ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-7563-75j9-6h5p
Sensitive Information Exposure in Sylius
### Impact Any other user can view the data if the browser tab remains open after logging out. Once someone logs out and leaves the browser open, the potential attacker may use the back button to see the content exposed on given screens. No action may be performed though, and any website refresh will block further reads. It may, however, lead to a data leak, like for example customer details, payment gateway configuration, etc.- but only if these were pages checked by the administrator. This vulnerability requires full access to the computer to take advantage of it. ### Patches The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2 and above. ### Workarounds The application must strictly redirect to the login page even when the browser back button is pressed. Another possibility is to set more strict cache policies for restricted content (like no-store). It can be achieved with the following class: ```php <?php declare(strict_types=1); namespace App\EventListener; use App\SectionResolver\ShopCustomerAccountSubSection; use Sylius\Bundle\AdminBundle\SectionResolver\AdminSection; use Sylius\Bundle\CoreBundle\SectionResolver\SectionProviderInterface; use Symfony\Component\EventDispatcher\EventSubscriberInterface; use Symfony\Component\HttpKernel\Event\ResponseEvent; use Symfony\Component\HttpKernel\KernelEvents; final class CacheControlSubscriber implements EventSubscriberInterface { /** @var SectionProviderInterface */ private $sectionProvider; public function __construct(SectionProviderInterface $sectionProvider) { $this->sectionProvider = $sectionProvider; } public static function getSubscribedEvents(): array { return [ KernelEvents::RESPONSE => 'setCacheControlDirectives', ]; } public function setCacheControlDirectives(ResponseEvent $event): void { if ( !$this->sectionProvider->getSection() instanceof AdminSection && !$this->sectionProvider->getSection() instanceof ShopCustomerAccountSubSection ) { return; } $response = $event->getResponse(); $response->headers->addCacheControlDirective('no-cache', true); $response->headers->addCacheControlDirective('max-age', '0'); $response->headers->addCacheControlDirective('must-revalidate', true); $response->headers->addCacheControlDirective('no-store', true); } } ``` After that register service in the container: ```yaml services: App\EventListener\CacheControlSubscriber: arguments: ['@sylius.section_resolver.uri_based_section_resolver'] tags: - { name: kernel.event_subscriber, event: kernel.response } ``` The code above requires changes in `ShopUriBasedSectionResolver` in order to work. To backport mentioned logic, you need to replace the `Sylius\Bundle\ShopBundle\SectionResolver\ShopUriBasedSectionResolver` class with: ```php <?php declare(strict_types=1); namespace App\SectionResolver; use Sylius\Bundle\CoreBundle\SectionResolver\SectionInterface; use Sylius\Bundle\CoreBundle\SectionResolver\UriBasedSectionResolverInterface; use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection; final class ShopUriBasedSectionResolver implements UriBasedSectionResolverInterface { /** @var string */ private $shopCustomerAccountUri; public function __construct(string $shopCustomerAccountUri = 'account') { $this->shopCustomerAccountUri = $shopCustomerAccountUri; } public function getSection(string $uri): SectionInterface { if (str_contains($uri, $this->shopCustomerAccountUri)) { return new ShopCustomerAccountSubSection(); } return new ShopSection(); } } ``` ```yaml services: sylius.section_resolver.shop_uri_based_section_resolver: class: App\SectionResolver\ShopUriBasedSectionResolver tags: - { name: sylius.uri_based_section_resolver, priority: -10 } ``` You also need to define a new subsection for the Customer Account that is used in the above services: ```php <?php declare(strict_types=1); namespace App\SectionResolver; use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection; class ShopCustomerAccountSubSection extends ShopSection { } ``` ### References * Originally published at https://huntr.dev/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at security@sylius.com
{'CVE-2022-24742'}
2022-03-18T13:11:43Z
2022-03-14T22:26:58Z
MODERATE
5
{'CWE-200', 'CWE-213'}
{'https://github.com/Sylius/Sylius/security/advisories/GHSA-7563-75j9-6h5p', 'https://github.com/advisories/GHSA-7563-75j9-6h5p', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24742', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}
null
GHSA
GHSA-vrv8-v4w8-f95h
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic. ### Workarounds The workarounds available are: - upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1 or - enable the media plugin, which overrides the default parsing behaviour for iframes or - add the following workaround to update the parsing schema rules for iframes: #### Example: Change the default schema for iframes ```js setup: function(editor) { editor.on('PreInit', function() { editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi; }); } ``` ### Acknowledgements Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2020-11-13T17:56:38Z
2020-08-11T14:55:01Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-vrv8-v4w8-f95h', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}
null
GHSA
GHSA-6239-28c2-9mrm
Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault
HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.
{'CVE-2021-38554'}
2021-10-21T14:19:31Z
2021-08-30T17:22:38Z
MODERATE
5.3
{'CWE-212'}
{'https://github.com/hashicorp/vault/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38554', 'https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166', 'https://github.com/advisories/GHSA-6239-28c2-9mrm', 'https://github.com/hashicorp/vault/releases/tag/v1.7.4'}
null
GHSA
GHSA-5p26-hw7f-3cpr
Cross-Site Scripting in html-pages
All versions of `html-pages` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize folder names, allowing attackers to execute arbitrary JavaScript in the victim's browser through folders with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2018-16481'}
2021-09-16T20:40:23Z
2019-02-07T18:14:44Z
HIGH
0
{'CWE-64', 'CWE-79'}
{'https://www.npmjs.com/advisories/1001', 'https://github.com/advisories/GHSA-5p26-hw7f-3cpr', 'https://hackerone.com/reports/330356', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16481'}
null
GHSA
GHSA-q9vw-wr57-xjv3
Information Exposure in Heketi
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
{'CVE-2017-15104'}
2022-04-12T22:38:47Z
2022-02-15T01:57:18Z
HIGH
7.8
{'CWE-200', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15104', 'https://access.redhat.com/errata/RHSA-2017:3481', 'https://github.com/heketi/heketi/releases/tag/v5.0.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1510149', 'https://access.redhat.com/security/cve/CVE-2017-15104', 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00', 'https://github.com/advisories/GHSA-q9vw-wr57-xjv3'}
null
GHSA
GHSA-5x92-p4p5-33c4
Path Traversal in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.
{'CVE-2020-28348'}
2022-04-12T22:55:54Z
2022-02-15T01:57:18Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/hashicorp/nomad/issues/9303', 'https://github.com/hashicorp/nomad/pull/9321', 'https://github.com/advisories/GHSA-5x92-p4p5-33c4', 'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0128-november-10-2020', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28348', 'https://discuss.hashicorp.com/t/nomad-0-12-8-0-11-7-and-0-10-8-released/17491'}
null
GHSA
GHSA-gmr7-m73x-6c9q
Missing Authorization in TeamPass
Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.
{'CVE-2020-11671'}
2021-07-26T21:22:13Z
2021-07-26T21:22:13Z
HIGH
8.1
{'CWE-862'}
{'https://github.com/nilsteampassnet/TeamPass/issues/2765', 'https://github.com/advisories/GHSA-gmr7-m73x-6c9q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11671'}
null
GHSA
GHSA-36xw-hgfv-jwm7
Uninitialized memory drop in arr
An issue was discovered in the arr crate through 2020-08-25 for Rust. Uninitialized memory is dropped by Array::new_from_template.
