ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-7563-75j9-6h5p | Sensitive Information Exposure in Sylius | ### Impact
Any other user can view the data if the browser tab remains open after logging out. Once someone logs out and leaves the browser open, the potential attacker may use the back button to see the content exposed on given screens. No action may be performed though, and any website refresh will block further reads. It may, however, lead to a data leak, like for example customer details, payment gateway configuration, etc.- but only if these were pages checked by the administrator.
This vulnerability requires full access to the computer to take advantage of it.
### Patches
The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2 and above.
### Workarounds
The application must strictly redirect to the login page even when the browser back button is pressed. Another possibility is to set more strict cache policies for restricted content (like no-store). It can be achieved with the following class:
```php
<?php
declare(strict_types=1);
namespace App\EventListener;
use App\SectionResolver\ShopCustomerAccountSubSection;
use Sylius\Bundle\AdminBundle\SectionResolver\AdminSection;
use Sylius\Bundle\CoreBundle\SectionResolver\SectionProviderInterface;
use Symfony\Component\EventDispatcher\EventSubscriberInterface;
use Symfony\Component\HttpKernel\Event\ResponseEvent;
use Symfony\Component\HttpKernel\KernelEvents;
final class CacheControlSubscriber implements EventSubscriberInterface
{
/** @var SectionProviderInterface */
private $sectionProvider;
public function __construct(SectionProviderInterface $sectionProvider)
{
$this->sectionProvider = $sectionProvider;
}
public static function getSubscribedEvents(): array
{
return [
KernelEvents::RESPONSE => 'setCacheControlDirectives',
];
}
public function setCacheControlDirectives(ResponseEvent $event): void
{
if (
!$this->sectionProvider->getSection() instanceof AdminSection &&
!$this->sectionProvider->getSection() instanceof ShopCustomerAccountSubSection
) {
return;
}
$response = $event->getResponse();
$response->headers->addCacheControlDirective('no-cache', true);
$response->headers->addCacheControlDirective('max-age', '0');
$response->headers->addCacheControlDirective('must-revalidate', true);
$response->headers->addCacheControlDirective('no-store', true);
}
}
```
After that register service in the container:
```yaml
services:
App\EventListener\CacheControlSubscriber:
arguments: ['@sylius.section_resolver.uri_based_section_resolver']
tags:
- { name: kernel.event_subscriber, event: kernel.response }
```
The code above requires changes in `ShopUriBasedSectionResolver` in order to work. To backport mentioned logic, you need to replace the `Sylius\Bundle\ShopBundle\SectionResolver\ShopUriBasedSectionResolver` class with:
```php
<?php
declare(strict_types=1);
namespace App\SectionResolver;
use Sylius\Bundle\CoreBundle\SectionResolver\SectionInterface;
use Sylius\Bundle\CoreBundle\SectionResolver\UriBasedSectionResolverInterface;
use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection;
final class ShopUriBasedSectionResolver implements UriBasedSectionResolverInterface
{
/** @var string */
private $shopCustomerAccountUri;
public function __construct(string $shopCustomerAccountUri = 'account')
{
$this->shopCustomerAccountUri = $shopCustomerAccountUri;
}
public function getSection(string $uri): SectionInterface
{
if (str_contains($uri, $this->shopCustomerAccountUri)) {
return new ShopCustomerAccountSubSection();
}
return new ShopSection();
}
}
```
```yaml
services:
sylius.section_resolver.shop_uri_based_section_resolver:
class: App\SectionResolver\ShopUriBasedSectionResolver
tags:
- { name: sylius.uri_based_section_resolver, priority: -10 }
```
You also need to define a new subsection for the Customer Account that is used in the above services:
```php
<?php
declare(strict_types=1);
namespace App\SectionResolver;
use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection;
class ShopCustomerAccountSubSection extends ShopSection
{
}
```
### References
* Originally published at https://huntr.dev/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at security@sylius.com
| {'CVE-2022-24742'} | 2022-03-18T13:11:43Z | 2022-03-14T22:26:58Z | MODERATE | 5 | {'CWE-200', 'CWE-213'} | {'https://github.com/Sylius/Sylius/security/advisories/GHSA-7563-75j9-6h5p', 'https://github.com/advisories/GHSA-7563-75j9-6h5p', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24742', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'} | null |
GHSA | GHSA-vrv8-v4w8-f95h | Cross-site scripting vulnerability in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic.
### Workarounds
The workarounds available are:
- upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1
or
- enable the media plugin, which overrides the default parsing behaviour for iframes
or
- add the following workaround to update the parsing schema rules for iframes:
#### Example: Change the default schema for iframes
```js
setup: function(editor) {
editor.on('PreInit', function() {
editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi;
});
}
```
### Acknowledgements
Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) | null | 2020-11-13T17:56:38Z | 2020-08-11T14:55:01Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-vrv8-v4w8-f95h', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'} | null |
GHSA | GHSA-6239-28c2-9mrm | Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault | HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases. | {'CVE-2021-38554'} | 2021-10-21T14:19:31Z | 2021-08-30T17:22:38Z | MODERATE | 5.3 | {'CWE-212'} | {'https://github.com/hashicorp/vault/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38554', 'https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166', 'https://github.com/advisories/GHSA-6239-28c2-9mrm', 'https://github.com/hashicorp/vault/releases/tag/v1.7.4'} | null |
GHSA | GHSA-5p26-hw7f-3cpr | Cross-Site Scripting in html-pages | All versions of `html-pages` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize folder names, allowing attackers to execute arbitrary JavaScript in the victim's browser through folders with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | {'CVE-2018-16481'} | 2021-09-16T20:40:23Z | 2019-02-07T18:14:44Z | HIGH | 0 | {'CWE-64', 'CWE-79'} | {'https://www.npmjs.com/advisories/1001', 'https://github.com/advisories/GHSA-5p26-hw7f-3cpr', 'https://hackerone.com/reports/330356', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16481'} | null |
GHSA | GHSA-q9vw-wr57-xjv3 | Information Exposure in Heketi | An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. | {'CVE-2017-15104'} | 2022-04-12T22:38:47Z | 2022-02-15T01:57:18Z | HIGH | 7.8 | {'CWE-200', 'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15104', 'https://access.redhat.com/errata/RHSA-2017:3481', 'https://github.com/heketi/heketi/releases/tag/v5.0.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1510149', 'https://access.redhat.com/security/cve/CVE-2017-15104', 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00', 'https://github.com/advisories/GHSA-q9vw-wr57-xjv3'} | null |
GHSA | GHSA-5x92-p4p5-33c4 | Path Traversal in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8. | {'CVE-2020-28348'} | 2022-04-12T22:55:54Z | 2022-02-15T01:57:18Z | MODERATE | 6.5 | {'CWE-22'} | {'https://github.com/hashicorp/nomad/issues/9303', 'https://github.com/hashicorp/nomad/pull/9321', 'https://github.com/advisories/GHSA-5x92-p4p5-33c4', 'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0128-november-10-2020', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28348', 'https://discuss.hashicorp.com/t/nomad-0-12-8-0-11-7-and-0-10-8-released/17491'} | null |
GHSA | GHSA-gmr7-m73x-6c9q | Missing Authorization in TeamPass | Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default. | {'CVE-2020-11671'} | 2021-07-26T21:22:13Z | 2021-07-26T21:22:13Z | HIGH | 8.1 | {'CWE-862'} | {'https://github.com/nilsteampassnet/TeamPass/issues/2765', 'https://github.com/advisories/GHSA-gmr7-m73x-6c9q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11671'} | null |
GHSA | GHSA-36xw-hgfv-jwm7 | Uninitialized memory drop in arr | An issue was discovered in the arr crate through 2020-08-25 for Rust. Uninitialized memory is dropped by Array::new_from_template. | {'CVE-2020-35888'} | 2021-08-25T20:48:36Z | 2021-08-25T20:48:36Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://github.com/advisories/GHSA-36xw-hgfv-jwm7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35888', 'https://github.com/sjep/array/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'} | null |
GHSA | GHSA-wxr6-29pv-ch68 | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4164'} | 2022-01-21T23:44:17Z | 2022-01-21T23:44:17Z | HIGH | 7.6 | {'CWE-352'} | {'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30', 'https://github.com/advisories/GHSA-wxr6-29pv-ch68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164', 'https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758'} | null |
GHSA | GHSA-v666-6w97-pcwm | Miner fails to get block template when a cell used as a cell dep has been destroyed. | ### Impact
The RPC `get_block_template` fails when a cell has been used as a cell dep and an input in the different transactions.
