ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-q4qf-3fc6-8x34
Segfault and data corruption in tensorflow-lite
### Impact To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72 If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. ### Patches We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15207'}
2021-11-19T15:11:40Z
2020-09-25T18:28:43Z
HIGH
8.7
{'CWE-119', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207'}
null
GHSA
GHSA-rr77-w4w8-w8wp
Directory Traversal in tencent-server
Affected versions of `tencent-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16216'}
2021-01-14T15:45:48Z
2020-09-01T17:37:46Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16216', 'https://nodesecurity.io/advisories/418', 'https://github.com/advisories/GHSA-rr77-w4w8-w8wp', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server', 'https://www.npmjs.com/advisories/418'}
null
GHSA
GHSA-hwch-749c-rv63
Potential Command Injection in hubot-scripts
Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module. ### Mitigating Factors The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts. ## Recommendation Update hubot-scripts to version 2.4.4 or later.
{'CVE-2013-7378'}
2021-04-12T21:34:55Z
2020-08-31T22:46:38Z
CRITICAL
9.8
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7378', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/13', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'https://web.archive.org/web/20140731222413/https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'https://github.com/advisories/GHSA-hwch-749c-rv63', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-8vv3-jxm8-f4vf
Prototype Pollution in connie-lang
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
{'CVE-2020-7706'}
2021-07-29T22:00:16Z
2021-05-06T17:29:25Z
CRITICAL
9.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853', 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://github.com/advisories/GHSA-8vv3-jxm8-f4vf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7706'}
null
GHSA
GHSA-q347-cg56-pcq4
SSRF in repository migration
### Impact The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. ### Patches Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. ### Workarounds Run Gogs in its own private network. ### References https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/ ### For more information If you have any questions or comments about this advisory, please post on #6754.
null
2022-04-19T19:03:27Z
2022-03-14T22:57:00Z
MODERATE
5
{'CWE-918'}
{'https://github.com/advisories/GHSA-q347-cg56-pcq4', 'https://github.com/gogs/gogs/security/advisories/GHSA-q347-cg56-pcq4', 'https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/'}
null
GHSA
GHSA-5w65-6875-rhq8
Undefined Behavior in sailsjs-cacheman
All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-21T17:05:45Z
2019-09-11T23:01:57Z
LOW
0
null
{'https://www.npmjs.com/advisories/752', 'https://github.com/advisories/GHSA-5w65-6875-rhq8', 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
null
GHSA
GHSA-g489-xrw3-3v8w
Data races in aovec
An issue was discovered in the aovec crate through 2020-12-10 for Rust. Because Aovec<T> does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur.
{'CVE-2020-36207'}
2021-08-25T20:50:46Z
2021-08-25T20:50:46Z
HIGH
7
{'CWE-662', 'CWE-787'}
{'https://github.com/advisories/GHSA-g489-xrw3-3v8w', 'https://rustsec.org/advisories/RUSTSEC-2020-0099.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36207'}
null
GHSA
GHSA-h68q-55jf-x68w
Prototype pollution in chart.js
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
{'CVE-2020-7746'}
2021-08-02T15:36:23Z
2021-05-10T18:47:53Z
HIGH
7.5
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375', 'https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374', 'https://github.com/advisories/GHSA-h68q-55jf-x68w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7746', 'https://github.com/chartjs/Chart.js/pull/7920', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376'}
null
GHSA
GHSA-mc36-5m36-hjh5
Data races in slock
An issue was discovered in the slock crate through 2020-11-17 for Rust. Slock<T> unconditionally implements Send and Sync.
{'CVE-2020-36455'}
2021-08-25T20:58:00Z
2021-08-25T20:58:00Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/advisories/GHSA-mc36-5m36-hjh5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36455', 'https://github.com/BrokenLamp/slock-rs/issues/2', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/slock/RUSTSEC-2020-0135.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}
null
GHSA
GHSA-34gh-3cwv-wvp2
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function.
{'CVE-2020-7683'}
2021-09-23T17:29:24Z
2020-07-29T18:07:11Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-34gh-3cwv-wvp2', 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}
null
GHSA
GHSA-xfmw-2vmm-579c
Hijacked Environment Variables in nodesass
The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16080'}
2021-01-14T15:32:47Z
2020-09-01T18:59:50Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-xfmw-2vmm-579c', 'https://nodesecurity.io/advisories/519', 'https://www.npmjs.com/advisories/519', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080'}
null
GHSA
GHSA-wmrx-57hm-mw7r
Arbitrary file reads in HashiCorp Nomad
Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root. There are currently no known workarounds. Users are recommended to upgrade as soon as possible to avoid this issue.
