ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-xwjr-6fj7-fc6h | Local File Inclusion by unauthenticated users | ### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png"> | {'CVE-2020-15246'} | 2022-04-19T19:02:37Z | 2020-11-23T19:48:12Z | HIGH | 7.5 | {'CWE-863', 'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15246', 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/advisories/GHSA-xwjr-6fj7-fc6h'} | null |
GHSA | GHSA-vgg8-72f2-qm23 | Critical severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request. | {'CVE-2017-7657'} | 2021-06-10T20:19:51Z | 2018-10-19T16:15:34Z | CRITICAL | 9.8 | {'CWE-444', 'CWE-190'} | {'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-vgg8-72f2-qm23', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657', 'https://www.debian.org/security/2018/dsa-4278', 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0910', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
GHSA | GHSA-4mg9-vhxq-vm7j | SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database | ### Impact
Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability.
### Patches
This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0.
### Workarounds
You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
| null | 2021-11-18T19:46:33Z | 2021-04-29T21:52:53Z | HIGH | 0 | {'CWE-89'} | {'https://packagist.org/packages/laravel/framework', 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j', 'https://github.com/advisories/GHSA-4mg9-vhxq-vm7j', 'https://packagist.org/packages/illuminate/database'} | null |
GHSA | GHSA-wxrm-2h86-v95f | Malicious Package in pizza-pasta | Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console.
## Recommendation
Remove the package from your environment. There are no evidences of further compromise. | null | 2021-09-29T20:45:27Z | 2020-09-03T21:04:20Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1196', 'https://github.com/advisories/GHSA-wxrm-2h86-v95f'} | null |
GHSA | GHSA-vgjp-vh3c-32v3 | Directory Traversal in mockserve | Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16146'} | 2021-01-08T01:57:26Z | 2018-07-23T20:46:55Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16146', 'https://www.npmjs.com/advisories/445', 'https://github.com/advisories/GHSA-vgjp-vh3c-32v3'} | null |
GHSA | GHSA-823f-cwm9-4g74 | Splash authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`.
### Patches
Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely.
### Workarounds
If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues)
* [Email us](mailto:opensource@zyte.com)
| {'CVE-2021-41124'} | 2021-10-06T17:49:23Z | 2021-10-06T17:49:23Z | HIGH | 7.4 | {'CWE-200'} | {'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124', 'https://github.com/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'} | null |
GHSA | GHSA-362v-wg5p-64w2 | Incorrect Privilege Assignment in HashiCorp Vault | HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials. | {'CVE-2021-42135'} | 2021-10-20T17:28:19Z | 2021-10-12T18:41:16Z | HIGH | 8.1 | {'CWE-863', 'CWE-266'} | {'https://github.com/advisories/GHSA-362v-wg5p-64w2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135', 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180', 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'} | null |
GHSA | GHSA-4w82-r329-3q67 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. | {'CVE-2020-8840'} | 2022-04-07T22:42:01Z | 2020-03-04T20:52:14Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-4w82-r329-3q67', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E'} | null |
GHSA | GHSA-fq6p-6334-8gr4 | Memory leak in decoding PNG images | ### Impact
When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid.
After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur.
### Patches
We have patched the issue in GitHub commit [ab51e5b813573dc9f51efa335aebcf2994125ee9](https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23585'} | 2022-02-11T20:36:40Z | 2022-02-09T23:26:08Z | MODERATE | 4.3 | {'CWE-401'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23585', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4', 'https://github.com/advisories/GHSA-fq6p-6334-8gr4', 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'} | null |
GHSA | GHSA-f7p5-w2cr-7cp7 | High severity vulnerability that affects puppet | Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. | {'CVE-2013-3567'} | 2021-09-09T21:49:41Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-3567', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html', 'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'https://puppetlabs.com/security/cve/cve-2013-3567/', 'http://www.debian.org/security/2013/dsa-2715', 'https://github.com/advisories/GHSA-f7p5-w2cr-7cp7', 'http://www.ubuntu.com/usn/USN-1886-1', 'http://secunia.com/advisories/54429'} | null |
GHSA | GHSA-pjj4-w39g-pw54 | Ox gem crashes due to a crafted input | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. | {'CVE-2017-15928'} | 2022-04-25T22:04:25Z | 2017-11-21T18:26:40Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15928', 'https://github.com/advisories/GHSA-pjj4-w39g-pw54', 'https://github.com/ohler55/ox/issues/194', 'https://rubygems.org/gems/ox/versions/2.8.0'} | null |
GHSA | GHSA-x7hc-x7fm-f7qh | Cross-Site Scripting in Content Preview (CType menu) | > ### Meta
> * CVSS: `AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1)
> * CWE-79
> * Status: **DRAFT**
### Problem
It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008) | {'CVE-2021-21370'} | 2022-04-19T19:02:50Z | 2021-03-23T01:54:17Z | LOW | 0 | {'CWE-79'} | {'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh', 'https://packagist.org/packages/typo3/cms-backend', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21370', 'https://github.com/advisories/GHSA-x7hc-x7fm-f7qh', 'https://typo3.org/security/advisory/typo3-core-sa-2021-008'} | null |
GHSA | GHSA-cvfm-xjc8-f2vm | Denial of Service in @commercial/subtext | Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 5.1.2 or later. | null | 2020-09-03T15:46:36Z | 2020-09-03T15:46:36Z | HIGH | 0 | null | {'https://www.npmjs.com/advisories/1477', 'https://github.com/advisories/GHSA-cvfm-xjc8-f2vm'} | null |
GHSA | GHSA-2598-2f59-rmhq | SQL Injection in sequelize | Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 3.35.1 or later. | {'CVE-2019-10749'} | 2021-08-18T22:10:20Z | 2019-11-08T17:05:17Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://github.com/advisories/GHSA-2598-2f59-rmhq'} | null |
GHSA | GHSA-wh33-4p32-g7vh | Directory Traversal in serverxxx | Affected versions of `serverxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16182'} | 2021-01-08T01:56:50Z | 2018-07-23T20:43:56Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-wh33-4p32-g7vh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16182', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx', 'https://www.npmjs.com/advisories/455', 'https://nodesecurity.io/advisories/455'} | null |
