao
Contao before 4.5.7 has XSS in the system log.
{'CVE-2018-10125'}
2022-02-10T20:49:48Z
2022-02-10T20:49:48Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10125', 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html', 'https://github.com/advisories/GHSA-pj4j-287j-f742'}
null
GHSA
GHSA-c7j7-p5jq-26ff
Low severity vulnerability that affects passenger
Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
{'CVE-2014-1831'}
2021-12-03T14:11:35Z
2018-10-10T17:29:20Z
LOW
0
null
{'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831'}
null
GHSA
GHSA-m7mf-48hp-5qmr
Inappropriate implementation in V8
CVE-2020-16009: Inappropriate implementation in V8 - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009 Google is aware of reports that exploits for CVE-2020-16009 exist in the wild. Allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16009'}
2021-01-04T15:52:32Z
2020-12-02T18:28:47Z
HIGH
8.8
{'CWE-787'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html', 'https://security.gentoo.org/glsa/202011-12', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-m7mf-48hp-5qmr', 'http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html', 'https://crbug.com/1143772', 'https://www.debian.org/security/2021/dsa-4824', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/', 'https://github.com/advisories/GHSA-m7mf-48hp-5qmr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16009'}
null
GHSA
GHSA-hxmr-5gv9-6p8v
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0575'}
2022-02-24T13:06:38Z
2022-02-15T00:02:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-hxmr-5gv9-6p8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d'}
null
GHSA
GHSA-fm6q-97gw-c4wh
Secret exposure in Jenkins HashiCorp Vault Plugin
Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.
{'CVE-2022-25186'}
2022-02-24T13:55:25Z
2022-02-16T00:01:28Z
MODERATE
6.5
{'CWE-693'}
{'https://github.com/advisories/GHSA-fm6q-97gw-c4wh', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25186'}
null
GHSA
GHSA-v464-rcx7-j875
Directory Traversal in infraserver
Affected versions of `infraserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16142'}
2021-01-08T01:57:39Z
2018-07-23T20:48:29Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver', 'https://github.com/advisories/GHSA-v464-rcx7-j875', 'https://nodesecurity.io/advisories/471', 'https://www.npmjs.com/advisories/471', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16142'}
null
GHSA
GHSA-g3h8-cg9x-47qw
PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby
### Impact An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. ### Patches The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. **Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14. ### Workarounds Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881). ### Credits Thanks to Thore Imhof of Accenture for reporting the problem.
{'CVE-2020-26255'}
2021-01-07T22:37:41Z
2020-12-08T14:42:08Z
LOW
6.8
{'CWE-434'}
{'https://packagist.org/packages/getkirby/cms', 'https://packagist.org/packages/getkirby/panel', 'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://github.com/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'}
null
GHSA
GHSA-qpwj-mvv7-v3m9
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.
{'CVE-2016-4464'}
2021-06-17T19:02:08Z
2018-10-18T16:57:10Z
HIGH
0
{'CWE-284'}
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6', 'http://www.openwall.com/lists/oss-security/2016/09/08/20', 'http://www.securitytracker.com/id/1036869', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/92905'}
null
GHSA
GHSA-m38j-pmg3-v5x5
Timing attack on django-basic-auth-ip-whitelist
### Impact Potential timing attack exists on websites where the basic authentication is used or configured, i.e. `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located. Sites protected by IP address whitelisting only are unaffected by this vulnerability. ### Patches This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package. ### Workarounds Stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` in Django project settings. ### References - [Django mailing list discussion](https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ) ### For more information If you have any questions or comments about this advisory: * Open an issue at https://github.com/tm-kn/django-basic-auth-ip-whitelist/issues * Email us at the email specified on the [security policy](https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/policy). ### Acknowledgements Thanks to Thibaud Colas for reporting this.
{'CVE-2020-4071'}
2022-04-19T19:02:29Z
2020-06-23T19:58:27Z
LOW
2.2
{'CWE-208'}
{'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6', 'https://github.com/advisories/GHSA-m38j-pmg3-v5x5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4071', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/advisories/GHSA-m38j-pmg3-v5x5', 'https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ'}
null
GHSA
GHSA-x6jv-5vfg-gm7x
Path traversal in ServcieCenter
Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0.
{'CVE-2021-21501'}
2021-09-01T18:35:52Z
2021-09-01T18:35:52Z
HIGH
7.5
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2021/08/10/3', 'https://github.com/apache/servicecomb-service-center/pull/788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21501', 'https://github.com/advisories/GHSA-x6jv-5vfg-gm7x', 'https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E'}
null
GHSA
GHSA-4rx9-58m7-gr8w
Malicious Package in css_transform_step
Version 1.0.6 of `css_transform_step` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.6 of this module is found installed you will want to replace it with a version before or after 1.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T19:53:40Z
2020-09-01T19:53:40Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/623', 'https://github.com/advisories/GHSA-4rx9-58m7-gr8w'}
null
GHSA
GHSA-cvcq-gmc3-q6m8
Plain text storage of passwords in Apache Airflow
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
{'CVE-2020-17511'}
2020-12-17T21:00:56Z
2020-12-17T21:00:56Z
MODERATE
0
{'CWE-312'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17511', 'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665', 'https://github.com/advisories/GHSA-cvcq-gmc3-q6m8', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E'}
null
GHSA
GHSA-mxr5-mc97-63rc
Account Takeover in Octobercms
### Impact An attacker can request an account password reset and then gain access to the account using a specially crafted request. - To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32648'}
2022-02-23T22:21:06Z
2021-08-30T16:13:02Z
HIGH
8.2
{'CWE-287'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/advisories/GHSA-mxr5-mc97-63rc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc'}
null
GHSA
GHSA-9f8f-574q-8jmf
Manipulation of product reviews via API
### Impact Manipulation of product reviews via API ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37707'}
2021-08-30T16:14:00Z
2021-08-30T16:14:00Z
MODERATE
6.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-9f8f-574q-8jmf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
null
GHSA
GHSA-cjw5-f2x5-r4q5
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
{'CVE-2022-0602'}
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
HIGH
7.4
{'CWE-79'}
{'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010', 'https://github.com/advisories/GHSA-cjw5-f2x5-r4q5', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'}
null
GHSA
GHSA-6m8p-4fxj-pgc2
OS Command Injection in mversion
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
{'CVE-2020-7688'}
2021-05-17T21:01:08Z
2021-05-17T21:01:08Z
MODERATE
7.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/418sec/huntr/pull/102', 'https://github.com/advisories/GHSA-6m8p-4fxj-pgc2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688'}
null