{'CVE-2022-24683'}
2022-03-24T22:47:40Z
2022-02-18T00:00:34Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24683', 'https://github.com/advisories/GHSA-wmrx-57hm-mw7r', 'https://discuss.hashicorp.com', 'https://security.netapp.com/advisory/ntap-20220318-0008/', 'https://discuss.hashicorp.com/t/hcsec-2022-02-nomad-alloc-filesystem-and-container-escape/35560'}
null
GHSA
GHSA-p62r-jf56-h429
Malicious Package in evil-package
All versions of `evil-package` contain malicious code. The package uploads the contents of `process.env` to `example.com/log`. ## Recommendation Remove the package from your environment. Given the host where the information was uploaded to there is no further indication of compromise.
null
2021-09-29T20:31:18Z
2020-09-03T20:29:58Z
CRITICAL
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-p62r-jf56-h429', 'https://www.npmjs.com/advisories/1162'}
null
GHSA
GHSA-9x4c-63pf-525f
Arbitrary Code Generation
### Impact Clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution. Giving this a CVSS of 8.0 (high) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C . ### Patches Fix will be included in version 0.5.3 ### Workarounds Inspect OpenAPI documents before generating, or inspect generated code before executing. ### For more information If you have any questions or comments about this advisory: * Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues) * Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com)
{'CVE-2020-15142'}
2022-04-19T19:02:33Z
2020-08-20T14:38:24Z
HIGH
8
{'CWE-94'}
{'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a', 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-9x4c-63pf-525f', 'https://pypi.org/project/openapi-python-client/', 'https://github.com/advisories/GHSA-9x4c-63pf-525f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15142'}
null
GHSA
GHSA-qh62-ch95-63wh
python-gnupg allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended
**Withdrawn:** Duplicate of GHSA-2fch-jvg5-crf6
{'CVE-2019-6690'}
2020-06-16T20:25:51Z
2020-03-13T20:05:10Z
MODERATE
0
null
{'https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/', 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/', 'https://pypi.org/project/python-gnupg/#history', 'http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html', 'https://github.com/advisories/GHSA-qh62-ch95-63wh', 'http://www.securityfocus.com/bid/106756', 'https://seclists.org/bugtraq/2019/Jan/41', 'https://bitbucket.org/vinay.sajip/python-gnupg/commits/1a5196800604c05f9e347110b4ecca538ba68cdc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6690', 'https://usn.ubuntu.com/3964-1/', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html'}
null
GHSA
GHSA-h376-j262-vhq6
RCE in H2 Console
### Impact H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI. H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) wasn't set, an intruder can load own custom class and execute its code in a process with H2 Console (H2 Server process or a web server with H2 Console servlet). It is also possible to load them by creation a linked table in these versions, but it requires `ADMIN` privileges and user with `ADMIN` privileges has full access to the Java process by design. These privileges should never be granted to untrusted users. ### Patches Since version 2.0.206 H2 Console and linked tables explicitly forbid attempts to specify LDAP URLs for JNDI. Only local data sources can be used. ### Workarounds H2 Console should never be available to untrusted users. `-webAllowOthers` is a dangerous setting that should be avoided. H2 Console Servlet deployed on a web server can be protected with a security constraint: https://h2database.com/html/tutorial.html#usingH2ConsoleServlet If `webAllowOthers` is specified, you need to uncomment and edit `<security-role>` and `<security-constraint>` as necessary. See documentation of your web server for more details. ### References This issue was found and privately reported to H2 team by [JFrog Security](https://www.jfrog.com/)'s vulnerability research team with detailed information.