Say cell C is used as a dep group in the transaction A, and is destroyed in the transaction B.
The node adds transaction A first, then B into the transaction pool. They are both valid. But when generating the block template, if the fee rate of B is higher, it comes before A, which will invalidate A. Currently the RPC `get_block_template` will fail instead of dropping A.
### Patch
First, the `get_block_template` should not fail but dropping the conflict transactions.
Then we can propose solution to this issue. Here is an example. When a transaction is added to the pool, the pool must consider it depending on all the transactions which dep cell (direct or indirect via dep group) has been destroyed in this transaction. Because future transactions using the destroyed cells as dep will be rejected, the spending transaction only need to wait for all the existing dep transactions on chain.
### Workaround
1. Submit transaction B when A is already on chain.
2. Let B depend on A explicitly, there are several solutions:
* a. Add any output cell on A as a dep cell or input in B.
* b. Merge A and B. CKB allows using the same cell as both dep and input in the same transaction.
3. Ensure the fee rate of B is less than A so A always has higher priority.
| null | 2022-04-19T19:02:43Z | 2021-08-25T21:01:21Z | HIGH | 0 | {'CWE-367'} | {'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-v666-6w97-pcwm', 'https://github.com/advisories/GHSA-v666-6w97-pcwm'} | null |
GHSA | GHSA-h4mc-r4f4-hcf4 | Downloads Resources over HTTP in selenium-binaries | Affected versions of `selenium-binaries` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`.
## Recommendation
No fix is currently available for this vulnerability.
The best mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js. | {'CVE-2016-10589'} | 2021-01-08T18:44:02Z | 2019-02-18T23:34:37Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10589', 'https://nodesecurity.io/advisories/175', 'https://github.com/advisories/GHSA-h4mc-r4f4-hcf4', 'https://www.npmjs.com/advisories/175'} | null |
GHSA | GHSA-f3w5-v9xx-rp8p | Signature verification failure in Tendermint | _The root cause of this security vulnerability is in the Tendermint specification, and this advisory is a duplicate of https://github.com/tendermint/spec/security/advisories/GHSA-jqfc-687g-59pw._
### Impact
Tendermint light clients running versions 0.34.0 to 0.34.8 are unable to detect and punish a new kind of attack. We’re calling this a “forward lunatic attack,” or FLA. The severity of this vulnerability is _moderate_.
Note that an FLA cannot be successfully executed unless there are already ⅓+ Byzantine validators, and therefore outside of Tendermint’s security model; however, it is important to be able to detect and punish these kinds of attacks in order to incentivize correct behavior.
In an FLA, an attacking validator (with ⅓+ voting power) signs commit messages for arbitrary application state associated with a block height that hasn’t been seen yet, hence the name “forward lunatic attacks.” A malicious validator effectively executes a [lunatic attack](https://docs.tendermint.com/master/spec/light-client/accountability/#the-misbehavior-of-faulty-validators), but signs messages for a target block that is higher than the current block. This can be dangerous: Typically, misbehavior evidence is only created when there are conflicting blocks at the same height, but by targeting a block height that is far “ahead” of the current chain height, it’s possible that the chain will not produce a (conflicting) block at the target height in time to create evidence.
Prior to Tendermint v0.34.9, the light client could accept a bad header from its primary witness, and would not be able to form evidence of this deception, even if all the secondary witnesses were correct. Because the light client is responsible for verifying cross-chain state for IBC, a successful FLA could result in loss of funds. However, it is important to note that FLAs are only possible outside the Tendermint security model.
All FLAs, attempted and successful, leave traces of provable misbehavior on-chain. A faulty header contains signatures from the faulty validator, and even in unpatched versions of Tendermint Core, networks could use social consensus (off-chain action) to recover the network. The patches introduced in Tendermint Core v0.34.9 handle all evidence automatically and on-chain.
Note that this fix also allows for successful automatic reporting of FLAs, even after a chain halt. By adding a time to FetchBlock, light clients effectively have a backup way to determine if a halted chain should have continued, and it will be able to submit evidence as soon as the chain resumes.
### Patches
This problem has been patched in Tendermint Core v0.34.9.
### Workarounds
There are no workarounds. All users are recommended to upgrade to Tendermint Core v0.34.9 at their earliest possible convenience.
### Credits
Thank you to @MaximilianDiez for originally surfacing this issue, and to @cmwaters, @josef-widder, and @milosevic for creating fixes at both the implementation and specification level.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)
* Email us at [security@tendermint.com](mailto:security@tendermint.com) | null | 2022-04-19T19:02:54Z | 2021-12-20T18:17:41Z | MODERATE | 0 | {'CWE-347'} | {'https://github.com/tendermint/tendermint/security/advisories/GHSA-f3w5-v9xx-rp8p', 'https://github.com/advisories/GHSA-f3w5-v9xx-rp8p'} | null |
GHSA | GHSA-9vxc-g2jx-qj3p | API Admin Auth Weakness in tomato | Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests.
## Details
The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access.
Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key.
## Proof of Concept
This is the snippet of code that does the comparison to authorize requests.
```
if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) {
```
For an access_key that is set to anything that includes the letter 'a' the following request would be authorized.