{'CVE-2020-35888'}
2021-08-25T20:48:36Z
2021-08-25T20:48:36Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/advisories/GHSA-36xw-hgfv-jwm7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35888', 'https://github.com/sjep/array/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'}
null
GHSA
GHSA-wxr6-29pv-ch68
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4164'}
2022-01-21T23:44:17Z
2022-01-21T23:44:17Z
HIGH
7.6
{'CWE-352'}
{'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30', 'https://github.com/advisories/GHSA-wxr6-29pv-ch68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164', 'https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758'}
null
GHSA
GHSA-v666-6w97-pcwm
Miner fails to get block template when a cell used as a cell dep has been destroyed.
### Impact The RPC `get_block_template` fails when a cell has been used as a cell dep and an input in the different transactions. Say cell C is used as a dep group in the transaction A, and is destroyed in the transaction B. The node adds transaction A first, then B into the transaction pool. They are both valid. But when generating the block template, if the fee rate of B is higher, it comes before A, which will invalidate A. Currently the RPC `get_block_template` will fail instead of dropping A. ### Patch First, the `get_block_template` should not fail but dropping the conflict transactions. Then we can propose solution to this issue. Here is an example. When a transaction is added to the pool, the pool must consider it depending on all the transactions which dep cell (direct or indirect via dep group) has been destroyed in this transaction. Because future transactions using the destroyed cells as dep will be rejected, the spending transaction only need to wait for all the existing dep transactions on chain. ### Workaround 1. Submit transaction B when A is already on chain. 2. Let B depend on A explicitly, there are several solutions: * a. Add any output cell on A as a dep cell or input in B. * b. Merge A and B. CKB allows using the same cell as both dep and input in the same transaction. 3. Ensure the fee rate of B is less than A so A always has higher priority.
null
2022-04-19T19:02:43Z
2021-08-25T21:01:21Z
HIGH
0
{'CWE-367'}
{'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-v666-6w97-pcwm', 'https://github.com/advisories/GHSA-v666-6w97-pcwm'}
null
GHSA
GHSA-h4mc-r4f4-hcf4
Downloads Resources over HTTP in selenium-binaries
Affected versions of `selenium-binaries` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`. ## Recommendation No fix is currently available for this vulnerability. The best mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js.
{'CVE-2016-10589'}
2021-01-08T18:44:02Z
2019-02-18T23:34:37Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10589', 'https://nodesecurity.io/advisories/175', 'https://github.com/advisories/GHSA-h4mc-r4f4-hcf4', 'https://www.npmjs.com/advisories/175'}
null
GHSA
GHSA-f3w5-v9xx-rp8p
Signature verification failure in Tendermint
_The root cause of this security vulnerability is in the Tendermint specification, and this advisory is a duplicate of https://github.com/tendermint/spec/security/advisories/GHSA-jqfc-687g-59pw._ ### Impact Tendermint light clients running versions 0.34.0 to 0.34.8 are unable to detect and punish a new kind of attack. We’re calling this a “forward lunatic attack,” or FLA. The severity of this vulnerability is _moderate_. Note that an FLA cannot be successfully executed unless there are already ⅓+ Byzantine validators, and therefore outside of Tendermint’s security model; however, it is important to be able to detect and punish these kinds of attacks in order to incentivize correct behavior. In an FLA, an attacking validator (with ⅓+ voting power) signs commit messages for arbitrary application state associated with a block height that hasn’t been seen yet, hence the name “forward lunatic attacks.” A malicious validator effectively executes a [lunatic attack](https://docs.tendermint.com/master/spec/light-client/accountability/#the-misbehavior-of-faulty-validators), but signs messages for a target block that is higher than the current block. This can be dangerous: Typically, misbehavior evidence is only created when there are conflicting blocks at the same height, but by targeting a block height that is far “ahead” of the current chain height, it’s possible that the chain will not produce a (conflicting) block at the target height in time to create evidence. Prior to Tendermint v0.34.9, the light client could accept a bad header from its primary witness, and would not be able to form evidence of this deception, even if all the secondary witnesses were correct. Because the light client is responsible for verifying cross-chain state for IBC, a successful FLA could result in loss of funds. However, it is important to note that FLAs are only possible outside the Tendermint security model. All FLAs, attempted and successful, leave traces of provable misbehavior on-chain. A faulty header contains signatures from the faulty validator, and even in unpatched versions of Tendermint Core, networks could use social consensus (off-chain action) to recover the network. The patches introduced in Tendermint Core v0.34.9 handle all evidence automatically and on-chain. Note that this fix also allows for successful automatic reporting of FLAs, even after a chain halt. By adding a time to FetchBlock, light clients effectively have a backup way to determine if a halted chain should have continued, and it will be able to submit evidence as soon as the chain resumes. ### Patches This problem has been patched in Tendermint Core v0.34.9. ### Workarounds There are no workarounds. All users are recommended to upgrade to Tendermint Core v0.34.9 at their earliest possible convenience. ### Credits Thank you to @MaximilianDiez for originally surfacing this issue, and to @cmwaters, @josef-widder, and @milosevic for creating fixes at both the implementation and specification level. ### For more information If you have any questions or comments about this advisory: * Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) * Email us at [security@tendermint.com](mailto:security@tendermint.com)
null
2022-04-19T19:02:54Z
2021-12-20T18:17:41Z
MODERATE
0
{'CWE-347'}
{'https://github.com/tendermint/tendermint/security/advisories/GHSA-f3w5-v9xx-rp8p', 'https://github.com/advisories/GHSA-f3w5-v9xx-rp8p'}
null
GHSA
GHSA-9vxc-g2jx-qj3p
API Admin Auth Weakness in tomato
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests. ## Details The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access. Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key. ## Proof of Concept This is the snippet of code that does the comparison to authorize requests. ``` if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) { ``` For an access_key that is set to anything that includes the letter 'a' the following request would be authorized. ``` $ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a" { "cmd": "ls", "path": ".", "stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n", "stderr": "" } ``` ## Recommendation Update to version 0.0.6 or later.