GHSA | GHSA-r5gm-4p5w-pq2p | Remote code execution in verot/class.upload.php | class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions. | {'CVE-2019-19576'} | 2021-08-19T16:24:47Z | 2020-01-16T22:17:40Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://www.verot.net/php_class_upload.htm', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://www.verot.net', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://github.com/jra89/CVE-2019-19576', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/advisories/GHSA-r5gm-4p5w-pq2p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'} | null |
GHSA | GHSA-cf4h-3jhx-xvhq | Arbitrary Code Execution in underscore | The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized. | {'CVE-2021-23358'} | 2021-08-25T17:37:26Z | 2021-05-06T16:09:43Z | HIGH | 9.8 | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://www.npmjs.com/package/underscore', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4883', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://github.com/jashkenas/underscore/pull/2917', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://www.tenable.com/security/tns-2021-14', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://github.com/advisories/GHSA-cf4h-3jhx-xvhq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html'} | null |
GHSA | GHSA-f26x-pr96-vw86 | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. | {'CVE-2018-11040'} | 2021-10-21T21:28:15Z | 2018-10-16T17:43:45Z | MODERATE | 5.9 | {'CWE-829'} | {'https://pivotal.io/security/cve-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html', 'https://github.com/advisories/GHSA-f26x-pr96-vw86'} | null |
GHSA | GHSA-32pc-xphx-q4f6 | Gunicorn contains Improper Neutralization of CRLF sequences in HTTP headers | gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0. | {'CVE-2018-1000164'} | 2022-04-26T18:06:43Z | 2018-07-12T20:30:49Z | HIGH | 7.5 | {'CWE-93'} | {'https://usn.ubuntu.com/4022-1/', 'https://github.com/benoitc/gunicorn/issues/1227', 'https://github.com/advisories/GHSA-32pc-xphx-q4f6', 'https://www.debian.org/security/2018/dsa-4186', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000164', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html', 'https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5'} | null |
GHSA | GHSA-4g77-cvgw-grvw | Prototype Pollution in putil-merge | This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077 | {'CVE-2021-23470'} | 2022-02-11T16:15:46Z | 2022-02-05T00:00:31Z | HIGH | 8.2 | {'CWE-1321'} | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470', 'https://github.com/advisories/GHSA-4g77-cvgw-grvw'} | null |
GHSA | GHSA-jmhj-vh4q-hhmq | tkvideo has a memory issue in playing videos | Huge memory consumption even when playing small files. This issue has been patched in 2.0.0. Please upgrade to version 2.0.0 or above. | {'CVE-2022-24902'} | 2022-05-03T03:47:34Z | 2022-05-03T03:47:34Z | HIGH | 0 | null | {'https://github.com/PaulleDemon/tkVideoPlayer/security/advisories/GHSA-jmhj-vh4q-hhmq', 'https://github.com/PaulleDemon/tkVideoPlayer/issues/3', 'https://github.com/advisories/GHSA-jmhj-vh4q-hhmq'} | null |
GHSA | GHSA-cq8r-fc3q-6hg2 | Denial of Service (DoS) via the unsetByPath function in jsjoints | The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function. | {'CVE-2020-28479'} | 2021-04-13T15:29:40Z | 2021-04-13T15:29:40Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://github.com/advisories/GHSA-cq8r-fc3q-6hg2', 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'} | null |
GHSA | GHSA-v7ff-8wcx-gmc5 | Authorization Before Parsing and Canonicalization in jetty | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS. | {'CVE-2021-28164'} | 2022-04-22T15:49:47Z | 2021-04-06T17:31:01Z | MODERATE | 5.3 | {'CWE-200', 'CWE-551', 'CWE-863'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-v7ff-8wcx-gmc5', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/'} | null |
GHSA | GHSA-8m3r-rv5g-fcpq | Moderate severity vulnerability that affects django | Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload. | {'CVE-2011-0697'} | 2021-09-07T19:50:27Z | 2018-07-23T21:01:00Z | MODERATE | 0 | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=676359', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0372', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html', 'http://secunia.com/advisories/43382', 'http://secunia.com/advisories/43426', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://www.vupen.com/english/advisories/2011/0439', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0697', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43297', 'http://secunia.com/advisories/43230', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0388', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'https://github.com/advisories/GHSA-8m3r-rv5g-fcpq', 'http://www.securityfocus.com/bid/46296'} | null |
GHSA | GHSA-vx6f-6rp6-f2px | Cross-Site Request Forgery in Jenkins dbCharts Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance. | {'CVE-2022-25205'} | 2022-02-26T00:36:45Z | 2022-02-16T00:01:17Z | HIGH | 8.8 | {'CWE-352'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205', 'https://github.com/advisories/GHSA-vx6f-6rp6-f2px'} | null |
GHSA | GHSA-269q-hmxg-m83q | Local Information Disclosure Vulnerability in io.netty:netty-codec-http | ### Description ###
[GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified.
### Impact ###
When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled.
This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.
### Vulnerability Details ###
To fix the vulnerability the code was changed to the following:
```java
@SuppressJava6Requirement(reason = "Guarded by version check")
public static File createTempFile(String prefix, String suffix, File directory) throws IOException {
if (javaVersion() >= 7) {
if (directory == null) {
return Files.createTempFile(prefix, suffix).toFile();
}
return Files.createTempFile(directory.toPath(), prefix, suffix).toFile();
}
if (directory == null) {
return File.createTempFile(prefix, suffix);
}
File file = File.createTempFile(prefix, suffix, directory);
// Try to adjust the perms, if this fails there is not much else we can do...
file.setReadable(false, false);
file.setReadable(true, true);
return file;
}
```
Unfortunately, this logic path was left vulnerable:
```java
if (directory == null) {
return File.createTempFile(prefix, suffix);
}
```
This file is still readable by all local users.
### Patches ###
Update to 4.1.77.Final
### Workarounds ###
Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above.