```
$ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a"
{
"cmd": "ls",
"path": ".",
"stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n",
"stderr": ""
}
```
## Recommendation
Update to version 0.0.6 or later. | {'CVE-2013-7379'} | 2021-09-23T21:00:30Z | 2020-08-31T22:59:07Z | CRITICAL | 0 | {'CWE-287'} | {'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/38', 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://github.com/advisories/GHSA-9vxc-g2jx-qj3p', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'} | null |
GHSA | GHSA-9959-c6q6-6qp3 | Moderate severity vulnerability that affects validator | **Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q | null | 2021-12-02T22:31:42Z | 2017-10-24T18:33:36Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-9959-c6q6-6qp3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'} | null |
GHSA | GHSA-m4h3-7mc2-v295 | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | {'CVE-2020-35214'} | 2022-01-04T19:00:34Z | 2021-12-17T20:41:21Z | HIGH | 8.1 | null | {'https://github.com/advisories/GHSA-m4h3-7mc2-v295', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214', 'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing'} | null |
GHSA | GHSA-gmjp-776j-2394 | Malicious Package in ripmed160 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:04:57Z | 2020-09-03T17:04:24Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1405', 'https://github.com/advisories/GHSA-gmjp-776j-2394'} | null |
GHSA | GHSA-x84v-xcm2-53pg | Moderate severity vulnerability that affects requests | The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | {'CVE-2018-18074'} | 2021-09-21T22:17:47Z | 2018-10-29T19:06:46Z | HIGH | 7.5 | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-18074', 'https://usn.ubuntu.com/3790-1/', 'https://usn.ubuntu.com/3790-2/', 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff', 'https://github.com/requests/requests/issues/4716', 'https://bugs.debian.org/910766', 'https://access.redhat.com/errata/RHSA-2019:2035', 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history', 'https://github.com/requests/requests/pull/4718', 'https://github.com/advisories/GHSA-x84v-xcm2-53pg', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html'} | null |
GHSA | GHSA-f77h-m9w2-vvg2 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4017'} | 2021-12-03T20:38:57Z | 2021-12-03T20:38:57Z | HIGH | 8.8 | {'CWE-352'} | {'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/advisories/GHSA-f77h-m9w2-vvg2', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'} | null |
GHSA | GHSA-h395-qcrw-5vmq | Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin | This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. | {'CVE-2020-28483'} | 2021-06-23T17:53:21Z | 2021-06-23T17:53:21Z | HIGH | 7.1 | {'CWE-113', 'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28483', 'https://github.com/gin-gonic/gin/pull/2474%23issuecomment-729696437', 'https://github.com/gin-gonic/gin/pull/2632', 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0', 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736', 'https://github.com/advisories/GHSA-h395-qcrw-5vmq'} | null |
GHSA | GHSA-whr9-vfh2-7hm6 | Memory corruption in `DrawBoundingBoxesV2` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs:
```python
import tensorflow as tf
images = tf.fill([10, 96, 0, 1], 0.)
boxes = tf.fill([10, 53, 0], 0.)
colors = tf.fill([0, 1], 0.)
tf.raw_ops.DrawBoundingBoxesV2(images=images, boxes=boxes, colors=colors)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption:
```cc
const auto tboxes = boxes.tensor<T, 3>();
for (int64 bb = 0; bb < num_boxes; ++bb) {
...
const int64 min_box_row = static_cast<float>(tboxes(b, bb, 0)) * (height - 1);
const int64 max_box_row = static_cast<float>(tboxes(b, bb, 2)) * (height - 1);
const int64 min_box_col = static_cast<float>(tboxes(b, bb, 1)) * (width - 1);
const int64 max_box_col = static_cast<float>(tboxes(b, bb, 3)) * (width - 1);
...
}
```
If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices.
### Patches
We have patched the issue in GitHub commit [79865b542f9ffdc9caeb255631f7c56f1d4b6517](https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29571'} | 2021-05-21T14:25:28Z | 2021-05-21T14:25:28Z | MODERATE | 4.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29571', 'https://github.com/advisories/GHSA-whr9-vfh2-7hm6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'} | null |
GHSA | GHSA-97wf-p777-86jq | Division by zero in TFLite's implementation of Split | ### Impact
The implementation of the `Split` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65):
```cc
TF_LITE_ENSURE_MSG(context, input_size % num_splits == 0, "Not an even split");
const int slice_size = input_size / num_splits;
```
An attacker can craft a model such that `num_splits` would be 0.
### Patches
We have patched the issue in GitHub commit [b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d](https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29599'} | 2021-05-21T14:28:01Z | 2021-05-21T14:28:01Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-97wf-p777-86jq', 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29599'} | null |
GHSA | GHSA-vwfg-qj3r-6v3r | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences. | null | 2021-12-03T14:24:04Z | 2018-09-17T21:57:47Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'https://github.com/advisories/GHSA-vwfg-qj3r-6v3r'} | null |
GHSA | GHSA-3f95-r44v-8mrg | Command injection in simple-git | The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution. | {'CVE-2022-24433'} | 2022-03-24T13:45:19Z | 2022-03-12T00:00:33Z | HIGH | 8.1 | {'CWE-74', 'CWE-77'} | {'https://github.com/advisories/GHSA-3f95-r44v-8mrg', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245', 'https://github.com/steveukx/git-js/pull/767', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199', 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'} | null |
GHSA | GHSA-387v-84cv-9qmc | Moderate severity vulnerability that affects org.apache.solr:solr-core | When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access. | {'CVE-2017-3163'} | 2021-08-31T20:52:26Z | 2018-10-18T16:40:43Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-3163', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-387v-84cv-9qmc', 'https://www.debian.org/security/2018/dsa-4124', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://access.redhat.com/errata/RHSA-2018:1448'} | null |
GHSA | GHSA-9fp7-4fjm-q3mf | Prototype Pollution in keyget | The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048) | {'CVE-2021-23760'} | 2022-02-01T00:51:01Z | 2022-02-01T00:51:01Z | MODERATE | 5.6 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-9fp7-4fjm-q3mf', 'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760', 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624'} | null |
GHSA | GHSA-qmw8-3v4g-gwj4 | Prefix escape | ### Impact
By crafting a specific URL, it is possible to escape the prefix of the proxied backend service.
If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is.
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N)
### Patches
A patch have been submitted by Corey Farrell git@cfware.com, the reporter.
All releases after v4.0.2 include the fix.
### Workarounds
There are no workaround available.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com) | {'CVE-2021-21321'} | 2021-03-03T17:50:05Z | 2021-03-03T01:52:05Z | CRITICAL | 10 | {'CWE-20'} | {'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} | null |
GHSA | GHSA-h9mj-fghc-664w | Denial of Service in mqtt | Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead.
```
var mqttp = require('mqtt-packet');
var packets = [];
for(var i=0; i<=1000;i++){
packets.push(
mqttp.generate({
cmd:'publish',
topic:Buffer.from('hello'),
payload:Buffer.from('world'),
retain: false,
dup: false,
messageId: ++i,
qos: 1
})
)
}
```
## Recommendation
Update to version 2.15.0 or later. | {'CVE-2017-10910'} | 2021-09-14T17:16:40Z | 2017-12-28T22:51:58Z | MODERATE | 6.5 | {'CWE-674'} | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://jvn.jp/en/jp/JVN45494523/index.html'} | null |
GHSA | GHSA-v592-xf75-856p | Erroneous Proof of Work calculation in geth | ### Impact
An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected.
### Patches
This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | {'CVE-2020-26240'} | 2022-04-19T19:02:40Z | 2021-06-29T21:12:56Z | MODERATE | 5.3 | {'CWE-682'} | {'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240', 'https://github.com/advisories/GHSA-v592-xf75-856p', 'https://github.com/ethereum/go-ethereum/pull/21793'} | null |
GHSA | GHSA-4cx6-fj7j-pjx9 | Code injection in Stripe CLI on windows | ### Impact
A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected.
An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.
There has been no evidence of exploitation of this vulnerability.
### Recommendation
Upgrade to Stripe CLI v1.7.13.
### Acknowledgments
Thanks to [trungpabc](https://hackerone.com/trungpabc) for reporting the issue.