{'CVE-2013-7379'}
2021-09-23T21:00:30Z
2020-08-31T22:59:07Z
CRITICAL
0
{'CWE-287'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/38', 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://github.com/advisories/GHSA-9vxc-g2jx-qj3p', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-9959-c6q6-6qp3
Moderate severity vulnerability that affects validator
**Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q
null
2021-12-02T22:31:42Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-9959-c6q6-6qp3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}
null
GHSA
GHSA-m4h3-7mc2-v295
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
{'CVE-2020-35214'}
2022-01-04T19:00:34Z
2021-12-17T20:41:21Z
HIGH
8.1
null
{'https://github.com/advisories/GHSA-m4h3-7mc2-v295', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214', 'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing'}
null
GHSA
GHSA-gmjp-776j-2394
Malicious Package in ripmed160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:57Z
2020-09-03T17:04:24Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1405', 'https://github.com/advisories/GHSA-gmjp-776j-2394'}
null
GHSA
GHSA-x84v-xcm2-53pg
Moderate severity vulnerability that affects requests
The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
{'CVE-2018-18074'}
2021-09-21T22:17:47Z
2018-10-29T19:06:46Z
HIGH
7.5
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18074', 'https://usn.ubuntu.com/3790-1/', 'https://usn.ubuntu.com/3790-2/', 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff', 'https://github.com/requests/requests/issues/4716', 'https://bugs.debian.org/910766', 'https://access.redhat.com/errata/RHSA-2019:2035', 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history', 'https://github.com/requests/requests/pull/4718', 'https://github.com/advisories/GHSA-x84v-xcm2-53pg', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html'}
null
GHSA
GHSA-f77h-m9w2-vvg2
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4017'}
2021-12-03T20:38:57Z
2021-12-03T20:38:57Z
HIGH
8.8
{'CWE-352'}
{'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/advisories/GHSA-f77h-m9w2-vvg2', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'}
null
GHSA
GHSA-h395-qcrw-5vmq
Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin
This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
{'CVE-2020-28483'}
2021-06-23T17:53:21Z
2021-06-23T17:53:21Z
HIGH
7.1
{'CWE-113', 'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28483', 'https://github.com/gin-gonic/gin/pull/2474%23issuecomment-729696437', 'https://github.com/gin-gonic/gin/pull/2632', 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0', 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736', 'https://github.com/advisories/GHSA-h395-qcrw-5vmq'}
null
GHSA
GHSA-whr9-vfh2-7hm6
Memory corruption in `DrawBoundingBoxesV2`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: ```python import tensorflow as tf images = tf.fill([10, 96, 0, 1], 0.) boxes = tf.fill([10, 53, 0], 0.) colors = tf.fill([0, 1], 0.) tf.raw_ops.DrawBoundingBoxesV2(images=images, boxes=boxes, colors=colors) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption: ```cc const auto tboxes = boxes.tensor<T, 3>(); for (int64 bb = 0; bb < num_boxes; ++bb) { ... const int64 min_box_row = static_cast<float>(tboxes(b, bb, 0)) * (height - 1); const int64 max_box_row = static_cast<float>(tboxes(b, bb, 2)) * (height - 1); const int64 min_box_col = static_cast<float>(tboxes(b, bb, 1)) * (width - 1); const int64 max_box_col = static_cast<float>(tboxes(b, bb, 3)) * (width - 1); ... } ``` If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices. ### Patches We have patched the issue in GitHub commit [79865b542f9ffdc9caeb255631f7c56f1d4b6517](https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29571'}
2021-05-21T14:25:28Z
2021-05-21T14:25:28Z
MODERATE
4.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29571', 'https://github.com/advisories/GHSA-whr9-vfh2-7hm6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'}
null
GHSA
GHSA-97wf-p777-86jq
Division by zero in TFLite's implementation of Split
### Impact The implementation of the `Split` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65): ```cc TF_LITE_ENSURE_MSG(context, input_size % num_splits == 0, "Not an even split"); const int slice_size = input_size / num_splits; ``` An attacker can craft a model such that `num_splits` would be 0. ### Patches We have patched the issue in GitHub commit [b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d](https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29599'}
2021-05-21T14:28:01Z
2021-05-21T14:28:01Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-97wf-p777-86jq', 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29599'}
null
GHSA
GHSA-vwfg-qj3r-6v3r
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
null
2021-12-03T14:24:04Z
2018-09-17T21:57:47Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'https://github.com/advisories/GHSA-vwfg-qj3r-6v3r'}
null
GHSA
GHSA-3f95-r44v-8mrg
Command injection in simple-git
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
{'CVE-2022-24433'}
2022-03-24T13:45:19Z
2022-03-12T00:00:33Z
HIGH
8.1
{'CWE-74', 'CWE-77'}
{'https://github.com/advisories/GHSA-3f95-r44v-8mrg', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245', 'https://github.com/steveukx/git-js/pull/767', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199', 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'}
null
GHSA
GHSA-387v-84cv-9qmc
Moderate severity vulnerability that affects org.apache.solr:solr-core
When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.
{'CVE-2017-3163'}
2021-08-31T20:52:26Z
2018-10-18T16:40:43Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-3163', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-387v-84cv-9qmc', 'https://www.debian.org/security/2018/dsa-4124', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://access.redhat.com/errata/RHSA-2018:1448'}
null
GHSA
GHSA-9fp7-4fjm-q3mf
Prototype Pollution in keyget
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
{'CVE-2021-23760'}
2022-02-01T00:51:01Z
2022-02-01T00:51:01Z
MODERATE
5.6
{'CWE-1321'}
{'https://github.com/advisories/GHSA-9fp7-4fjm-q3mf', 'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760', 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624'}
null
GHSA
GHSA-qmw8-3v4g-gwj4
Prefix escape
### Impact By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) ### Patches A patch have been submitted by Corey Farrell git@cfware.com, the reporter. All releases after v4.0.2 include the fix. ### Workarounds There are no workaround available. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-21321'}
2021-03-03T17:50:05Z
2021-03-03T01:52:05Z
CRITICAL
10
{'CWE-20'}
{'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
null
GHSA
GHSA-h9mj-fghc-664w
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead. ``` var mqttp = require('mqtt-packet'); var packets = []; for(var i=0; i<=1000;i++){ packets.push( mqttp.generate({ cmd:'publish', topic:Buffer.from('hello'), payload:Buffer.from('world'), retain: false, dup: false, messageId: ++i, qos: 1 }) ) } ``` ## Recommendation Update to version 2.15.0 or later.
{'CVE-2017-10910'}
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
MODERATE
6.5
{'CWE-674'}
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://jvn.jp/en/jp/JVN45494523/index.html'}
null
GHSA
GHSA-v592-xf75-856p
Erroneous Proof of Work calculation in geth
### Impact An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. ### Patches This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
{'CVE-2020-26240'}
2022-04-19T19:02:40Z
2021-06-29T21:12:56Z
MODERATE
5.3
{'CWE-682'}
{'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240', 'https://github.com/advisories/GHSA-v592-xf75-856p', 'https://github.com/ethereum/go-ethereum/pull/21793'}
null
GHSA
GHSA-4cx6-fj7j-pjx9
Code injection in Stripe CLI on windows
### Impact A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run. There has been no evidence of exploitation of this vulnerability. ### Recommendation Upgrade to Stripe CLI v1.7.13. ### Acknowledgments Thanks to [trungpabc](https://hackerone.com/trungpabc) for reporting the issue. ### For more information Email us at [security@stripe.com](mailto:security@stripe.com).