### References ###
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information ###
If you have any questions or comments about this advisory:
Open an issue in [netty](https://github.com/netty/netty)
| {'CVE-2022-24823'} | 2022-05-10T08:46:52Z | 2022-05-10T08:46:50Z | MODERATE | 5.5 | {'CWE-379', 'CWE-668', 'CWE-378'} | {'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1', 'https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://github.com/advisories/GHSA-269q-hmxg-m83q', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24823'} | null |
GHSA | GHSA-p4mf-4qvh-w8g5 | Malicious Package in bitcionjslib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:39:42Z | 2020-09-04T15:41:42Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-p4mf-4qvh-w8g5', 'https://www.npmjs.com/advisories/1361'} | null |
GHSA | GHSA-6495-8jvh-f28x | File restriction bypass in socket.io-file | All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types.
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-04T21:23:14Z | 2020-10-02T15:39:54Z | HIGH | 7.8 | {'CWE-20'} | {'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://www.npmjs.com/advisories/1564'} | null |
GHSA | GHSA-rwcq-qpm6-7867 | Malicious Package in riped160 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:04:25Z | 2020-09-03T17:04:32Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-rwcq-qpm6-7867', 'https://www.npmjs.com/advisories/1403'} | null |
GHSA | GHSA-hpr6-f4vq-mxch | Command injection in LocalStack | The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter. | {'CVE-2021-32090'} | 2021-06-18T18:38:00Z | 2021-06-18T18:38:00Z | MODERATE | 9.8 | {'CWE-77'} | {'https://github.com/advisories/GHSA-hpr6-f4vq-mxch', 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32090', 'https://blog.sonarsource.com/hack-the-stack-with-localstack'} | null |
GHSA | GHSA-phg2-9c5g-m4q7 | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.
# Mitigation
Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html | {'CVE-2018-17190'} | 2021-09-16T17:32:21Z | 2018-11-21T22:19:30Z | CRITICAL | 9.8 | null | {'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E', 'https://security.gentoo.org/glsa/201903-21', 'http://www.securityfocus.com/bid/105976', 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190'} | null |
GHSA | GHSA-v98r-gjgc-m9pf | Cross-site Scripting in Jenkins Promoted Builds Plugin | Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-29045'} | 2022-04-22T21:07:38Z | 2022-04-13T00:00:16Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-v98r-gjgc-m9pf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'} | null |
GHSA | GHSA-72q2-5rxx-xfff | Downloads Resources over HTTP in gfe-sass | Affected versions of `gfe-sass` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `gfe-sass`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2017-16040'} | 2021-01-14T15:56:53Z | 2020-09-01T16:12:12Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/291', 'https://github.com/advisories/GHSA-72q2-5rxx-xfff', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16040', 'https://nodesecurity.io/advisories/291'} | null |
GHSA | GHSA-8qpm-5c82-rf96 | Prototype Pollution in backbone-query-parameters | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in backbone-query-parameters 0.4.0 allows a malicious user to inject properties into Object.prototype. | {'CVE-2021-20085'} | 2021-05-06T15:52:02Z | 2021-05-06T15:52:02Z | HIGH | 0 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-8qpm-5c82-rf96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20085', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md'} | null |
GHSA | GHSA-qvp5-mm7v-4f36 | Cross-site Scripting in Strapi | Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature. | {'CVE-2020-27666'} | 2021-01-08T21:22:10Z | 2020-10-29T19:40:08Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-qvp5-mm7v-4f36', 'https://github.com/strapi/strapi/pull/8440', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27666', 'https://github.com/strapi/strapi/releases/tag/v3.2.5'} | null |
GHSA | GHSA-7rp6-w7mg-h8rw | XML External Entity Reference in Apache Jena | A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server. | {'CVE-2021-39239'} | 2021-09-21T17:42:33Z | 2021-09-20T20:22:05Z | HIGH | 0 | {'CWE-611'} | {'https://github.com/advisories/GHSA-7rp6-w7mg-h8rw', 'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E'} | null |
GHSA | GHSA-jj6m-r8jc-2gp7 | Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings | ### Impact
All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding.
### Patches
Users should upgrade to `1.4.4`.
### Workarounds
There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created.
### For more information
If you have any questions or comments about this advisory:
* Contact us on [Discord](https://discord.gg/pterodactyl)
* Email us at `dane ät pterodactyl dot io` | {'CVE-2021-32699'} | 2021-10-21T13:26:04Z | 2021-06-23T18:03:18Z | MODERATE | 6.5 | {'CWE-405'} | {'https://github.com/advisories/GHSA-jj6m-r8jc-2gp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699', 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7', 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'} | null |
GHSA | GHSA-7wjx-3g7j-8584 | Denial of Service in Action Controller Token Authentication | Impact
------
Impacted code uses `authenticate_or_request_with_http_token` or
`authenticate_with_http_token` for request authentication. Impacted code will
look something like this:
```
class PostsController < ApplicationController
before_action :authenticate
private
def authenticate
authenticate_or_request_with_http_token do |token, options|
# ...
end
end
end
```
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around
the issue:
```ruby
module ActionController::HttpAuthentication::Token
AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 5-2-http-authentication-dos.patch - Patch for 5.2 series
* 6-0-http-authentication-dos.patch - Patch for 6.0 series
* 6-1-http-authentication-dos.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue! | {'CVE-2021-22904'} | 2021-11-01T21:26:00Z | 2021-05-05T19:49:12Z | HIGH | 7.5 | {'CWE-400'} | {'https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://hackerone.com/reports/1101125', 'https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22904', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://github.com/advisories/GHSA-7wjx-3g7j-8584', 'https://github.com/rails/rails/releases/tag/v5.2.4.6'} | null |
GHSA | GHSA-86gw-g9jv-8vfg | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848. | {'CVE-2020-0833'} | 2021-07-28T18:57:55Z | 2021-07-28T18:57:55Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0833', 'https://github.com/advisories/GHSA-86gw-g9jv-8vfg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833'} | null |
GHSA | GHSA-7r83-w6r8-fh6w | Reflected Cross-site Scripting (XSS) in ACS Commons | ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. | {'CVE-2021-21043'} | 2021-12-13T21:34:09Z | 2021-05-13T22:31:14Z | MODERATE | 6.1 | {'CWE-787', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://github.com/advisories/GHSA-7r83-w6r8-fh6w', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html'} | null |
GHSA | GHSA-fhvj-7f9p-w788 | Buffer overflow in arr | An issue was discovered in the arr crate through 2020-08-25 for Rust. There is a buffer overflow in Index and IndexMut. | {'CVE-2020-35887'} | 2021-08-25T20:48:54Z | 2021-08-25T20:48:54Z | CRITICAL | 9.8 | {'CWE-120'} | {'https://github.com/sjep/array/issues/1', 'https://github.com/advisories/GHSA-fhvj-7f9p-w788', 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35887'} | null |
GHSA | GHSA-rwqq-p4p9-5wpq | Wechat-php-sdk is affected by a Cross Site Scripting vulnerability. | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | {'CVE-2021-43678'} | 2022-01-07T00:00:29Z | 2022-01-07T00:00:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-rwqq-p4p9-5wpq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43678', 'https://github.com/gaoming13/wechat-php-sdk', 'https://github.com/gaoming13/wechat-php-sdk/issues/30'} | null |
GHSA | GHSA-q7j5-9j77-g4gq | Remote code execution in turn extension for TYPO3 | The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution. | {'CVE-2020-15515'} | 2021-07-29T20:50:41Z | 2020-07-29T18:07:41Z | HIGH | 8.8 | {'CWE-74'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515', 'https://typo3.org/help/security-advisories', 'https://github.com/advisories/GHSA-q7j5-9j77-g4gq'} | null |
GHSA | GHSA-qc22-qwm9-j8rx | Remote Code Execution in npm-groovy-lint | Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable. | null | 2021-12-20T16:59:31Z | 2021-12-20T16:59:31Z | CRITICAL | 0 | {'CWE-20'} | {'https://github.com/advisories/GHSA-qc22-qwm9-j8rx', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'} | null |
GHSA | GHSA-p6jh-p7q8-pcrg | Prototype Pollution in nodee-utils | All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function. | {'CVE-2020-7722'} | 2021-07-29T22:08:42Z | 2021-05-06T18:26:21Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/advisories/GHSA-p6jh-p7q8-pcrg', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'} | null |
GHSA | GHSA-xwr3-fmgj-mmfr | Moderate severity vulnerability that affects bio-basespace-sdk | The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes. | {'CVE-2013-7111'} | 2021-09-22T18:21:31Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr', 'http://www.openwall.com/lists/oss-security/2013/12/14/2', 'http://www.openwall.com/lists/oss-security/2013/12/15/5', 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'} | null |
GHSA | GHSA-566m-qj78-rww5 | Regular Expression Denial of Service in postcss | The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). | {'CVE-2021-23382'} | 2022-04-19T19:03:24Z | 2022-01-07T00:21:36Z | MODERATE | 5.3 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://github.com/advisories/GHSA-566m-qj78-rww5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641'} | null |
GHSA | GHSA-p99v-5w3c-jqq9 | Bypass of access control in Django | In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . | {'CVE-2021-33571'} | 2022-02-14T22:20:19Z | 2021-06-10T17:21:12Z | HIGH | 7.5 | {'CWE-918'} | {'https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33571', 'https://security.netapp.com/advisory/ntap-20210727-0004/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://github.com/advisories/GHSA-p99v-5w3c-jqq9', 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'} | null |
GHSA | GHSA-9gqg-3fxr-9hv7 | Cross site scripting in apache-airflow | In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system. | {'CVE-2017-17836'} | 2022-03-21T18:53:33Z | 2019-01-25T16:19:09Z | CRITICAL | 9.8 | {'CWE-79'} | {'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836', 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'} | null |
GHSA | GHSA-cqqh-49mx-fq63 | Prototype Pollution in merge | merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3645'} | 2021-09-24T13:11:10Z | 2021-09-13T20:16:54Z | MODERATE | 6.8 | {'CWE-1321', 'CWE-915'} | {'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://github.com/advisories/GHSA-cqqh-49mx-fq63'} | null |
GHSA | GHSA-265q-28rp-chq5 | Insecure Entropy Source - Math.random() in node-uuid | Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's.
## Recommendation
Update to version 1.4.4 or later. | {'CVE-2015-8851'} | 2021-08-23T15:25:55Z | 2020-04-16T03:14:50Z | HIGH | 7.5 | {'CWE-331'} | {'https://nodesecurity.io/advisories/93', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://www.npmjs.com/advisories/93', 'https://github.com/advisories/GHSA-265q-28rp-chq5', 'https://github.com/broofa/node-uuid/issues/108', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://github.com/broofa/node-uuid/issues/122'} | null |
GHSA | GHSA-m6rw-m2v9-7hx4 | OS Command Injection in wifiscanner | wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code. | {'CVE-2020-15362'} | 2021-07-29T19:48:30Z | 2021-05-17T21:00:59Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/thingsSDK/wifiscanner/issues/1', 'https://github.com/advisories/GHSA-m6rw-m2v9-7hx4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15362'} | null |
GHSA | GHSA-59cf-m7v5-wh5w | Cross-Site Scripting in SVG Sanitizer | Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting.
An updated version 1.0.3 is available from the TYPo3 extension manager and at https://extensions.typo3.org/extension/download/svg_sanitizer/1.0.3/zip/
Users of the extension are advised to update the extension as soon as possible. | {'CVE-2020-11070'} | 2022-04-19T19:02:26Z | 2020-05-13T22:17:34Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-59cf-m7v5-wh5w', 'https://github.com/TYPO3GmbH/svg_sanitizer/security/advisories/GHSA-59cf-m7v5-wh5w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11070'} | null |
GHSA | GHSA-3xph-cp8f-2229 | Prototype Pollution in @fabiocaccamo/utils.js | utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | {'CVE-2021-3815'} | 2021-12-13T13:10:41Z | 2021-12-10T20:31:32Z | HIGH | 8 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-3xph-cp8f-2229', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'} | null |
GHSA | GHSA-h7qw-mxrm-c6h2 | Unauthenticated crypto and weak IV in Magento\Framework\Encryption | The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value. | {'CVE-2016-6485'} | 2021-08-18T22:35:44Z | 2019-11-20T01:33:05Z | HIGH | 7.5 | {'CWE-327'} | {'https://github.com/magento/magento2/pull/15017', 'https://github.com/advisories/GHSA-h7qw-mxrm-c6h2', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485', 'http://www.openwall.com/lists/oss-security/2016/07/27/14', 'http://www.openwall.com/lists/oss-security/2016/07/19/3'} | null |
GHSA | GHSA-97cc-825c-399g | Cross site scripting in remdex/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4050'} | 2021-12-10T20:33:29Z | 2021-12-10T20:33:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05', 'https://github.com/advisories/GHSA-97cc-825c-399g'} | null |
GHSA | GHSA-cff4-rrq6-h78w | Command Injection in command-exists | Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module.