### For more information
Email us at [security@stripe.com](mailto:security@stripe.com).
| {'CVE-2022-24753'} | 2022-03-18T21:10:50Z | 2022-03-10T18:17:50Z | HIGH | 7.7 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24753', 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9', 'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd', 'https://github.com/advisories/GHSA-4cx6-fj7j-pjx9'} | null |
GHSA | GHSA-356r-77q8-f64f | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1 | {'CVE-2021-3819'} | 2021-10-04T13:58:41Z | 2021-09-29T17:12:37Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/advisories/GHSA-356r-77q8-f64f', 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5'} | null |
GHSA | GHSA-38fc-9xqv-7f7q | Moderate severity vulnerability that affects SQLAlchemy | SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. | {'CVE-2019-7548'} | 2021-11-08T18:48:32Z | 2019-04-16T15:50:39Z | HIGH | 7.8 | {'CWE-89'} | {'https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://github.com/advisories/GHSA-38fc-9xqv-7f7q', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:0981', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7548', 'https://github.com/no-security/sqlalchemy_test'} | null |
GHSA | GHSA-5w9c-rv96-fr7g | Removal of functional code in faker.js | Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8).
The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker). | null | 2022-03-23T16:01:20Z | 2022-03-22T19:28:24Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-5w9c-rv96-fr7g', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://www.npmjs.com/package/@faker-js/faker', 'https://www.npmjs.com/package/faker', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} | null |
GHSA | GHSA-c7f6-4vx5-4263 | Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP | Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files. | {'CVE-2020-15839'} | 2022-02-10T20:46:21Z | 2022-02-10T20:46:21Z | MODERATE | 6.5 | {'CWE-434'} | {'https://github.com/advisories/GHSA-c7f6-4vx5-4263', 'https://issues.liferay.com/browse/LPE-17029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839', 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928', 'https://portal.liferay.dev/learn/security/known-vulnerabilities', 'https://issues.liferay.com/browse/LPE-17055'} | null |
GHSA | GHSA-v7wg-cpwc-24m4 | Unchecked Class Instantiation when providing Plugin Classes | pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property). | {'CVE-2022-21724'} | 2022-04-17T16:42:44Z | 2022-02-02T00:04:20Z | HIGH | 7 | {'CWE-665', 'CWE-668', 'CWE-74'} | {'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://github.com/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/', 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'} | null |
GHSA | GHSA-qrwc-jxf5-g8x6 | Out of bounds read in ordnung | An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via out-of-bounds access for large capacity. | {'CVE-2020-35890'} | 2021-08-25T20:48:40Z | 2021-08-25T20:48:40Z | HIGH | 7.5 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35890', 'https://github.com/maciejhirsz/ordnung/issues/8', 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html', 'https://github.com/advisories/GHSA-qrwc-jxf5-g8x6'} | null |
GHSA | GHSA-738m-f33v-qc2r | SMTP Injection in PHPMailer | ### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
### Workarounds
Manually strip line breaks from email addresses before passing them to PHPMailer.
### References
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2015-8476'} | 2021-08-19T19:39:12Z | 2020-03-05T22:09:19Z | LOW | 0 | {'CWE-20'} | {'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'http://www.securityfocus.com/bid/78619', 'https://github.com/advisories/GHSA-738m-f33v-qc2r', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} | null |
GHSA | GHSA-fqrr-rrwg-69pv | Low severity vulnerability that affects paratrooper-pingdom | The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process. | {'CVE-2014-1233'} | 2021-09-10T18:45:30Z | 2017-10-24T18:33:36Z | LOW | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-fqrr-rrwg-69pv', 'http://openwall.com/lists/oss-security/2014/01/08/1', 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'} | null |
GHSA | GHSA-mmj4-777p-fpq9 | Validation bypass in frourio-express | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。
### さらなる情報
このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。
* [frourio](https://github.com/frouriojs/frourio)にIssueを開く。
## English
### Impact
Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives)
### Patches
Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project.
### Workarounds
Validate objects from request with class-transformer in controllers by yourself, or prevent using validators.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [frourio](https://github.com/frouriojs/frourio)
| {'CVE-2022-23624'} | 2022-04-19T19:03:22Z | 2022-02-07T22:38:37Z | HIGH | 8.1 | {'CWE-20'} | {'https://github.com/advisories/GHSA-mmj4-777p-fpq9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9'} | null |
GHSA | GHSA-q97v-764g-r2rp | High severity vulnerability that affects gollum and gollum-lib | The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags. | {'CVE-2014-9489'} | 2021-09-16T19:42:57Z | 2017-11-16T01:47:37Z | HIGH | 8.8 | {'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-9489', 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.securityfocus.com/bid/71499', 'https://github.com/gollum/gollum/issues/913', 'http://www.openwall.com/lists/oss-security/2015/01/03/19'} | null |
GHSA | GHSA-fq42-c5rg-92c2 | Vulnerable dependencies in Nokogiri | ### Summary
Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies:
- vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news)
- vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome.org/sources/libxslt/1.1/libxslt-1.1.35.news)
Those library versions address the following upstream CVEs:
- libxslt: [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) (CVSS 8.8, High severity)
- libxml2: [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) (Unspecified severity, see more information below)
Those library versions also address numerous other issues including performance improvements, regression fixes, and bug fixes, as well as memory leaks and other use-after-free issues that were not assigned CVEs.
Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.2`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements.
### Mitigation
Upgrade to Nokogiri `>= 1.13.2`.
Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link an older version Nokogiri against external libraries libxml2 `>= 2.9.13` and libxslt `>= 1.1.35`, which will also address these same CVEs.
### Impact
#### libxslt [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560)
- CVSS3 score: 8.8 (High)
- Fixed by https://gitlab.gnome.org/GNOME/libxslt/-/commit/50f9c9c
All versions of libxslt prior to v1.1.35 are affected.
Applications using **untrusted** XSL stylesheets to transform XML are vulnerable to a denial-of-service attack and should be upgraded immediately.
#### libxml2 [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308)
- As of the time this security advisory was published, there is no officially published information available about this CVE's severity. The above NIST link does not yet have a published record, and the libxml2 maintainer has declined to provide a severity score.
- Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/652dd12
- Further explanation is at https://mail.gnome.org/archives/xml/2022-February/msg00015.html
The upstream commit and the explanation linked above indicate that an application may be vulnerable to a denial of service, memory disclosure, or code execution if it parses an **untrusted** document with parse options `DTDVALID` set to true, and `NOENT` set to false.
An analysis of these parse options:
- While `NOENT` is off by default for Document, DocumentFragment, Reader, and Schema parsing, it is on by default for XSLT (stylesheet) parsing in Nokogiri v1.12.0 and later.
- `DTDVALID` is an option that Nokogiri does not set for any operations, and so this CVE applies only to applications setting this option explicitly.
It seems reasonable to assume that any application explicitly setting the parse option `DTDVALID` when parsing **untrusted** documents is vulnerable and should be upgraded immediately.
| null | 2022-02-26T01:06:54Z | 2022-02-25T20:32:09Z | HIGH | 0 | {'CWE-416'} | {'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2', 'https://github.com/advisories/GHSA-fq42-c5rg-92c2'} | null |
GHSA | GHSA-mf6x-7mm4-x2g7 | Out-of-bounds Read in stringstream | All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to `stringstream`. | {'CVE-2018-21270'} | 2021-03-19T20:59:52Z | 2019-06-20T18:22:32Z | MODERATE | 0 | {'CWE-125'} | {'https://hackerone.com/reports/321670', 'https://github.com/advisories/GHSA-mf6x-7mm4-x2g7', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32'} | null |
GHSA | GHSA-4vmm-mhcq-4x9j | Sandbox Bypass Leading to Arbitrary Code Execution in constantinople | Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.