{'CVE-2022-24753'}
2022-03-18T21:10:50Z
2022-03-10T18:17:50Z
HIGH
7.7
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24753', 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9', 'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd', 'https://github.com/advisories/GHSA-4cx6-fj7j-pjx9'}
null
GHSA
GHSA-356r-77q8-f64f
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
{'CVE-2021-3819'}
2021-10-04T13:58:41Z
2021-09-29T17:12:37Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/advisories/GHSA-356r-77q8-f64f', 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5'}
null
GHSA
GHSA-38fc-9xqv-7f7q
Moderate severity vulnerability that affects SQLAlchemy
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
{'CVE-2019-7548'}
2021-11-08T18:48:32Z
2019-04-16T15:50:39Z
HIGH
7.8
{'CWE-89'}
{'https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://github.com/advisories/GHSA-38fc-9xqv-7f7q', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:0981', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7548', 'https://github.com/no-security/sqlalchemy_test'}
null
GHSA
GHSA-5w9c-rv96-fr7g
Removal of functional code in faker.js
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8). The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker).
null
2022-03-23T16:01:20Z
2022-03-22T19:28:24Z
HIGH
0
null
{'https://github.com/advisories/GHSA-5w9c-rv96-fr7g', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://www.npmjs.com/package/@faker-js/faker', 'https://www.npmjs.com/package/faker', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
null
GHSA
GHSA-c7f6-4vx5-4263
Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files.
{'CVE-2020-15839'}
2022-02-10T20:46:21Z
2022-02-10T20:46:21Z
MODERATE
6.5
{'CWE-434'}
{'https://github.com/advisories/GHSA-c7f6-4vx5-4263', 'https://issues.liferay.com/browse/LPE-17029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839', 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928', 'https://portal.liferay.dev/learn/security/known-vulnerabilities', 'https://issues.liferay.com/browse/LPE-17055'}
null
GHSA
GHSA-v7wg-cpwc-24m4
Unchecked Class Instantiation when providing Plugin Classes
pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property).
{'CVE-2022-21724'}
2022-04-17T16:42:44Z
2022-02-02T00:04:20Z
HIGH
7
{'CWE-665', 'CWE-668', 'CWE-74'}
{'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://github.com/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/', 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}
null
GHSA
GHSA-qrwc-jxf5-g8x6
Out of bounds read in ordnung
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via out-of-bounds access for large capacity.
{'CVE-2020-35890'}
2021-08-25T20:48:40Z
2021-08-25T20:48:40Z
HIGH
7.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35890', 'https://github.com/maciejhirsz/ordnung/issues/8', 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html', 'https://github.com/advisories/GHSA-qrwc-jxf5-g8x6'}
null
GHSA
GHSA-738m-f33v-qc2r
SMTP Injection in PHPMailer
### Impact Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts. ### Patches Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0). ### Workarounds Manually strip line breaks from email addresses before passing them to PHPMailer. ### References https://nvd.nist.gov/vuln/detail/CVE-2015-8476 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2015-8476'}
2021-08-19T19:39:12Z
2020-03-05T22:09:19Z
LOW
0
{'CWE-20'}
{'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'http://www.securityfocus.com/bid/78619', 'https://github.com/advisories/GHSA-738m-f33v-qc2r', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
null
GHSA
GHSA-fqrr-rrwg-69pv
Low severity vulnerability that affects paratrooper-pingdom
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
{'CVE-2014-1233'}
2021-09-10T18:45:30Z
2017-10-24T18:33:36Z
LOW
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-fqrr-rrwg-69pv', 'http://openwall.com/lists/oss-security/2014/01/08/1', 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'}
null
GHSA
GHSA-mmj4-777p-fpq9
Validation bypass in frourio-express
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。 ### さらなる情報 このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。 * [frourio](https://github.com/frouriojs/frourio)にIssueを開く。 ## English ### Impact Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives) ### Patches Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project. ### Workarounds Validate objects from request with class-transformer in controllers by yourself, or prevent using validators. ### For more information If you have any questions or comments about this advisory: * Open an issue in [frourio](https://github.com/frouriojs/frourio)
{'CVE-2022-23624'}
2022-04-19T19:03:22Z
2022-02-07T22:38:37Z
HIGH
8.1
{'CWE-20'}
{'https://github.com/advisories/GHSA-mmj4-777p-fpq9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9'}
null
GHSA
GHSA-q97v-764g-r2rp
High severity vulnerability that affects gollum and gollum-lib
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.
{'CVE-2014-9489'}
2021-09-16T19:42:57Z
2017-11-16T01:47:37Z
HIGH
8.8
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9489', 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.securityfocus.com/bid/71499', 'https://github.com/gollum/gollum/issues/913', 'http://www.openwall.com/lists/oss-security/2015/01/03/19'}
null
GHSA
GHSA-fq42-c5rg-92c2
Vulnerable dependencies in Nokogiri
### Summary Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies: - vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news) - vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome.org/sources/libxslt/1.1/libxslt-1.1.35.news) Those library versions address the following upstream CVEs: - libxslt: [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) (CVSS 8.8, High severity) - libxml2: [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) (Unspecified severity, see more information below) Those library versions also address numerous other issues including performance improvements, regression fixes, and bug fixes, as well as memory leaks and other use-after-free issues that were not assigned CVEs. Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.2`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements. ### Mitigation Upgrade to Nokogiri `>= 1.13.2`. Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link an older version Nokogiri against external libraries libxml2 `>= 2.9.13` and libxslt `>= 1.1.35`, which will also address these same CVEs. ### Impact #### libxslt [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) - CVSS3 score: 8.8 (High) - Fixed by https://gitlab.gnome.org/GNOME/libxslt/-/commit/50f9c9c All versions of libxslt prior to v1.1.35 are affected. Applications using **untrusted** XSL stylesheets to transform XML are vulnerable to a denial-of-service attack and should be upgraded immediately. #### libxml2 [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) - As of the time this security advisory was published, there is no officially published information available about this CVE's severity. The above NIST link does not yet have a published record, and the libxml2 maintainer has declined to provide a severity score. - Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/652dd12 - Further explanation is at https://mail.gnome.org/archives/xml/2022-February/msg00015.html The upstream commit and the explanation linked above indicate that an application may be vulnerable to a denial of service, memory disclosure, or code execution if it parses an **untrusted** document with parse options `DTDVALID` set to true, and `NOENT` set to false. An analysis of these parse options: - While `NOENT` is off by default for Document, DocumentFragment, Reader, and Schema parsing, it is on by default for XSLT (stylesheet) parsing in Nokogiri v1.12.0 and later. - `DTDVALID` is an option that Nokogiri does not set for any operations, and so this CVE applies only to applications setting this option explicitly. It seems reasonable to assume that any application explicitly setting the parse option `DTDVALID` when parsing **untrusted** documents is vulnerable and should be upgraded immediately.
null
2022-02-26T01:06:54Z
2022-02-25T20:32:09Z
HIGH
0
{'CWE-416'}
{'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2', 'https://github.com/advisories/GHSA-fq42-c5rg-92c2'}
null
GHSA
GHSA-mf6x-7mm4-x2g7
Out-of-bounds Read in stringstream
All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to `stringstream`.