## Recommendation
Update to version 1.2.4 or later. | null | 2021-08-04T20:40:48Z | 2019-06-03T17:31:26Z | CRITICAL | 0 | {'CWE-77'} | {'https://hackerone.com/reports/324453', 'https://www.npmjs.com/advisories/659', 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94', 'https://github.com/advisories/GHSA-cff4-rrq6-h78w'} | null |
GHSA | GHSA-9gqr-xp86-f87h | Code injection in npm git | All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released. | {'CVE-2021-23632'} | 2022-03-25T16:13:14Z | 2022-03-18T00:01:11Z | MODERATE | 6.6 | {'CWE-94', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23632', 'https://github.com/advisories/GHSA-9gqr-xp86-f87h', 'https://snyk.io/vuln/SNYK-JS-GIT-1568518'} | null |
GHSA | GHSA-qc84-gqf4-9926 | Improper Restriction of Operations within the Bounds of a Memory Buffer and Race Condition in crossbeam-utils | ### Impact
The affected version of this crate incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`.
However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`.
This can cause the following problems:
- Unaligned memory accesses
- Data race
Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue.
32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue.
32-bit targets with `Atomic{I,U}64` and `{i,u}64` have the same alignment are also not affected by this issue.
The following is a complete list of the builtin targets that may be affected. (last update: nightly-2022-02-11)
- armv7-apple-ios (tier 3)
- armv7s-apple-ios (tier 3)
- i386-apple-ios (tier 3)
- i586-unknown-linux-gnu
- i586-unknown-linux-musl
- i686-apple-darwin (tier 3)
- i686-linux-android
- i686-unknown-freebsd
- i686-unknown-haiku (tier 3)
- i686-unknown-linux-gnu
- i686-unknown-linux-musl
- i686-unknown-netbsd (tier 3)
- i686-unknown-openbsd (tier 3)
- i686-wrs-vxworks (tier 3)
([script to get list](https://gist.github.com/taiki-e/3c7891e8c5f5e0cbcb44d7396aabfe10))
### Patches
This has been fixed in crossbeam-utils 0.8.7.
Affected 0.8.x releases have been yanked.
### References
https://github.com/crossbeam-rs/crossbeam/pull/781 | {'CVE-2022-23639'} | 2022-02-25T15:42:43Z | 2022-02-16T22:36:21Z | CRITICAL | 9.8 | {'CWE-119', 'CWE-362'} | {'https://github.com/advisories/GHSA-qc84-gqf4-9926', 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926', 'https://github.com/crossbeam-rs/crossbeam/pull/781', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23639', 'https://github.com/crossbeam-rs/crossbeam/releases/tag/crossbeam-utils-0.8.7'} | null |
GHSA | GHSA-xrjf-phvv-r4vr | Command injection in strapi | When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input. | {'CVE-2022-0764'} | 2022-03-09T20:26:22Z | 2022-02-27T00:00:15Z | MODERATE | 6.1 | {'CWE-77', 'CWE-78'} | {'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://github.com/advisories/GHSA-xrjf-phvv-r4vr'} | null |
GHSA | GHSA-567x-m4wm-87v8 | Infinite loop in Apache Tika | A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later. | {'CVE-2021-28657'} | 2022-04-22T15:50:03Z | 2021-05-10T15:23:25Z | MODERATE | 5.5 | {'CWE-835', 'CWE-400'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28657', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210507-0004/', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://github.com/advisories/GHSA-567x-m4wm-87v8'} | null |
GHSA | GHSA-m5vx-8chx-qvmm | Form validation can be skipped | ### Impact
By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators.
We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified.
That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent.
### Patches
https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246
### Workarounds
Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data.
Alternatively a custom Finisher can be added as first finisher.