## Recommendation
Update to version 3.1.1 or later. | null | 2021-08-16T16:06:39Z | 2019-06-14T16:15:14Z | CRITICAL | 10 | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://github.com/advisories/GHSA-4vmm-mhcq-4x9j', 'https://www.npmjs.com/advisories/568', 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://nodesecurity.io/advisories/568'} | null |
GHSA | GHSA-q65m-pv3f-wr5r | XSS in Bleach when noscript and raw tag whitelisted | ### Impact
A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option.
### Patches
v3.1.1
### Workarounds
* modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags:
```
title
textarea
script
style
noembed
noframes
iframe
xmp
```
* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1615315
* https://cure53.de/fp170.pdf
* https://nvd.nist.gov/vuln/detail/CVE-2020-6802
* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
### Credits
* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
* Email us at [security@mozilla.org](mailto:security@mozilla.org)
| {'CVE-2020-6802'} | 2021-08-19T17:32:15Z | 2020-02-24T17:33:44Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd', 'https://github.com/advisories/GHSA-q65m-pv3f-wr5r', 'https://cure53.de/fp170.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://advisory.checkmarx.net/advisory/CX-2020-4276', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'} | null |
GHSA | GHSA-crh4-294p-vcfq | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2021-31405 | null | 2021-10-08T21:22:03Z | 2021-04-19T14:53:20Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-crh4-294p-vcfq', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq', 'https://vaadin.com/security/cve-2021-31405'} | null |
GHSA | GHSA-v66p-w7qx-wv98 | Authentication Bypass in express-laravel-passport | All versions of `express-laravel-passport` are vulnerable to an Authentication Bypass. The package fails to properly validate JWTs, allowing attackers to send HTTP requests impersonating other users.
## Recommendation
Upgrade to version 2.0.5 or later. | null | 2021-10-04T20:46:56Z | 2020-09-04T17:29:34Z | CRITICAL | 0 | {'CWE-287'} | {'https://www.npmjs.com/advisories/1450', 'https://hackerone.com/reports/748214', 'https://github.com/advisories/GHSA-v66p-w7qx-wv98'} | null |
GHSA | GHSA-g25h-jr74-qp5j | Incomplete validation in `QuantizeV2` | ### Impact
Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
```python
import tensorflow as tf
tf.raw_ops.QuantizeV2(
input=[1,2,3],
min_range=[1,2],
max_range=[],
T=tf.qint32,
mode='SCALED',
round_mode='HALF_AWAY_FROM_ZERO',
narrow_range=False,
axis=1,
ensure_minimum_range=3)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor.
### Patches
We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37663'} | 2021-08-25T14:42:23Z | 2021-08-25T14:42:23Z | HIGH | 7.8 | {'CWE-20'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://github.com/advisories/GHSA-g25h-jr74-qp5j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663'} | null |
GHSA | GHSA-m2q3-53fq-7h66 | Moderate severity vulnerability that affects gollum | The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check. | {'CVE-2015-7314'} | 2021-09-14T22:05:23Z | 2018-08-28T22:33:51Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/gollum/gollum/issues/1070', 'http://www.openwall.com/lists/oss-security/2015/09/22/12', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66'} | null |
GHSA | GHSA-qc55-vm3j-74gp | JSNAPy allows unprivileged local users to alter files under the directory | JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github. | {'CVE-2018-0023'} | 2022-04-26T18:07:44Z | 2018-07-12T20:30:36Z | MODERATE | 5.5 | {'CWE-276'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-0023', 'https://kb.juniper.net/JSA10856', 'http://www.securityfocus.com/bid/103745', 'https://github.com/advisories/GHSA-qc55-vm3j-74gp'} | null |
GHSA | GHSA-gpfj-4j6g-c4w9 | Clipboard-based DOM-XSS | ### Impact
A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected.
The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**.
```typescript
function generateText(transfer: DataTransfer): string | undefined {
if (Array.from(transfer.types).indexOf('text/html') === -1) return
let html = transfer.getData('text/html')
if (!/<table/i.test(html)) return
html = html.replace(/<meta.*?>/, '')
const el = document.createElement('div')
el.innerHTML = html
const tables = el.querySelectorAll('table')
for (const table of tables) {
if (table.closest('[data-paste-markdown-skip]')) {
table.replaceWith(new Text(table.textContent || ''))
}
const formattedTable = tableMarkdown(table)
table.replaceWith(new Text(formattedTable))
}
return el.innerHTML
}
```
### Patches
A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4).
### Workarounds
A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers.
<!--
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
*
-->
| {'CVE-2021-37700'} | 2022-04-19T19:03:05Z | 2021-08-12T20:42:17Z | MODERATE | 6.5 | {'CWE-79'} | {'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://www.npmjs.com/package/@github/paste-markdown', 'https://github.com/advisories/GHSA-gpfj-4j6g-c4w9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4'} | null |
GHSA | GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | {'CVE-2020-7791'} | 2021-05-10T15:32:30Z | 2020-12-14T19:50:22Z | MODERATE | 7.5 | {'CWE-20', 'CWE-400'} | {'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-hfvc-g252-rp4g', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E'} | null |
GHSA | GHSA-38h8-x697-gh8q | Tmp files readable by other users in sync-exec | Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.
## Recommendation
There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.
The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`. | {'CVE-2017-16024'} | 2021-01-08T20:02:12Z | 2018-11-09T17:45:30Z | MODERATE | 0 | {'CWE-377'} | {'https://github.com/gvarsanyi/sync-exec/issues/17', 'https://www.npmjs.com/advisories/310', 'https://cwe.mitre.org/data/definitions/377.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024', 'https://github.com/advisories/GHSA-38h8-x697-gh8q', 'https://nodesecurity.io/advisories/310', 'https://www.owasp.org/index.php/Insecure_Temporary_File'} | null |
GHSA | GHSA-6qc7-jgq7-34rf | Malicious Package in exprss | All versions of `exprss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:02:33Z | 2020-09-02T20:18:18Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/851', 'https://github.com/advisories/GHSA-6qc7-jgq7-34rf'} | null |
GHSA | GHSA-x64g-wjmw-w328 | Moderate severity vulnerability that affects ironic-discoverd | OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. | {'CVE-2015-5306'} | 2021-09-21T22:14:37Z | 2019-07-05T21:10:52Z | MODERATE | 0 | null | {'https://bugs.launchpad.net/ironic-inspector/+bug/1506419', 'https://access.redhat.com/errata/RHSA-2015:1929', 'http://rhn.redhat.com/errata/RHSA-2015-2685.html', 'https://github.com/advisories/GHSA-x64g-wjmw-w328', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5306', 'https://bugzilla.redhat.com/show_bug.cgi?id=1273698'} | null |
GHSA | GHSA-qh3m-qw6v-qvhg | Moderate severity vulnerability that affects io.vertx:vertx-core | In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema. | {'CVE-2018-12544'} | 2021-01-08T01:58:37Z | 2018-10-17T16:20:32Z | MODERATE | 0 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-12544', 'https://github.com/vert-x3/vertx-web/issues/1021', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568', 'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg', 'https://access.redhat.com/errata/RHSA-2018:2946'} | null |
GHSA | GHSA-p68v-frgx-4rjp | Denial of Service via Cache Flooding | ### Impact
Denial of Service via Cache Flooding
### Patches
We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020 | null | 2021-09-21T16:32:48Z | 2020-10-19T21:34:14Z | LOW | 0 | {'CWE-400'} | {'https://github.com/shopware/platform/security/advisories/GHSA-p68v-frgx-4rjp', 'https://github.com/advisories/GHSA-p68v-frgx-4rjp'} | null |
GHSA | GHSA-pxcf-v868-m492 | Injection and Cross-site Scripting in osm-static-maps | This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read. | {'CVE-2020-7749'} | 2021-08-02T15:31:50Z | 2021-05-10T18:43:45Z | HIGH | 7.6 | {'CWE-74', 'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://github.com/advisories/GHSA-pxcf-v868-m492', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749'} | null |
GHSA | GHSA-9prh-257w-9277 | Cross-Site Scripting in handlebars | Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted.