{'CVE-2021-42392'}
2022-04-22T15:35:52Z
2022-01-06T23:55:09Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42392', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20220119-0001/', 'https://github.com/advisories/GHSA-h376-j262-vhq6', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://github.com/h2database/h2database/releases/tag/version-2.0.206', 'https://www.debian.org/security/2022/dsa-5076', 'https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/', 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6'}
null
GHSA
GHSA-fm4j-4xhm-xpwx
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors. ## Proof of concept ``` var Sandbox = require("sandbox") s = new Sandbox() code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")` s.run(code) ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-09-02T15:51:34Z
2020-09-02T15:51:34Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-fm4j-4xhm-xpwx', 'https://github.com/gf3/sandbox/issues/50', 'https://www.npmjs.com/advisories/766'}
null
GHSA
GHSA-q3x2-jvp3-wj78
Unrestricted XML files leading to cross-site scripting in Microweber
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
{'CVE-2022-0963'}
2022-03-29T21:18:46Z
2022-03-16T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0963', 'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://github.com/advisories/GHSA-q3x2-jvp3-wj78', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c'}
null
GHSA
GHSA-98pq-pmw9-4gpm
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2016-10550'}
2021-01-08T19:05:38Z
2019-02-18T23:54:34Z
HIGH
0
{'CWE-89'}
{'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://nodesecurity.io/advisories/112'}
null
GHSA
GHSA-w8h4-vw8f-rvvj
Improper Control of Dynamically-Managed Code Resources in config-shield
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
{'CVE-2021-26276'}
2022-04-27T20:27:31Z
2021-04-13T15:30:09Z
MODERATE
5.3
{'CWE-913'}
{'https://advisory.checkmarx.net/advisory/CX-2021-4773', 'https://github.com/advisories/GHSA-w8h4-vw8f-rvvj', 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}
null
GHSA
GHSA-w5p7-h5w8-2hfq
Regular Expression Denial of Service in trim
All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
{'CVE-2020-7753'}
2022-04-27T19:19:29Z
2021-05-10T18:44:22Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-TRIM-1017038', 'https://github.com/component/trim/blob/master/index.js', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132', 'https://lists.apache.org/thread.html/rb8462df3b6484e778905c09cd49a8912e1a302659860017ebe36da03@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r51ff3c2a4c7b8402f321eae7e624672cc2295c7bc8c12c8b871f6b0b@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r10faad1ef9166d37a1a5c9142b1af7099b8ecdc5ad05c51b8ea993d9@%3Ccommits.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-w5p7-h5w8-2hfq', 'https://github.com/component/trim/pull/8', 'https://lists.apache.org/thread.html/r75b8d0b88833d7d96afcdce3ead65e212572ead4e7a9f34d21040196@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7753', 'https://lists.apache.org/thread.html/rcc7c2865a52b544a8e49386c6880e9b9ab29bfce1052b5569d09ee4a@%3Ccommits.airflow.apache.org%3E', 'https://github.com/component/trim/blob/master/index.js%23L6'}
null
GHSA
GHSA-2w8g-m5j8-7m87
Zalgo-like output that crashes the server
### Impact _What kind of vulnerability is it? Who is impacted?_ [`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers. **Only NPM users that recently upgraded or installed the NPM package are affected.** Docker users seem to not be affected as the dependencies were bundled at the time of the build, which were tested. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Latest patch. `0.26.1` to be exact at the time of writing. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ You cannot get around this as it's related to dependencies. ### References _Are there any links users can visit to find out more?_ - https://github.com/Marak/colors.js/issues/289 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issues board](https://github.com/soketi/soketi/issues) * Email us at [alex@renoki.org](mailto:alex@renoki.org)
null
2022-01-12T21:45:59Z
2022-01-12T21:45:59Z
CRITICAL
0
null
{'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87', 'https://github.com/advisories/GHSA-2w8g-m5j8-7m87'}
null
GHSA
GHSA-wvcv-832q-fjg7
RSA weakness in tslite-ng
### Impact The code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, code in current (as of 0.8.0-alpha38) master https://github.com/tlsfuzzer/tlslite-ng/blob/0812ed60860fa61a6573b2c0e18771414958f46d/tlslite/utils/rsakey.py#L407-L441 and code in 0.7.5 branch https://github.com/tlsfuzzer/tlslite-ng/blob/acdde3161124d6ae37c506b3476aea9996d12e97/tlslite/utils/rsakey.py#L394-L425 has multiple ways in which it leaks information (for one, it aborts as soon as the plaintext doesn't start with 0x00, 0x02) about the decrypted ciphertext (both the bit length of the decrypted message as well as where the first unexpected byte lays). All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. All previous versions of tlslite-ng are vulnerable. ### Patches The patches to fix it are proposed in https://github.com/tlsfuzzer/tlslite-ng/pull/438 https://github.com/tlsfuzzer/tlslite-ng/pull/439 Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not be the case: https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the [security policy](https://github.com/tlsfuzzer/tlslite-ng/blob/master/SECURITY.md) of tlslite-ng. ### Workarounds There is no way to workaround this issue. ### References https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ ### For more information If you have any questions or comments about this advisory please open an issue in [tlslite-ng](https://github.com/tlsfuzzer/tlslite-ng/issues).