{'CVE-2018-21270'}
2021-03-19T20:59:52Z
2019-06-20T18:22:32Z
MODERATE
0
{'CWE-125'}
{'https://hackerone.com/reports/321670', 'https://github.com/advisories/GHSA-mf6x-7mm4-x2g7', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32'}
null
GHSA
GHSA-4vmm-mhcq-4x9j
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. ## Recommendation Update to version 3.1.1 or later.
null
2021-08-16T16:06:39Z
2019-06-14T16:15:14Z
CRITICAL
10
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://github.com/advisories/GHSA-4vmm-mhcq-4x9j', 'https://www.npmjs.com/advisories/568', 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://nodesecurity.io/advisories/568'}
null
GHSA
GHSA-q65m-pv3f-wr5r
XSS in Bleach when noscript and raw tag whitelisted
### Impact A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option. ### Patches v3.1.1 ### Workarounds * modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags: ``` title textarea script style noembed noframes iframe xmp ``` * A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk. ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1615315 * https://cure53.de/fp170.pdf * https://nvd.nist.gov/vuln/detail/CVE-2020-6802 * https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach ### Credits * Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues) * Email us at [security@mozilla.org](mailto:security@mozilla.org)
{'CVE-2020-6802'}
2021-08-19T17:32:15Z
2020-02-24T17:33:44Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd', 'https://github.com/advisories/GHSA-q65m-pv3f-wr5r', 'https://cure53.de/fp170.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://advisory.checkmarx.net/advisory/CX-2020-4276', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'}
null
GHSA
GHSA-crh4-294p-vcfq
Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17
Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2021-31405
null
2021-10-08T21:22:03Z
2021-04-19T14:53:20Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-crh4-294p-vcfq', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq', 'https://vaadin.com/security/cve-2021-31405'}
null
GHSA
GHSA-v66p-w7qx-wv98
Authentication Bypass in express-laravel-passport
All versions of `express-laravel-passport` are vulnerable to an Authentication Bypass. The package fails to properly validate JWTs, allowing attackers to send HTTP requests impersonating other users. ## Recommendation Upgrade to version 2.0.5 or later.
null
2021-10-04T20:46:56Z
2020-09-04T17:29:34Z
CRITICAL
0
{'CWE-287'}
{'https://www.npmjs.com/advisories/1450', 'https://hackerone.com/reports/748214', 'https://github.com/advisories/GHSA-v66p-w7qx-wv98'}
null
GHSA
GHSA-g25h-jr74-qp5j
Incomplete validation in `QuantizeV2`
### Impact Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays: ```python import tensorflow as tf tf.raw_ops.QuantizeV2( input=[1,2,3], min_range=[1,2], max_range=[], T=tf.qint32, mode='SCALED', round_mode='HALF_AWAY_FROM_ZERO', narrow_range=False, axis=1, ensure_minimum_range=3) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. ### Patches We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37663'}
2021-08-25T14:42:23Z
2021-08-25T14:42:23Z
HIGH
7.8
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://github.com/advisories/GHSA-g25h-jr74-qp5j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663'}
null
GHSA
GHSA-m2q3-53fq-7h66
Moderate severity vulnerability that affects gollum
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
{'CVE-2015-7314'}
2021-09-14T22:05:23Z
2018-08-28T22:33:51Z
MODERATE
0
{'CWE-200'}
{'https://github.com/gollum/gollum/issues/1070', 'http://www.openwall.com/lists/oss-security/2015/09/22/12', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66'}
null
GHSA
GHSA-qc55-vm3j-74gp
JSNAPy allows unprivileged local users to alter files under the directory
JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.
{'CVE-2018-0023'}
2022-04-26T18:07:44Z
2018-07-12T20:30:36Z
MODERATE
5.5
{'CWE-276'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-0023', 'https://kb.juniper.net/JSA10856', 'http://www.securityfocus.com/bid/103745', 'https://github.com/advisories/GHSA-qc55-vm3j-74gp'}
null
GHSA
GHSA-gpfj-4j6g-c4w9
Clipboard-based DOM-XSS
### Impact A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**. ```typescript function generateText(transfer: DataTransfer): string | undefined { if (Array.from(transfer.types).indexOf('text/html') === -1) return let html = transfer.getData('text/html') if (!/<table/i.test(html)) return html = html.replace(/<meta.*?>/, '') const el = document.createElement('div') el.innerHTML = html const tables = el.querySelectorAll('table') for (const table of tables) { if (table.closest('[data-paste-markdown-skip]')) { table.replaceWith(new Text(table.textContent || '')) } const formattedTable = tableMarkdown(table) table.replaceWith(new Text(formattedTable)) } return el.innerHTML } ``` ### Patches A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4). ### Workarounds A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers. <!-- ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) * -->
{'CVE-2021-37700'}
2022-04-19T19:03:05Z
2021-08-12T20:42:17Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://www.npmjs.com/package/@github/paste-markdown', 'https://github.com/advisories/GHSA-gpfj-4j6g-c4w9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4'}
null
GHSA
GHSA-hfvc-g252-rp4g
Denial of Service in i18n
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
{'CVE-2020-7791'}
2021-05-10T15:32:30Z
2020-12-14T19:50:22Z
MODERATE
7.5
{'CWE-20', 'CWE-400'}
{'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-hfvc-g252-rp4g', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E'}
null
GHSA
GHSA-38h8-x697-gh8q
Tmp files readable by other users in sync-exec
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user. ## Recommendation There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively. The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.
{'CVE-2017-16024'}
2021-01-08T20:02:12Z
2018-11-09T17:45:30Z
MODERATE
0
{'CWE-377'}
{'https://github.com/gvarsanyi/sync-exec/issues/17', 'https://www.npmjs.com/advisories/310', 'https://cwe.mitre.org/data/definitions/377.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024', 'https://github.com/advisories/GHSA-38h8-x697-gh8q', 'https://nodesecurity.io/advisories/310', 'https://www.owasp.org/index.php/Insecure_Temporary_File'}
null
GHSA
GHSA-6qc7-jgq7-34rf
Malicious Package in exprss
All versions of `exprss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:02:33Z
2020-09-02T20:18:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/851', 'https://github.com/advisories/GHSA-6qc7-jgq7-34rf'}
null
GHSA
GHSA-x64g-wjmw-w328
Moderate severity vulnerability that affects ironic-discoverd
OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.
{'CVE-2015-5306'}
2021-09-21T22:14:37Z
2019-07-05T21:10:52Z
MODERATE
0
null
{'https://bugs.launchpad.net/ironic-inspector/+bug/1506419', 'https://access.redhat.com/errata/RHSA-2015:1929', 'http://rhn.redhat.com/errata/RHSA-2015-2685.html', 'https://github.com/advisories/GHSA-x64g-wjmw-w328', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5306', 'https://bugzilla.redhat.com/show_bug.cgi?id=1273698'}
null
GHSA
GHSA-qh3m-qw6v-qvhg
Moderate severity vulnerability that affects io.vertx:vertx-core
In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema.