## Proof of Concept
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 4.0.0 or later.
Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes. | {'CVE-2015-8861'} | 2021-09-08T20:16:46Z | 2018-10-23T17:20:12Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/', 'https://github.com/wycats/handlebars.js/pull/1083', 'https://github.com/advisories/GHSA-9prh-257w-9277', 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861', 'https://www.tenable.com/security/tns-2016-18', 'https://www.npmjs.com/advisories/61', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'http://www.securityfocus.com/bid/96434'} | null |
GHSA | GHSA-jgpq-g82g-6c39 | confinit vulnerable to prototype pollution | confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. | {'CVE-2020-7638'} | 2021-07-28T23:16:45Z | 2020-04-07T15:52:05Z | MODERATE | 5.3 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://github.com/advisories/GHSA-jgpq-g82g-6c39', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab', 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433'} | null |
GHSA | GHSA-rfmf-rx8w-935w | High severity vulnerability that affects sounder | lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename. | {'CVE-2013-5647'} | 2021-09-17T17:46:05Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-5647', 'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html', 'https://github.com/advisories/GHSA-rfmf-rx8w-935w'} | null |
GHSA | GHSA-fj58-h2fr-3pp2 | SQL Injection and Cross-site Scripting in class-validator | In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product. | {'CVE-2019-18413'} | 2021-11-12T18:14:47Z | 2021-10-12T16:35:45Z | MODERATE | 9.8 | {'CWE-89', 'CWE-79'} | {'https://github.com/typestack/class-validator#passing-options', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413', 'https://github.com/advisories/GHSA-fj58-h2fr-3pp2', 'https://github.com/typestack/class-validator/issues/438', 'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471'} | null |
GHSA | GHSA-96jq-75wh-2658 | Moderate severity vulnerability that affects apache axis | Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. | {'CVE-2018-8032'} | 2021-11-17T21:27:30Z | 2018-10-16T20:51:15Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E', 'https://issues.apache.org/jira/browse/AXIS-2924', 'https://github.com/advisories/GHSA-96jq-75wh-2658', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
GHSA | GHSA-4jg2-84c2-pj95 | Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina | ### Impact
Anyone who is using the default presets and/or does not handle the functionality themself.
### Patches
It has not been patched yet.
### Workarounds
Fully custom presets that change the entire rendering process which can then escape the user input.
### For more information
Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity.
```ts
const jsonSchemaDoc = {
$id: 'CustomClass',
type: 'object',
properties: {
'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' },
}
};
generator = new TypeScriptGenerator(
{
presets: [
{
class: {
property({ propertyName, content }) {
return `private ${propertyName}: any;`;
},
ctor() {
return '';
},
getter() {
return '';
},
setter() {
return '';
}
}
}
]
}
);
const inputModel = await generator.process(jsonSchemaDoc);
```
This would render
```ts
export class CustomClass {
private property: any;
constructor(){console.log("injected")}
private _temp: any;
private additionalProperties: any;
}
``` | null | 2022-04-19T19:03:07Z | 2021-09-21T18:41:59Z | CRITICAL | 0 | {'CWE-94'} | {'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95', 'https://github.com/advisories/GHSA-4jg2-84c2-pj95'} | null |
GHSA | GHSA-8w74-g84v-c5w8 | Directory Traversal in chatbyvista | Affected versions of `chatbyvista` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16177'} | 2021-01-14T15:38:40Z | 2020-09-01T18:52:26Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16177', 'https://github.com/advisories/GHSA-8w74-g84v-c5w8', 'https://www.npmjs.com/advisories/462', 'https://nodesecurity.io/advisories/462'} | null |
GHSA | GHSA-jjhw-5mxp-2g2q | Cross-site Scripting in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms. | {'CVE-2021-25933'} | 2021-05-28T22:27:51Z | 2021-05-25T18:47:01Z | MODERATE | 4.8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/advisories/GHSA-jjhw-5mxp-2g2q', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'} | null |
GHSA | GHSA-gvcj-pfq2-wxj7 | High severity vulnerability that affects electron | Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line. | {'CVE-2016-1202'} | 2021-09-13T12:46:47Z | 2017-10-24T18:33:35Z | HIGH | 7.8 | {'CWE-426'} | {'https://github.com/electron/electron/pull/2976', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202', 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7'} | null |
GHSA | GHSA-mh3m-8c74-74xh | Denial of Service in graphql-go | ### Impact
This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. To make things worse the only mitigation in affected versions creates opportunities for other attacks. This issue is only available if you are using `graphql.MaxDepth` option in your schema (which is highly recommended in most cases).
### Patches
The issue has been patched in version `v1.3.0`. We have been trying to maintain backwards compatibility and avoid breaking changes so upgrading should not be problematic.
### Workarounds
The best workaround is to patch to a version greater than or equal to `v1.3.0`.
Otherwise, the only workaround in versions prior to `v1.3.0` is to disable the `graphql.MaxDepth` option from your schema. Unfortunately, this could potentially create opportunities for other attacks.
### References
There are no references or links. This issue was reported privately and was fixed before creating this Security Advisory.
### For more information
If you have any questions or comments feel free to reach out to @pavelnikolov or @tony on the Gopher Slack. | {'CVE-2022-21708'} | 2022-04-19T19:03:20Z | 2022-01-27T15:28:06Z | MODERATE | 6.5 | {'CWE-400'} | {'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe', 'https://github.com/advisories/GHSA-mh3m-8c74-74xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'} | null |
GHSA | GHSA-w3pp-wp5v-fjvp | Malicious Package in mogodb | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:20:20Z | 2020-09-03T19:51:18Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1133', 'https://github.com/advisories/GHSA-w3pp-wp5v-fjvp'} | null |
GHSA | GHSA-6w5m-jgc5-8cgc | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0159'} | 2022-01-21T23:57:49Z | 2022-01-21T23:57:49Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/advisories/GHSA-6w5m-jgc5-8cgc'} | null |
GHSA | GHSA-7m27-3587-83xf | Privilege Defined With Unsafe Actions in Keycloak | A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user. | {'CVE-2019-10170'} | 2021-10-21T17:46:27Z | 2021-10-21T17:46:27Z | HIGH | 7.2 | {'CWE-267'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170', 'https://github.com/advisories/GHSA-7m27-3587-83xf'} | null |
GHSA | GHSA-xw7c-jx9m-xh5g | Reflected cross-site scripting issue in Datasette | ### Impact
The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability.
This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data.