### References
This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
Original report: https://tickets.neos.io/#ticket/zoom/411 (internal) | {'CVE-2021-32697'} | 2022-04-19T19:02:59Z | 2021-06-22T15:15:08Z | MODERATE | 6.5 | {'CWE-20'} | {'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/releases/tag/5.1.3', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/advisories/GHSA-m5vx-8chx-qvmm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm'} | null |
GHSA | GHSA-c5hx-w945-j4pq | Memory flaw in zeroize_derive | An issue was discovered in the zeroize_derive crate before 1.1.1 for Rust. Dropped memory is not zeroed out for an enum. | {'CVE-2021-45706'} | 2022-01-07T18:29:04Z | 2022-01-06T22:08:33Z | CRITICAL | 9.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45706', 'https://rustsec.org/advisories/RUSTSEC-2021-0115.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/zeroize_derive/RUSTSEC-2021-0115.md', 'https://github.com/advisories/GHSA-c5hx-w945-j4pq', 'https://github.com/iqlusioninc/crates/issues/876'} | null |
GHSA | GHSA-gp6m-vqhm-5cm5 | XML Entity Expansion | XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references. | {'CVE-2021-25951'} | 2021-07-07T17:12:05Z | 2021-07-02T18:37:31Z | HIGH | 7.5 | {'CWE-776', 'CWE-611'} | {'https://github.com/mcspring/XML2Dict/tree/master', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25951', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951', 'https://pypi.org/project/XML2Dict/', 'https://github.com/advisories/GHSA-gp6m-vqhm-5cm5'} | null |
GHSA | GHSA-pf8j-vhg8-xmc3 | Injection in karma-mojo | karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument. | {'CVE-2020-7626'} | 2022-02-10T23:42:58Z | 2022-02-10T23:42:58Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,', 'https://github.com/advisories/GHSA-pf8j-vhg8-xmc3', 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'} | null |
GHSA | GHSA-wg85-p6j7-gp3w | Moderate severity vulnerability that affects simplemde | SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with [ and ( characters, which is mishandled during construction of an A element. | {'CVE-2018-19057'} | 2021-09-21T19:44:46Z | 2018-11-21T22:21:25Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-19057', 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w', 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721'} | null |
GHSA | GHSA-jmxr-w2jc-qp7w | Improper Input Validation in Jenkins Promoted Builds Plugin | Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not validate the names of promotions defined in Job DSL, allowing attackers with Job/Configure permission to create a promotion with an unsafe name. | {'CVE-2022-29049'} | 2022-04-22T21:07:55Z | 2022-04-13T00:00:16Z | MODERATE | 4.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-jmxr-w2jc-qp7w', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2655', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29049'} | null |
GHSA | GHSA-wx3q-6x7x-jjw4 | Downloads Resources over HTTP in mystem | Affected versions of `mystem` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10664'} | 2021-01-08T00:47:50Z | 2019-02-18T23:44:39Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/259', 'https://github.com/advisories/GHSA-wx3q-6x7x-jjw4', 'https://nodesecurity.io/advisories/259', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10664'} | null |
GHSA | GHSA-q2xp-75m7-gv52 | Moderate severity vulnerability that affects net.sf.robocode:robocode.api | Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL. | {'CVE-2019-10648'} | 2021-07-27T20:33:52Z | 2019-04-02T15:36:49Z | CRITICAL | 9.8 | {'CWE-862', 'CWE-20'} | {'https://sourceforge.net/p/robocode/bugs/406/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'} | null |
GHSA | GHSA-3hfw-x7gx-437c | Path traversal in Matrix Synapse | ### Impact
Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory.
The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact.
Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected.
### Patches
Server administrators should upgrade to 1.47.1 or later.
### Workarounds
Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints:
* `/_matrix/media/r0/download/{serverName}/{mediaId}`
* `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}`
* `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}`
Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`.
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
| {'CVE-2021-41281'} | 2021-12-10T18:30:50Z | 2021-11-23T21:58:56Z | HIGH | 7.5 | {'CWE-22'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/', 'https://github.com/advisories/GHSA-3hfw-x7gx-437c', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c'} | null |
GHSA | GHSA-2jfv-g3fh-xq3v | Excessive memory usage in tokio-rustls | An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly. | {'CVE-2020-35875'} | 2021-08-25T20:46:54Z | 2021-08-25T20:46:54Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35875', 'https://github.com/tokio-rs/tls/pull/14', 'https://rustsec.org/advisories/RUSTSEC-2020-0019.html', 'https://github.com/advisories/GHSA-2jfv-g3fh-xq3v'} | null |
GHSA | GHSA-h5wh-7h2j-h999 | Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon | SWHKD 1.1.5 consumes the keyboard events of unintended users. This could potentially cause an information leak, but is usually a denial of functionality. | {'CVE-2022-27817'} | 2022-04-26T13:04:23Z | 2022-04-15T00:00:40Z | MODERATE | 4.4 | {'CWE-668'} | {'https://github.com/waycrate/swhkd/releases', 'https://github.com/advisories/GHSA-h5wh-7h2j-h999', 'https://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27817'} | null |
GHSA | GHSA-g54h-m393-cpwq | devices resource list treated as a blacklist by default | ### Impact
Contrary to the [OCI runtime specification](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist), `runc`'s implementation of the `linux.resources.devices` list was a black-list by default. This means that users who created their own `config.json` objects and didn't prefix a deny-all rule (`{"allow": false, "permissions": "rwm"}` or equivalent) were not provided protection by the `devices` cgroup. This would allow malicious containers (with sufficient privileges) to create arbitrary device inodes (assuming they have `CAP_MKNOD`) and operate on any device inodes they may have access to (assuming they have regular Unix DAC permissions).
However, most (if not all) programs that make use of `runc` include this deny-all rule. This was most likely added before the specification mandated a white-list of devices, and the fact that all programs wrote their own deny-all rule obscured the existence of this bug for several years. In fact, even the specification's examples include a default deny-all rule! We therefore believe that while this is a security bug (and has been fixed as such), it was almost certainly not exploitable in the wild due to the inclusion of default deny-all rules by all known users of `runc` -- hence why this advisory has low severity.
### Patches
This issue has been fixed in [a patch that was part of a larger rework of the devices cgroup code in runc](https://github.com/opencontainers/runc/pull/2391) -- which lead to the discovery of this security bug. Users should upgrade to 1.0.0-rc91 as soon as it is released, or wait for your distribution to backport the relevant fixes.
### Workarounds
If you are using `runc` directly, ensure that there is a deny-all entry at the beginning of `linux.resources.devices` -- such an entry would look like `{"allow": false, "permissions": "rwm"}` (all other fields are ignored, though `type` must be set to `"a"` or `null` if it is present).
Users which consume `runc` through another program should check whether their containers are operating under a white-list -- this can be done by reading `/sys/fs/cgroup/devices/devices.list` inside the container. If the file contains only the entry `a *:* rwm` (meaning the cgroup is in black-list mode, which likely means "allow all device access") then your containers are vulnerable to this issue.
As always, we recommend **in the strongest possible terms** that all of our users enable user namespaces on all of their workloads (or pressure their vendors to do so). User namespaces are one of the most significant defense-in-depth protections you can enable for containers, and have prevented many container-related vulnerabilities (both kernel 0days as well as bugs in container runtimes, such as this one).
### References
* https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html
* [opencontainers/runtime-spec/config-linux.md#device-whitelist](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist)
* https://github.com/opencontainers/runc/pull/2391
### For more information
If you have any questions or comments about this advisory:
* [Open an issue in this repo](https://github.com/opencontainers/runc/issues/new).