{'CVE-2018-12544'}
2021-01-08T01:58:37Z
2018-10-17T16:20:32Z
MODERATE
0
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-12544', 'https://github.com/vert-x3/vertx-web/issues/1021', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568', 'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg', 'https://access.redhat.com/errata/RHSA-2018:2946'}
null
GHSA
GHSA-p68v-frgx-4rjp
Denial of Service via Cache Flooding
### Impact Denial of Service via Cache Flooding ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
null
2021-09-21T16:32:48Z
2020-10-19T21:34:14Z
LOW
0
{'CWE-400'}
{'https://github.com/shopware/platform/security/advisories/GHSA-p68v-frgx-4rjp', 'https://github.com/advisories/GHSA-p68v-frgx-4rjp'}
null
GHSA
GHSA-pxcf-v868-m492
Injection and Cross-site Scripting in osm-static-maps
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
{'CVE-2020-7749'}
2021-08-02T15:31:50Z
2021-05-10T18:43:45Z
HIGH
7.6
{'CWE-74', 'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://github.com/advisories/GHSA-pxcf-v868-m492', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749'}
null
GHSA
GHSA-9prh-257w-9277
Cross-Site Scripting in handlebars
Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted. ## Proof of Concept Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 4.0.0 or later. Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes.
{'CVE-2015-8861'}
2021-09-08T20:16:46Z
2018-10-23T17:20:12Z
MODERATE
6.1
{'CWE-79'}
{'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/', 'https://github.com/wycats/handlebars.js/pull/1083', 'https://github.com/advisories/GHSA-9prh-257w-9277', 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861', 'https://www.tenable.com/security/tns-2016-18', 'https://www.npmjs.com/advisories/61', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'http://www.securityfocus.com/bid/96434'}
null
GHSA
GHSA-jgpq-g82g-6c39
confinit vulnerable to prototype pollution
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7638'}
2021-07-28T23:16:45Z
2020-04-07T15:52:05Z
MODERATE
5.3
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://github.com/advisories/GHSA-jgpq-g82g-6c39', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab', 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433'}
null
GHSA
GHSA-rfmf-rx8w-935w
High severity vulnerability that affects sounder
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
{'CVE-2013-5647'}
2021-09-17T17:46:05Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-5647', 'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html', 'https://github.com/advisories/GHSA-rfmf-rx8w-935w'}
null
GHSA
GHSA-fj58-h2fr-3pp2
SQL Injection and Cross-site Scripting in class-validator
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
{'CVE-2019-18413'}
2021-11-12T18:14:47Z
2021-10-12T16:35:45Z
MODERATE
9.8
{'CWE-89', 'CWE-79'}
{'https://github.com/typestack/class-validator#passing-options', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413', 'https://github.com/advisories/GHSA-fj58-h2fr-3pp2', 'https://github.com/typestack/class-validator/issues/438', 'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471'}
null
GHSA
GHSA-96jq-75wh-2658
Moderate severity vulnerability that affects apache axis
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
{'CVE-2018-8032'}
2021-11-17T21:27:30Z
2018-10-16T20:51:15Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E', 'https://issues.apache.org/jira/browse/AXIS-2924', 'https://github.com/advisories/GHSA-96jq-75wh-2658', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-4jg2-84c2-pj95
Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina
### Impact Anyone who is using the default presets and/or does not handle the functionality themself. ### Patches It has not been patched yet. ### Workarounds Fully custom presets that change the entire rendering process which can then escape the user input. ### For more information Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity. ```ts const jsonSchemaDoc = { $id: 'CustomClass', type: 'object', properties: { 'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' }, } }; generator = new TypeScriptGenerator( { presets: [ { class: { property({ propertyName, content }) { return `private ${propertyName}: any;`; }, ctor() { return ''; }, getter() { return ''; }, setter() { return ''; } } } ] } ); const inputModel = await generator.process(jsonSchemaDoc); ``` This would render ```ts export class CustomClass { private property: any; constructor(){console.log("injected")} private _temp: any; private additionalProperties: any; } ```
null
2022-04-19T19:03:07Z
2021-09-21T18:41:59Z
CRITICAL
0
{'CWE-94'}
{'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95', 'https://github.com/advisories/GHSA-4jg2-84c2-pj95'}
null
GHSA
GHSA-8w74-g84v-c5w8
Directory Traversal in chatbyvista
Affected versions of `chatbyvista` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16177'}
2021-01-14T15:38:40Z
2020-09-01T18:52:26Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16177', 'https://github.com/advisories/GHSA-8w74-g84v-c5w8', 'https://www.npmjs.com/advisories/462', 'https://nodesecurity.io/advisories/462'}
null
GHSA
GHSA-jjhw-5mxp-2g2q
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.
{'CVE-2021-25933'}
2021-05-28T22:27:51Z
2021-05-25T18:47:01Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/advisories/GHSA-jjhw-5mxp-2g2q', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'}
null
GHSA
GHSA-gvcj-pfq2-wxj7
High severity vulnerability that affects electron
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
{'CVE-2016-1202'}
2021-09-13T12:46:47Z
2017-10-24T18:33:35Z
HIGH
7.8
{'CWE-426'}
{'https://github.com/electron/electron/pull/2976', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202', 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7'}
null
GHSA
GHSA-mh3m-8c74-74xh
Denial of Service in graphql-go
### Impact This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. To make things worse the only mitigation in affected versions creates opportunities for other attacks. This issue is only available if you are using `graphql.MaxDepth` option in your schema (which is highly recommended in most cases). ### Patches The issue has been patched in version `v1.3.0`. We have been trying to maintain backwards compatibility and avoid breaking changes so upgrading should not be problematic. ### Workarounds The best workaround is to patch to a version greater than or equal to `v1.3.0`. Otherwise, the only workaround in versions prior to `v1.3.0` is to disable the `graphql.MaxDepth` option from your schema. Unfortunately, this could potentially create opportunities for other attacks. ### References There are no references or links. This issue was reported privately and was fixed before creating this Security Advisory. ### For more information If you have any questions or comments feel free to reach out to @pavelnikolov or @tony on the Gopher Slack.
{'CVE-2022-21708'}
2022-04-19T19:03:20Z
2022-01-27T15:28:06Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe', 'https://github.com/advisories/GHSA-mh3m-8c74-74xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'}
null
GHSA
GHSA-w3pp-wp5v-fjvp
Malicious Package in mogodb
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:20:20Z
2020-09-03T19:51:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1133', 'https://github.com/advisories/GHSA-w3pp-wp5v-fjvp'}
null
GHSA
GHSA-6w5m-jgc5-8cgc
orchardcore is vulnerable to Cross-site Scripting
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0159'}
2022-01-21T23:57:49Z
2022-01-21T23:57:49Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/advisories/GHSA-6w5m-jgc5-8cgc'}
null
GHSA
GHSA-7m27-3587-83xf
Privilege Defined With Unsafe Actions in Keycloak
A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.