### Patches
Datasette 0.57 and 0.56.1 both include patches for this issue.
### Workarounds
If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters.
### References
- [OWASP guide to reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks)
- [Datasette issue #1360](https://github.com/simonw/datasette/issues/1360)
### For more information
If you have any questions or comments about this advisory:
* Open a discussion in [simonw/datasette](https://github.com/simonw/datasette/discussions)
* Email us at `swillison+datasette @ gmail.com`
| null | 2021-10-05T17:23:34Z | 2021-06-07T21:47:41Z | HIGH | 7.2 | {'CWE-79'} | {'https://github.com/advisories/GHSA-xw7c-jx9m-xh5g', 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'} | null |
GHSA | GHSA-86r3-4gq8-xw8q | Remote Code Execution in Laravel | A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Capsule\Manager.php, and (3) __invoke in mockery\library\Mockery\ClosureWrapper.php. | {'CVE-2021-43503'} | 2022-04-17T17:14:14Z | 2022-04-09T00:00:25Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-86r3-4gq8-xw8q', 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'} | null |
GHSA | GHSA-qvjc-g5vr-mfgr | Regular Expression Denial of Service in papaparse | Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
## Recommendation
Upgrade to version 5.2.0 or later. | null | 2021-10-04T21:11:40Z | 2020-09-04T18:03:04Z | HIGH | 7.5 | {'CWE-185'} | {'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258', 'https://github.com/advisories/GHSA-qvjc-g5vr-mfgr', 'https://www.npmjs.com/advisories/1515', 'https://github.com/mholt/PapaParse/issues/777'} | null |
GHSA | GHSA-6q5w-m3c5-rv95 | Data races in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor. | {'CVE-2020-35866'} | 2021-08-25T20:47:59Z | 2021-08-25T20:47:59Z | CRITICAL | 9.8 | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35866', 'https://github.com/advisories/GHSA-6q5w-m3c5-rv95', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'} | null |
GHSA | GHSA-cf36-985g-v73c | Moderate severity vulnerability that affects omniauth-facebook | The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter. | {'CVE-2013-4562'} | 2021-09-08T22:01:45Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-352'} | {'http://seclists.org/oss-sec/2013/q4/267', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt', 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://seclists.org/oss-sec/2013/q4/264', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://www.osvdb.org/99693', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562'} | null |
GHSA | GHSA-4286-h47h-m5v6 | Improper Authentication in showdoc | ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions. | {'CVE-2021-41745'} | 2021-10-28T17:10:57Z | 2021-10-25T19:43:24Z | HIGH | 0 | {'CWE-287', 'CWE-434'} | {'https://github.com/advisories/GHSA-4286-h47h-m5v6', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability', 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} | null |
GHSA | GHSA-6fmv-q269-55cw | Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit template.
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by Aquilao Null | {'CVE-2020-15277'} | 2022-04-19T19:02:38Z | 2020-10-30T17:05:59Z | HIGH | 7.2 | {'CWE-434', 'CWE-74'} | {'https://github.com/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw'} | null |
GHSA | GHSA-557g-r22w-9wvx | Incorrect Permission Assignment for Critical Resource in Singularity | An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host. | {'CVE-2019-11328'} | 2021-12-20T18:25:33Z | 2021-12-20T18:25:33Z | HIGH | 8.8 | {'CWE-269'} | {'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/', 'http://www.openwall.com/lists/oss-security/2019/05/16/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328', 'https://github.com/advisories/GHSA-557g-r22w-9wvx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/', 'http://www.securityfocus.com/bid/108360', 'https://github.com/sylabs/singularity/releases/tag/v3.2.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'} | null |
GHSA | GHSA-7f92-rr6w-cq64 | Storage corruption due to variables overwritten by re-entrancy locks | ### Background
When attempting to use the v0.2.14 release, @pandadefi discovered an issue using the `@nonreentrant` decorator.
### Impact
Reentrancy protection storage slots get allocated to the same slots as storage variables, leading to the corruption of storage variables when using the `@nonreentrant` decorator.
### Patches
This issue was fixed in v0.2.15 in #2391, #2379
### Workarounds
Don't use the `@nonreentrant` decorator in these versions. | null | 2022-04-19T19:03:04Z | 2021-08-05T16:57:42Z | HIGH | 0 | null | {'https://github.com/vyperlang/vyper/security/advisories/GHSA-7f92-rr6w-cq64', 'https://github.com/vyperlang/vyper/pull/2391', 'https://github.com/advisories/GHSA-7f92-rr6w-cq64', 'https://github.com/vyperlang/vyper/pull/2379'} | null |
GHSA | GHSA-vrxp-mg9f-hwf3 | Improperly Implemented path matching for in-toto-golang | ### Impact
Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).
### Patches
The problem has been fixed in version 0.3.0.
### Workarounds
Exploiting this vulnerability is dependent on the specific policy applied.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang)
* Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com)
* If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
| {'CVE-2021-41087'} | 2022-04-19T19:03:09Z | 2021-09-22T20:37:09Z | MODERATE | 5.6 | {'CWE-22', 'CWE-345'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41087', 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3', 'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290', 'https://github.com/advisories/GHSA-vrxp-mg9f-hwf3'} | null |
GHSA | GHSA-6757-jp84-gxfx | Improper Input Validation in PyYAML | A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor. | {'CVE-2020-1747'} | 2021-09-01T22:05:35Z | 2021-04-20T16:14:24Z | HIGH | 9.8 | {'CWE-20'} | {'https://github.com/advisories/GHSA-6757-jp84-gxfx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html', 'https://github.com/yaml/pyyaml/pull/386', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'} | null |
GHSA | GHSA-fpf2-pr3j-4cm3 | Malicious Package in ecruve | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:01:31Z | 2020-09-03T17:06:06Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-fpf2-pr3j-4cm3', 'https://www.npmjs.com/advisories/1395'} | null |
GHSA | GHSA-55j9-849x-26h4 | Remote Code Execution in Red Discord Bot | ### Impact
A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This critical exploit has been fixed on version 3.3.11.
### Workarounds
Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue.
### References
https://github.com/Cog-Creators/Red-DiscordBot/pull/4175
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | {'CVE-2020-15140'} | 2022-04-19T19:02:32Z | 2020-08-21T16:30:52Z | HIGH | 8.2 | {'CWE-74'} | {'https://github.com/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15140'} | null |
GHSA | GHSA-qf6q-qfwp-vp44 | Origin Validation Error in Magento 2 | An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments. | {'CVE-2020-8818'} | 2021-10-12T16:30:58Z | 2021-10-12T16:30:58Z | HIGH | 8.1 | {'CWE-346'} | {'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818', 'https://github.com/advisories/GHSA-qf6q-qfwp-vp44', 'https://github.com/cardgate/magento2/releases/tag/v2.0.33', 'https://github.com/cardgate/magento2/issues/54', 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'} | null |
GHSA | GHSA-ch6p-4jcm-h8vh | Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core | Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability." | {'CVE-2017-0248'} | 2021-04-05T15:52:17Z | 2018-10-16T19:58:52Z | MODERATE | 0 | {'CWE-295'} | {'http://www.securityfocus.com/bid/98117', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248', 'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248', 'http://www.securitytracker.com/id/1038458'} | null |
GHSA | GHSA-x2rg-fmcv-crq5 | Moderate severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites." | {'CVE-2017-9822'} | 2021-09-21T21:55:19Z | 2018-10-16T19:34:22Z | HIGH | 8.8 | {'CWE-20'} | {'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'http://www.securityfocus.com/bid/102213'} | null |
GHSA | GHSA-7w54-gp8x-f33m | Potential exposure of tokens to an Unauthorized Actor | ### Impact
When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account).