* Email us at <security@opencontainers.org>. | null | 2022-04-19T19:02:28Z | 2021-12-20T18:21:54Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-g54h-m393-cpwq', 'https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq'} | null |
GHSA | GHSA-mrvj-7q4f-5p42 | Cross-site scripting in eZ Platform Kernel | ### Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
### Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at:
https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109
### Important note
You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content. | null | 2021-03-19T19:56:42Z | 2021-03-19T19:56:42Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2'} | null |
GHSA | GHSA-vcjf-mgcg-jxjq | Cross-site Scripting in CKEditor 4.0 | A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax). | {'CVE-2020-9281'} | 2022-02-08T22:06:54Z | 2021-05-07T16:32:17Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/', 'https://github.com/ckeditor/ckeditor4', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/', 'https://github.com/advisories/GHSA-vcjf-mgcg-jxjq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9281', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-jj8r-p9f5-fmvv | Cross-site Scripting in TYPO3 extension | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. | {'CVE-2021-36785'} | 2021-08-30T17:22:25Z | 2021-08-30T17:22:25Z | MODERATE | 8.5 | {'CWE-79'} | {'https://github.com/advisories/GHSA-jj8r-p9f5-fmvv', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://typo3.org/help/security-advisories/security'} | null |
GHSA | GHSA-mr6h-chqp-p9g2 | SQL Injection in gogs.io/gogs | SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues. | {'CVE-2014-8681'} | 2021-06-29T18:32:44Z | 2021-06-29T18:32:44Z | MODERATE | 6.5 | {'CWE-89'} | {'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681', 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695', 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html', 'https://github.com/gogits/gogs/releases/tag/v0.5.8', 'http://seclists.org/fulldisclosure/2014/Nov/31', 'https://github.com/advisories/GHSA-mr6h-chqp-p9g2', 'http://gogs.io/docs/intro/change_log.html', 'https://www.exploit-db.com/exploits/35237', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681'} | null |
GHSA | GHSA-wvh7-5p38-2qfc | Storing Password in Local Storage | The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext."
Example Code:
```js
async () => {
const user = Parse.User.current()
if (user) {
user.setPassword('newpass')
await user.save()
}
}
```
After running the above code, the new password will be stored in localStorage as a property named "password".
Proposed Solution:
Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object.
Configuration:
Parse SDK: 2.9.1
Parse Server: 3.9.0 | null | 2022-04-19T19:02:31Z | 2020-07-23T18:20:10Z | MODERATE | 0 | {'CWE-256'} | {'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} | null |
GHSA | GHSA-762f-c2wg-m8c8 | Denial of Service in protobufjs | Versions of `protobufjs` before 5.0.3 and 6.8.6 are vulnerable to denial of service when parsing crafted invalid *.proto files.
## Recommendation
Update to version 5.0.3, 6.8.6 or later. | {'CVE-2018-3738'} | 2021-01-08T19:17:23Z | 2018-10-09T00:27:15Z | MODERATE | 0 | {'CWE-770'} | {'https://github.com/dcodeIO/protobuf.js/blob/6.8.5/src/parse.js#L27', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3738', 'https://hackerone.com/reports/319576', 'https://github.com/advisories/GHSA-762f-c2wg-m8c8', 'https://www.npmjs.com/advisories/605'} | null |
GHSA | GHSA-8vmx-qmch-mpqg | High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | {'CVE-2019-0232'} | 2021-06-15T16:59:54Z | 2019-04-18T14:27:35Z | HIGH | 8.1 | {'CWE-78'} | {'http://seclists.org/fulldisclosure/2019/May/4', 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html', 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784', 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/107906', 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html', 'https://access.redhat.com/errata/RHSA-2019:1712', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://www.synology.com/security/advisory/Synology_SA_19_17', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/', 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E'} | null |
GHSA | GHSA-85q4-v37c-wfpc | Malicious Package in bitcion-ops | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:39:11Z | 2020-09-04T15:39:28Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-85q4-v37c-wfpc', 'https://www.npmjs.com/advisories/1359'} | null |
GHSA | GHSA-cqr2-xhg6-p268 | OS Command Injection in node-mpv | node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | {'CVE-2020-7632'} | 2022-01-07T00:20:27Z | 2022-01-07T00:20:27Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-cqr2-xhg6-p268', 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426', 'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632'} | null |
GHSA | GHSA-2r2v-q399-qq93 | Request injection in Spring Cloud Gateway | Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer. | {'CVE-2021-22051'} | 2021-11-10T19:45:04Z | 2021-11-10T19:45:02Z | MODERATE | 6.5 | {'CWE-352', 'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22051', 'https://tanzu.vmware.com/security/cve-2021-22051', 'https://github.com/advisories/GHSA-2r2v-q399-qq93'} | null |
GHSA | GHSA-w7r7-r8r9-vrg2 | Session fixation in change password form | SilverStripe through 4.3.3 allows session fixation in the "change password" form. | {'CVE-2019-12203'} | 2021-08-18T22:28:15Z | 2019-11-12T23:01:39Z | MODERATE | 6.3 | {'CWE-384'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12203', 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/', 'https://github.com/advisories/GHSA-w7r7-r8r9-vrg2', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12203'} | null |
GHSA | GHSA-pj4j-287j-f742 | Cross-site Scripting in Contao | Contao before 4.5.7 has XSS in the system log. | {'CVE-2018-10125'} | 2022-02-10T20:49:48Z | 2022-02-10T20:49:48Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-10125', 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html', 'https://github.com/advisories/GHSA-pj4j-287j-f742'} | null |
GHSA | GHSA-c7j7-p5jq-26ff | Low severity vulnerability that affects passenger | Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. | {'CVE-2014-1831'} | 2021-12-03T14:11:35Z | 2018-10-10T17:29:20Z | LOW | 0 | null | {'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831'} | null |
GHSA | GHSA-m7mf-48hp-5qmr | Inappropriate implementation in V8 | CVE-2020-16009: Inappropriate implementation in V8
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
Google is aware of reports that exploits for CVE-2020-16009 exist in the wild.
Allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16009'} | 2021-01-04T15:52:32Z | 2020-12-02T18:28:47Z | HIGH | 8.8 | {'CWE-787'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html', 'https://security.gentoo.org/glsa/202011-12', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-m7mf-48hp-5qmr', 'http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html', 'https://crbug.com/1143772', 'https://www.debian.org/security/2021/dsa-4824', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/', 'https://github.com/advisories/GHSA-m7mf-48hp-5qmr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16009'} | null |
GHSA | GHSA-hxmr-5gv9-6p8v | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0575'} | 2022-02-24T13:06:38Z | 2022-02-15T00:02:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-hxmr-5gv9-6p8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d'} | null |
GHSA | GHSA-fm6q-97gw-c4wh | Secret exposure in Jenkins HashiCorp Vault Plugin | Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key. | {'CVE-2022-25186'} | 2022-02-24T13:55:25Z | 2022-02-16T00:01:28Z | MODERATE | 6.5 | {'CWE-693'} | {'https://github.com/advisories/GHSA-fm6q-97gw-c4wh', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25186'} | null |
GHSA | GHSA-v464-rcx7-j875 | Directory Traversal in infraserver | Affected versions of `infraserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16142'} | 2021-01-08T01:57:39Z | 2018-07-23T20:48:29Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver', 'https://github.com/advisories/GHSA-v464-rcx7-j875', 'https://nodesecurity.io/advisories/471', 'https://www.npmjs.com/advisories/471', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16142'} | null |
GHSA | GHSA-g3h8-cg9x-47qw | PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby | ### Impact
An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file.
Visitors without Panel access *cannot* use this attack vector.
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881).
### Credits
Thanks to Thore Imhof of Accenture for reporting the problem. | {'CVE-2020-26255'} | 2021-01-07T22:37:41Z | 2020-12-08T14:42:08Z | LOW | 6.8 | {'CWE-434'} | {'https://packagist.org/packages/getkirby/cms', 'https://packagist.org/packages/getkirby/panel', 'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://github.com/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'} | null |
GHSA | GHSA-qpwj-mvv7-v3m9 | High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2 | The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature. | {'CVE-2016-4464'} | 2021-06-17T19:02:08Z | 2018-10-18T16:57:10Z | HIGH | 0 | {'CWE-284'} | {'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6', 'http://www.openwall.com/lists/oss-security/2016/09/08/20', 'http://www.securitytracker.com/id/1036869', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/92905'} | null |
GHSA | GHSA-m38j-pmg3-v5x5 | Timing attack on django-basic-auth-ip-whitelist | ### Impact
Potential timing attack exists on websites where the basic authentication is used or configured, i.e. `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located.
Sites protected by IP address whitelisting only are unaffected by this vulnerability.
### Patches
This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package.
### Workarounds
Stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` in Django project settings.
### References
- [Django mailing list discussion](https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue at https://github.com/tm-kn/django-basic-auth-ip-whitelist/issues
* Email us at the email specified on the [security policy](https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/policy).
### Acknowledgements
Thanks to Thibaud Colas for reporting this. | {'CVE-2020-4071'} | 2022-04-19T19:02:29Z | 2020-06-23T19:58:27Z | LOW | 2.2 | {'CWE-208'} | {'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6', 'https://github.com/advisories/GHSA-m38j-pmg3-v5x5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4071', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/advisories/GHSA-m38j-pmg3-v5x5', 'https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ'} | null |
GHSA | GHSA-x6jv-5vfg-gm7x | Path traversal in ServcieCenter | Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0. | {'CVE-2021-21501'} | 2021-09-01T18:35:52Z | 2021-09-01T18:35:52Z | HIGH | 7.5 | {'CWE-22'} | {'http://www.openwall.com/lists/oss-security/2021/08/10/3', 'https://github.com/apache/servicecomb-service-center/pull/788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21501', 'https://github.com/advisories/GHSA-x6jv-5vfg-gm7x', 'https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E'} | null |
GHSA | GHSA-4rx9-58m7-gr8w | Malicious Package in css_transform_step | Version 1.0.6 of `css_transform_step` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.6 of this module is found installed you will want to replace it with a version before or after 1.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-01T19:53:40Z | 2020-09-01T19:53:40Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/623', 'https://github.com/advisories/GHSA-4rx9-58m7-gr8w'} | null |
GHSA | GHSA-cvcq-gmc3-q6m8 | Plain text storage of passwords in Apache Airflow | In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field. | {'CVE-2020-17511'} | 2020-12-17T21:00:56Z | 2020-12-17T21:00:56Z | MODERATE | 0 | {'CWE-312'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-17511', 'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665', 'https://github.com/advisories/GHSA-cvcq-gmc3-q6m8', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E'} | null |
GHSA | GHSA-mxr5-mc97-63rc | Account Takeover in Octobercms | ### Impact
An attacker can request an account password reset and then gain access to the account using a specially crafted request.
- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| {'CVE-2021-32648'} | 2022-02-23T22:21:06Z | 2021-08-30T16:13:02Z | HIGH | 8.2 | {'CWE-287'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/advisories/GHSA-mxr5-mc97-63rc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc'} | null |
GHSA | GHSA-9f8f-574q-8jmf | Manipulation of product reviews via API | ### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| {'CVE-2021-37707'} | 2021-08-30T16:14:00Z | 2021-08-30T16:14:00Z | MODERATE | 6.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-9f8f-574q-8jmf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | null |
GHSA | GHSA-cjw5-f2x5-r4q5 | Cross-site Scripting in TastyIgniter | TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS). | {'CVE-2022-0602'} | 2022-04-19T14:12:53Z | 2022-04-06T00:01:29Z | HIGH | 7.4 | {'CWE-79'} | {'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010', 'https://github.com/advisories/GHSA-cjw5-f2x5-r4q5', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'} | null |
GHSA | GHSA-6m8p-4fxj-pgc2 | OS Command Injection in mversion | The issue occurs because tagName user input is formatted inside the exec function is executed without any checks. | {'CVE-2020-7688'} | 2021-05-17T21:01:08Z | 2021-05-17T21:01:08Z | MODERATE | 7.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/418sec/huntr/pull/102', 'https://github.com/advisories/GHSA-6m8p-4fxj-pgc2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.