{'CVE-2020-26263'}
2022-04-19T19:02:42Z
2020-12-21T16:56:37Z
LOW
7.5
{'CWE-326'}
{'https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/pull/438', 'https://pypi.org/project/tlslite-ng/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26263', 'https://github.com/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368', 'https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/', 'https://github.com/tlsfuzzer/tlslite-ng/pull/439'}
null
GHSA
GHSA-2mm9-c2fx-c7m4
XSS in docsify
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
{'CVE-2021-23342'}
2021-03-15T23:55:40Z
2021-03-01T19:44:27Z
HIGH
0
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://www.npmjs.com/package/docsify', 'https://github.com/advisories/GHSA-2mm9-c2fx-c7m4'}
null
GHSA
GHSA-7px3-6f6g-hxcj
Moderate severity vulnerability that affects org.apache.solr:solr-core
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.
{'CVE-2018-8026'}
2021-09-03T21:01:45Z
2018-10-17T19:55:34Z
MODERATE
5.5
{'CWE-611'}
{'http://www.securityfocus.com/bid/104690', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026', 'https://security.netapp.com/advisory/ntap-20190307-0002/', 'https://issues.apache.org/jira/browse/SOLR-12450', 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E', 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj'}
null
GHSA
GHSA-59m2-j944-839w
Downloads Resources over HTTP in clang-extra
Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`. ## Recommendation No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future. The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10655'}
2021-01-08T19:50:59Z
2019-02-18T23:45:13Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-59m2-j944-839w', 'https://www.npmjs.com/advisories/265', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655', 'https://nodesecurity.io/advisories/265'}
null
GHSA
GHSA-3hvm-hgpw-rx4j
Path Traversal in knightjs
All versions of `knightjs` are vulnerable to Path Traversal. This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation. ## Recommendation As there is currently no fix for this module we recommend not using this module in production environments.
{'CVE-2018-16475'}
2021-01-08T20:01:15Z
2018-11-06T23:11:10Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://hackerone.com/reports/403707', 'https://www.npmjs.com/advisories/743', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'}
null
GHSA
GHSA-9w2p-5mgw-p94c
Integer overflow due to conversion to unsigned
### Impact The implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ```python import tensorflow as tf tf.raw_ops.QuantizeAndDequantizeV4Grad( gradients=[1.0,2.0], input=[1.0,1.0], input_min=[0.0], input_max=[10.0], axis=-100) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L126) uses the `axis` value as the size argument to `absl::InlinedVector` constructor. But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer. ### Patches We have patched the issue in GitHub commit [96f364a1ca3009f98980021c4b32be5fdcca33a1](https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, and TensorFlow 2.4.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37645'}
2021-08-25T14:43:37Z
2021-08-25T14:43:37Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/advisories/GHSA-9w2p-5mgw-p94c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37645', 'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c'}
null
GHSA
GHSA-prv2-xwr7-hr57
Uncontrolled Resource Consumption in rdf-graph-array
rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.