### Patches
This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one.
### Workarounds
Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`:
```typescript
const connectOptions: ConnectArgs = {
// ...
pollingHost: 'gp-v2.replit.com',
};
client.connect(connectOptions);
```
### For more information
Thanks to https://hackerone.com/orlserg for disclosing this.
If you have any questions or comments about this advisory:
* Open an issue in [replit/crosis](https://github.com/replit/crosis)
* Email us at [security@replit.com](mailto:security@replit.com) | {'CVE-2022-21671'} | 2022-01-25T17:03:48Z | 2022-01-12T22:44:47Z | HIGH | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671', 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m'} | null |
GHSA | GHSA-4g4p-42wc-9f3m | Git LFS can execute a Git binary from the current directory | ### Impact
On Windows, if Git LFS operates on a malicious repository with a `git.bat` or `git.exe` file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
This occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator.
### Patches
This version should be patched in v2.12.1, which will be released in coordination with this security advisory.
### Workarounds
Other than avoiding untrusted repositories, there is no workaround.
### For more information
If you have any questions or comments about this advisory:
* Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions).
* If you cannot open a discussion, please email the core team using their usernames at `github.com`.
| {'CVE-2020-27955'} | 2022-04-20T16:25:04Z | 2022-02-11T23:39:18Z | CRITICAL | 9.8 | {'CWE-427'} | {'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-4g4p-42wc-9f3m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27955', 'https://github.com/advisories/GHSA-4g4p-42wc-9f3m', 'http://seclists.org/fulldisclosure/2020/Nov/1', 'https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html', 'https://github.com/git-lfs/git-lfs/releases'} | null |
GHSA | GHSA-4hjg-w3ww-38c6 | Malicious Package in tiar | All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T20:02:00Z | 2020-09-03T18:03:49Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-4hjg-w3ww-38c6', 'https://www.npmjs.com/advisories/1064'} | null |
GHSA | GHSA-ffjh-fjgg-mfpq | Moderate severity vulnerability that affects org.apache.ranger:ranger | In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table. | {'CVE-2017-7677'} | 2021-09-10T18:07:44Z | 2018-10-17T17:22:49Z | MODERATE | 5.9 | {'CWE-862'} | {'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677', 'http://www.securityfocus.com/bid/98961'} | null |
GHSA | GHSA-jmhf-9fj8-88gh | Open Redirect in AllTube | ### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a
* https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/
* https://nvd.nist.gov/vuln/detail/CVE-2022-0692 | {'CVE-2022-0692'} | 2022-04-19T19:03:24Z | 2022-02-23T21:15:01Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-jmhf-9fj8-88gh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | null |
GHSA | GHSA-c53v-qmrx-93hg | Open redirect in shopware | ### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
| {'CVE-2022-21651'} | 2022-01-06T23:49:19Z | 2022-01-06T23:49:19Z | MODERATE | 6.8 | {'CWE-601'} | {'https://github.com/advisories/GHSA-c53v-qmrx-93hg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | null |
GHSA | GHSA-qw3g-35hc-fcrh | Cross-Site Scripting (XSS) in restify | Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.
## Proof of Concept:
Request
```
https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E
```
Will be included in response:
```<script>alert(73541);</script>```
## Recommendation
Update to version 4.1.0 or later. | {'CVE-2017-16018'} | 2021-01-08T21:10:39Z | 2018-11-09T17:45:38Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/restify/node-restify/issues/1018', 'https://nodesecurity.io/advisories/314', 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16018', 'https://www.npmjs.com/advisories/314'} | null |
GHSA | GHSA-h9w3-f7x6-v54c | Deserialization of Untrusted Data in com.jsoniter:jsoniter | # Withdrawn
was withdrawn by its CNA. Further investigation showed that it was not a security issue.
## Original Description
All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution. | {'CVE-2021-23441'} | 2021-10-28T16:15:49Z | 2021-09-20T23:18:54Z | HIGH | 7 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23441', 'https://snyk.io/vuln/SNYK-JAVA-COMJSONITER-1316198', 'https://github.com/advisories/GHSA-h9w3-f7x6-v54c'} | null |
GHSA | GHSA-rpg7-q4cv-p466 | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4123'} | 2022-01-04T18:52:37Z | 2021-12-17T20:00:16Z | MODERATE | 6.5 | {'CWE-352'} | {'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/advisories/GHSA-rpg7-q4cv-p466', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'} | null |
GHSA | GHSA-8222-6fc8-mhvf | Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml | Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | {'CVE-2019-3773'} | 2021-06-15T16:59:21Z | 2019-01-25T16:18:52Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-8222-6fc8-mhvf', 'https://pivotal.io/security/cve-2019-3773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
GHSA | GHSA-6hwh-rqwf-cxxr | Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util | vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype. | {'CVE-2019-10806'} | 2021-07-28T18:36:57Z | 2021-05-07T16:32:02Z | MODERATE | 4.3 | {'CWE-20', 'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://github.com/advisories/GHSA-6hwh-rqwf-cxxr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10806'} | null |
GHSA | GHSA-rprw-h62v-c2w7 | High severity vulnerability that affects pyyaml | In PyYAML before 4.1, the yaml.load() API could execute arbitrary code. In other words, yaml.safe_load is not used. | {'CVE-2017-18342'} | 2022-03-23T20:09:15Z | 2019-01-04T17:45:26Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-18342', 'https://security.gentoo.org/glsa/202003-45', 'https://github.com/advisories/GHSA-rprw-h62v-c2w7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/', 'https://github.com/yaml/pyyaml/pull/74', 'https://github.com/yaml/pyyaml/issues/193', 'https://github.com/yaml/pyyaml/blob/master/CHANGES', 'https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/', 'https://github.com/marshmallow-code/apispec/issues/278'} | null |
GHSA | GHSA-fgmx-8h93-26fh | Moderate severity vulnerability that affects omniauth-oauth2 | Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state. | {'CVE-2012-6134'} | 2021-09-10T18:16:06Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-352'} | {'https://gist.github.com/homakov/3673012', 'https://github.com/advisories/GHSA-fgmx-8h93-26fh', 'http://rubysec.github.io/advisories/CVE-2012-6134/', 'http://seclists.org/oss-sec/2013/q1/304', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134', 'https://github.com/intridea/omniauth-oauth2/pull/25', 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'} | null |
GHSA | GHSA-9m6j-fcg5-2442 | Path traversal in url-parse | url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path. | {'CVE-2021-27515'} | 2021-05-06T16:31:23Z | 2021-05-06T16:10:51Z | HIGH | 5.3 | {'CWE-23'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/advisories/GHSA-9m6j-fcg5-2442', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://github.com/unshiftio/url-parse/pull/197', 'https://advisory.checkmarx.net/advisory/CX-2021-4306'} | null |
GHSA | GHSA-74f5-4m28-gq5c | Directory Traversal in peiserver | Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16214'} | 2021-01-14T15:46:13Z | 2020-09-01T18:09:59Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-74f5-4m28-gq5c', 'https://www.npmjs.com/advisories/420', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214', 'https://nodesecurity.io/advisories/420', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.