{'CVE-2019-10170'}
2021-10-21T17:46:27Z
2021-10-21T17:46:27Z
HIGH
7.2
{'CWE-267'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170', 'https://github.com/advisories/GHSA-7m27-3587-83xf'}
null
GHSA
GHSA-xw7c-jx9m-xh5g
Reflected cross-site scripting issue in Datasette
### Impact The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. ### Patches Datasette 0.57 and 0.56.1 both include patches for this issue. ### Workarounds If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters. ### References - [OWASP guide to reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) - [Datasette issue #1360](https://github.com/simonw/datasette/issues/1360) ### For more information If you have any questions or comments about this advisory: * Open a discussion in [simonw/datasette](https://github.com/simonw/datasette/discussions) * Email us at `swillison+datasette @ gmail.com`
null
2021-10-05T17:23:34Z
2021-06-07T21:47:41Z
HIGH
7.2
{'CWE-79'}
{'https://github.com/advisories/GHSA-xw7c-jx9m-xh5g', 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'}
null
GHSA
GHSA-86r3-4gq8-xw8q
Remote Code Execution in Laravel
A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Capsule\Manager.php, and (3) __invoke in mockery\library\Mockery\ClosureWrapper.php.
{'CVE-2021-43503'}
2022-04-17T17:14:14Z
2022-04-09T00:00:25Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-86r3-4gq8-xw8q', 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}
null
GHSA
GHSA-qvjc-g5vr-mfgr
Regular Expression Denial of Service in papaparse
Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service. ## Recommendation Upgrade to version 5.2.0 or later.
null
2021-10-04T21:11:40Z
2020-09-04T18:03:04Z
HIGH
7.5
{'CWE-185'}
{'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258', 'https://github.com/advisories/GHSA-qvjc-g5vr-mfgr', 'https://www.npmjs.com/advisories/1515', 'https://github.com/mholt/PapaParse/issues/777'}
null
GHSA
GHSA-6q5w-m3c5-rv95
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor.
{'CVE-2020-35866'}
2021-08-25T20:47:59Z
2021-08-25T20:47:59Z
CRITICAL
9.8
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35866', 'https://github.com/advisories/GHSA-6q5w-m3c5-rv95', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}
null
GHSA
GHSA-cf36-985g-v73c
Moderate severity vulnerability that affects omniauth-facebook
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
{'CVE-2013-4562'}
2021-09-08T22:01:45Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-352'}
{'http://seclists.org/oss-sec/2013/q4/267', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt', 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://seclists.org/oss-sec/2013/q4/264', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://www.osvdb.org/99693', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562'}
null
GHSA
GHSA-4286-h47h-m5v6
Improper Authentication in showdoc
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
{'CVE-2021-41745'}
2021-10-28T17:10:57Z
2021-10-25T19:43:24Z
HIGH
0
{'CWE-287', 'CWE-434'}
{'https://github.com/advisories/GHSA-4286-h47h-m5v6', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability', 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
null
GHSA
GHSA-6fmv-q269-55cw
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit template. Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
{'CVE-2020-15277'}
2022-04-19T19:02:38Z
2020-10-30T17:05:59Z
HIGH
7.2
{'CWE-434', 'CWE-74'}
{'https://github.com/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw'}
null
GHSA
GHSA-557g-r22w-9wvx
Incorrect Permission Assignment for Critical Resource in Singularity
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
{'CVE-2019-11328'}
2021-12-20T18:25:33Z
2021-12-20T18:25:33Z
HIGH
8.8
{'CWE-269'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/', 'http://www.openwall.com/lists/oss-security/2019/05/16/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328', 'https://github.com/advisories/GHSA-557g-r22w-9wvx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/', 'http://www.securityfocus.com/bid/108360', 'https://github.com/sylabs/singularity/releases/tag/v3.2.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}
null
GHSA
GHSA-7f92-rr6w-cq64
Storage corruption due to variables overwritten by re-entrancy locks
### Background When attempting to use the v0.2.14 release, @pandadefi discovered an issue using the `@nonreentrant` decorator. ### Impact Reentrancy protection storage slots get allocated to the same slots as storage variables, leading to the corruption of storage variables when using the `@nonreentrant` decorator. ### Patches This issue was fixed in v0.2.15 in #2391, #2379 ### Workarounds Don't use the `@nonreentrant` decorator in these versions.
null
2022-04-19T19:03:04Z
2021-08-05T16:57:42Z
HIGH
0
null
{'https://github.com/vyperlang/vyper/security/advisories/GHSA-7f92-rr6w-cq64', 'https://github.com/vyperlang/vyper/pull/2391', 'https://github.com/advisories/GHSA-7f92-rr6w-cq64', 'https://github.com/vyperlang/vyper/pull/2379'}
null
GHSA
GHSA-vrxp-mg9f-hwf3
Improperly Implemented path matching for in-toto-golang
### Impact Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). ### Patches The problem has been fixed in version 0.3.0. ### Workarounds Exploiting this vulnerability is dependent on the specific policy applied. ### For more information If you have any questions or comments about this advisory: * Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang) * Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com) * If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
{'CVE-2021-41087'}
2022-04-19T19:03:09Z
2021-09-22T20:37:09Z
MODERATE
5.6
{'CWE-22', 'CWE-345'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41087', 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3', 'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290', 'https://github.com/advisories/GHSA-vrxp-mg9f-hwf3'}
null
GHSA
GHSA-6757-jp84-gxfx
Improper Input Validation in PyYAML
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
{'CVE-2020-1747'}
2021-09-01T22:05:35Z
2021-04-20T16:14:24Z
HIGH
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-6757-jp84-gxfx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html', 'https://github.com/yaml/pyyaml/pull/386', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'}
null
GHSA
GHSA-fpf2-pr3j-4cm3
Malicious Package in ecruve
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:31Z
2020-09-03T17:06:06Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-fpf2-pr3j-4cm3', 'https://www.npmjs.com/advisories/1395'}
null
GHSA
GHSA-55j9-849x-26h4
Remote Code Execution in Red Discord Bot
### Impact A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version 3.3.11. ### Workarounds Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue. ### References https://github.com/Cog-Creators/Red-DiscordBot/pull/4175 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
{'CVE-2020-15140'}
2022-04-19T19:02:32Z
2020-08-21T16:30:52Z
HIGH
8.2
{'CWE-74'}
{'https://github.com/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15140'}
null
GHSA
GHSA-qf6q-qfwp-vp44
Origin Validation Error in Magento 2
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
{'CVE-2020-8818'}
2021-10-12T16:30:58Z
2021-10-12T16:30:58Z
HIGH
8.1
{'CWE-346'}
{'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818', 'https://github.com/advisories/GHSA-qf6q-qfwp-vp44', 'https://github.com/cardgate/magento2/releases/tag/v2.0.33', 'https://github.com/cardgate/magento2/issues/54', 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'}
null
GHSA
GHSA-ch6p-4jcm-h8vh
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
{'CVE-2017-0248'}
2021-04-05T15:52:17Z
2018-10-16T19:58:52Z
MODERATE
0
{'CWE-295'}
{'http://www.securityfocus.com/bid/98117', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248', 'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248', 'http://www.securitytracker.com/id/1038458'}
null
GHSA
GHSA-x2rg-fmcv-crq5
Moderate severity vulnerability that affects DotNetNuke.Core
DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
{'CVE-2017-9822'}
2021-09-21T21:55:19Z
2018-10-16T19:34:22Z
HIGH
8.8
{'CWE-20'}
{'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'http://www.securityfocus.com/bid/102213'}
null
GHSA
GHSA-7w54-gp8x-f33m
Potential exposure of tokens to an Unauthorized Actor
### Impact When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account). ### Patches This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one. ### Workarounds Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`: ```typescript const connectOptions: ConnectArgs = { // ... pollingHost: 'gp-v2.replit.com', }; client.connect(connectOptions); ``` ### For more information Thanks to https://hackerone.com/orlserg for disclosing this. If you have any questions or comments about this advisory: * Open an issue in [replit/crosis](https://github.com/replit/crosis) * Email us at [security@replit.com](mailto:security@replit.com)
{'CVE-2022-21671'}
2022-01-25T17:03:48Z
2022-01-12T22:44:47Z
HIGH
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671', 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m'}
null
GHSA
GHSA-4g4p-42wc-9f3m
Git LFS can execute a Git binary from the current directory
### Impact On Windows, if Git LFS operates on a malicious repository with a `git.bat` or `git.exe` file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. ### Patches This version should be patched in v2.12.1, which will be released in coordination with this security advisory. ### Workarounds Other than avoiding untrusted repositories, there is no workaround. ### For more information If you have any questions or comments about this advisory: * Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions). * If you cannot open a discussion, please email the core team using their usernames at `github.com`.