{'CVE-2019-10798'}
2021-04-13T15:23:21Z
2021-04-13T15:23:21Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798', 'https://github.com/advisories/GHSA-prv2-xwr7-hr57', 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}
null
GHSA
GHSA-3227-r97m-8j95
Relative Path Traversal in afire serve_static
### Impact This vulnerability effects the built-in afire serve_static extension allowing paths containing `//....` to bypass the previous path sanitation and request files in higher directories that should not be accessible. ### Patches The issue has been fixed in [afire 1.1.0](https://crates.io/crates/afire/1.1.0). If you can, just update to the newest version of afire. ### Workarounds If you can't update afire you can simply disallow paths containing `/..` with the following middleware. Make sure this is the last middleware added to the server so it runs first, stopping the bad requests. ```rust use afire::prelude::*; struct PathTraversalFix; impl Middleware for PathTraversalFix { fn pre(&self, req: Request) -> MiddleRequest { if req.path.replace("\\", "/").contains("/..") { return MiddleRequest::Send( Response::new() .status(400) .text("Paths containing `..` are not allowed"), ); } MiddleRequest::Continue } } ``` ```rust let mut server = Server::new(host, port); PathTraversalFix.attach(&mut server); ``` ### References You can read about the new changes to afire in 1.1.0 [here](https://connorcode.com/writing/afire/update-3) ### For more information If you have any questions or comments about this advisory you can email me or message me on discord. [[https://connorcode.com/contact](https://connorcode.com/contact)]
null
2022-04-22T20:16:47Z
2022-04-22T20:16:45Z
HIGH
0
{'CWE-22', 'CWE-34'}
{'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921', 'https://github.com/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/security/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/releases/tag/v1.1.0'}
null
GHSA
GHSA-p7jq-v8jp-j424
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadin.com/security/cve-2021-31406
{'CVE-2021-31406'}
2022-04-19T19:02:54Z
2021-04-19T14:50:38Z
MODERATE
4
{'CWE-208', 'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31406', 'https://github.com/vaadin/flow/pull/10157', 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424', 'https://vaadin.com/security/cve-2021-31406', 'https://github.com/advisories/GHSA-p7jq-v8jp-j424'}
null
GHSA
GHSA-9pgx-gcph-mpqr
XSS via the history parameter in SQL command
### Impact Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected. ### Patches Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds Use browser which encodes URL parameters (e.g. Chrome or Firefox). ### References https://sourceforge.net/p/adminer/bugs-and-features/775/ ### For more information If you have any questions or comments about this advisory: * Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
{'CVE-2020-35572'}
2022-04-19T19:02:47Z
2021-02-11T20:42:28Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/vrana/adminer', 'https://packagist.org/packages/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/news/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://github.com/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr'}
null
GHSA
GHSA-cm5x-837x-jf3c
Division by 0 in inplace operations
### Impact An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0: ```python import tensorflow as tf tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. ### Patches We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37660'}
2021-08-25T14:42:44Z
2021-08-25T14:42:44Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-cm5x-837x-jf3c', 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'}
null
GHSA
GHSA-5j2h-h5hg-3wf8
Moderate severity vulnerability that affects django
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.
{'CVE-2011-0696'}
2021-09-01T22:15:34Z
2018-07-23T19:51:10Z
MODERATE
0
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2011-0696', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0372', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html', 'http://secunia.com/advisories/43382', 'https://bugzilla.redhat.com/show_bug.cgi?id=676357', 'http://secunia.com/advisories/43426', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://www.vupen.com/english/advisories/2011/0439', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43297', 'http://secunia.com/advisories/43230', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0388', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8', 'http://www.securityfocus.com/bid/46296'}
null
GHSA
GHSA-88rc-3p98-rgvx
After order payment process manipulation in shopware/platform and shopware/core
### Impact After order payment process manipulation ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
null
2021-04-13T15:13:48Z
2021-04-13T15:13:48Z
CRITICAL
0
{'CWE-668'}
{'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx', 'https://github.com/advisories/GHSA-88rc-3p98-rgvx'}
null
GHSA
GHSA-2wx6-wc87-rmjm
GitHub personal access token leaking into temporary EasyBuild (debug) logs
### Impact The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files. Scope: * the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html); - as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories; * the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default); * the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully; * you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700); * the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone; * for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it; ### Patches The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248. This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.). **Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using "`eb --install-github-token --force`" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token). ### Workarounds * avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2; * don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them; * clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild ### References * https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue) * (release announcement to EasyBuild mailing list) ### For more information * Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework) * Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be)
{'CVE-2020-5262'}
2022-04-19T19:02:45Z
2020-03-19T17:29:58Z
MODERATE
7.7
{'CWE-532'}
{'https://github.com/easybuilders/easybuild-framework/pull/3249', 'https://github.com/advisories/GHSA-2wx6-wc87-rmjm', 'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262', 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9', 'https://github.com/easybuilders/easybuild-framework/pull/3248'}
null
GHSA
GHSA-8554-jxcw-454q
High severity vulnerability that affects webargs
An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests.