{'CVE-2020-27955'}
2022-04-20T16:25:04Z
2022-02-11T23:39:18Z
CRITICAL
9.8
{'CWE-427'}
{'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-4g4p-42wc-9f3m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27955', 'https://github.com/advisories/GHSA-4g4p-42wc-9f3m', 'http://seclists.org/fulldisclosure/2020/Nov/1', 'https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html', 'https://github.com/git-lfs/git-lfs/releases'}
null
GHSA
GHSA-4hjg-w3ww-38c6
Malicious Package in tiar
All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:02:00Z
2020-09-03T18:03:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4hjg-w3ww-38c6', 'https://www.npmjs.com/advisories/1064'}
null
GHSA
GHSA-ffjh-fjgg-mfpq
Moderate severity vulnerability that affects org.apache.ranger:ranger
In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table.
{'CVE-2017-7677'}
2021-09-10T18:07:44Z
2018-10-17T17:22:49Z
MODERATE
5.9
{'CWE-862'}
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677', 'http://www.securityfocus.com/bid/98961'}
null
GHSA
GHSA-jmhf-9fj8-88gh
Open Redirect in AllTube
### Impact Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain. ### Patches 3.0.1 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) ### References * https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a * https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/ * https://nvd.nist.gov/vuln/detail/CVE-2022-0692
{'CVE-2022-0692'}
2022-04-19T19:03:24Z
2022-02-23T21:15:01Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-jmhf-9fj8-88gh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
null
GHSA
GHSA-c53v-qmrx-93hg
Open redirect in shopware
### Impact Arbitrary redirect while using certain URLs ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21651'}
2022-01-06T23:49:19Z
2022-01-06T23:49:19Z
MODERATE
6.8
{'CWE-601'}
{'https://github.com/advisories/GHSA-c53v-qmrx-93hg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
null
GHSA
GHSA-qw3g-35hc-fcrh
Cross-Site Scripting (XSS) in restify
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL. ## Proof of Concept: Request ``` https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E ``` Will be included in response: ```<script>alert(73541);</script>``` ## Recommendation Update to version 4.1.0 or later.
{'CVE-2017-16018'}
2021-01-08T21:10:39Z
2018-11-09T17:45:38Z
MODERATE
0
{'CWE-79'}
{'https://github.com/restify/node-restify/issues/1018', 'https://nodesecurity.io/advisories/314', 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018', 'https://www.npmjs.com/advisories/314'}
null
GHSA
GHSA-h9w3-f7x6-v54c
Deserialization of Untrusted Data in com.jsoniter:jsoniter
# Withdrawn was withdrawn by its CNA. Further investigation showed that it was not a security issue. ## Original Description All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution.
{'CVE-2021-23441'}
2021-10-28T16:15:49Z
2021-09-20T23:18:54Z
HIGH
7
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23441', 'https://snyk.io/vuln/SNYK-JAVA-COMJSONITER-1316198', 'https://github.com/advisories/GHSA-h9w3-f7x6-v54c'}
null
GHSA
GHSA-rpg7-q4cv-p466
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4123'}
2022-01-04T18:52:37Z
2021-12-17T20:00:16Z
MODERATE
6.5
{'CWE-352'}
{'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/advisories/GHSA-rpg7-q4cv-p466', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}
null
GHSA
GHSA-8222-6fc8-mhvf
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
{'CVE-2019-3773'}
2021-06-15T16:59:21Z
2019-01-25T16:18:52Z
CRITICAL
9.8
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-8222-6fc8-mhvf', 'https://pivotal.io/security/cve-2019-3773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-6hwh-rqwf-cxxr
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
vega-util prior to 1.13.1 allows manipulation of object prototype. The &#39;vega.mergeConfig&#39; method within vega-util could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10806'}
2021-07-28T18:36:57Z
2021-05-07T16:32:02Z
MODERATE
4.3
{'CWE-20', 'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://github.com/advisories/GHSA-6hwh-rqwf-cxxr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10806'}
null
GHSA
GHSA-rprw-h62v-c2w7
High severity vulnerability that affects pyyaml
In PyYAML before 4.1, the yaml.load() API could execute arbitrary code. In other words, yaml.safe_load is not used.
{'CVE-2017-18342'}
2022-03-23T20:09:15Z
2019-01-04T17:45:26Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18342', 'https://security.gentoo.org/glsa/202003-45', 'https://github.com/advisories/GHSA-rprw-h62v-c2w7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/', 'https://github.com/yaml/pyyaml/pull/74', 'https://github.com/yaml/pyyaml/issues/193', 'https://github.com/yaml/pyyaml/blob/master/CHANGES', 'https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/', 'https://github.com/marshmallow-code/apispec/issues/278'}
null
GHSA
GHSA-fgmx-8h93-26fh
Moderate severity vulnerability that affects omniauth-oauth2
Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
{'CVE-2012-6134'}
2021-09-10T18:16:06Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-352'}
{'https://gist.github.com/homakov/3673012', 'https://github.com/advisories/GHSA-fgmx-8h93-26fh', 'http://rubysec.github.io/advisories/CVE-2012-6134/', 'http://seclists.org/oss-sec/2013/q1/304', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134', 'https://github.com/intridea/omniauth-oauth2/pull/25', 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'}
null
GHSA
GHSA-9m6j-fcg5-2442
Path traversal in url-parse
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
{'CVE-2021-27515'}
2021-05-06T16:31:23Z
2021-05-06T16:10:51Z
HIGH
5.3
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/advisories/GHSA-9m6j-fcg5-2442', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://github.com/unshiftio/url-parse/pull/197', 'https://advisory.checkmarx.net/advisory/CX-2021-4306'}
null
GHSA
GHSA-74f5-4m28-gq5c
Directory Traversal in peiserver
Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16214'}
2021-01-14T15:46:13Z
2020-09-01T18:09:59Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-74f5-4m28-gq5c', 'https://www.npmjs.com/advisories/420', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214', 'https://nodesecurity.io/advisories/420', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver'}
null