{'CVE-2019-9710'}
2021-09-03T22:58:26Z
2019-03-12T15:16:12Z
HIGH
8.1
{'CWE-362'}
{'https://github.com/marshmallow-code/webargs/issues/371', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9710', 'https://github.com/advisories/GHSA-8554-jxcw-454q', 'https://webargs.readthedocs.io/en/latest/changelog.html'}
null
GHSA
GHSA-56pc-6jqp-xqj8
Context isolation bypass in Electron
### Impact Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `11.0.0-beta.6` * `10.1.2` * `9.3.1` * `8.5.2` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-15215'}
2022-04-19T19:02:35Z
2020-10-06T17:46:40Z
LOW
5.6
{'CWE-668', 'CWE-693'}
{'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15215', 'https://github.com/advisories/GHSA-56pc-6jqp-xqj8'}
null
GHSA
GHSA-5f37-gxvh-23v6
Remote code execution in PHPMailer
### Impact The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \&quot; (backslash double quote) in a crafted `Sender` property. ### Patches Fixed in 5.2.18 ### Workarounds Filter and validate user input before passing it to internal functions. ### References https://nvd.nist.gov/vuln/detail/CVE-2016-10033 Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2016-10033'}
2021-08-19T19:41:00Z
2020-03-05T22:09:17Z
CRITICAL
9.8
{'CWE-77'}
{'https://www.exploit-db.com/exploits/40968/', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'https://www.exploit-db.com/exploits/41996/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6', 'https://www.exploit-db.com/exploits/40969/', 'http://www.securitytracker.com/id/1037533', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml', 'http://seclists.org/fulldisclosure/2016/Dec/78', 'https://www.exploit-db.com/exploits/42221/', 'https://www.exploit-db.com/exploits/42024/', 'http://www.securityfocus.com/bid/95108', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18', 'http://www.securityfocus.com/archive/1/539963/100/0/threaded', 'https://www.drupal.org/psa-2016-004', 'https://www.exploit-db.com/exploits/40970/', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10033', 'https://www.exploit-db.com/exploits/41962/', 'https://www.exploit-db.com/exploits/40974/', 'https://www.exploit-db.com/exploits/40986/', 'http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html', 'https://github.com/advisories/GHSA-5f37-gxvh-23v6'}
null
GHSA
GHSA-p2v9-g2qv-p635
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
{'CVE-2019-20445'}
2021-08-25T17:37:44Z
2020-02-21T18:55:04Z
MODERATE
0
{'CWE-444'}
{'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-p2v9-g2qv-p635', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/netty/netty/pull/9865', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/issues/9861', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0601', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E'}
null
GHSA
GHSA-5v9h-q3gj-c32x
SQL Injection via GeoJSON in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documents using `GeomFromText`. ## Recommendation Update to version 3.23.6 or later.
{'CVE-2016-1000225'}
2021-09-23T21:29:15Z
2020-09-01T15:27:40Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-5v9h-q3gj-c32x', 'https://github.com/sequelize/sequelize/issues/6194', 'https://www.npmjs.com/advisories/122', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000225', 'https://snyk.io/vuln/npm:sequelize:20160718'}
null
GHSA
GHSA-cxjc-r2fp-7mq6
XSS in dijit editor's LinkDialog plugin
### Impact XSS possible for users of the Dijit Editor's LinkDialog plugin ### Patches Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3 ### Workarounds Users may apply the patch made in these releases. ### For more information If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/)
{'CVE-2020-4051'}
2022-04-19T19:02:29Z
2020-06-15T21:53:12Z
LOW
3.7
{'CWE-79'}
{'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051'}
null
GHSA
GHSA-mh27-rxmr-8q4c
Cross-site Scripting in Jenkins SiteMonitor Plugin
Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-28153'}
2022-04-12T21:58:32Z
2022-03-30T00:00:23Z
MODERATE
5.4
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932', 'https://github.com/advisories/GHSA-mh27-rxmr-8q4c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153', 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}
null
GHSA
GHSA-2wwc-w2gw-4329
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.
{'CVE-2019-1366'}
2021-03-29T20:55:36Z
2021-03-29T20:55:36Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366', 'https://github.com/advisories/GHSA-2wwc-w2gw-4329'}
null
GHSA
GHSA-rqrc-8q8f-cp9c
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
{'CVE-2020-1469'}
2022-04-08T22:43:53Z
2022-04-08T18:11:51Z
HIGH
7.5
{'CWE-835', 'CWE-434'}
{'https://github.com/advisories/GHSA-rqrc-8q8f-cp9c', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'}
null
GHSA
GHSA-7375-vjr2-3g7w
Cross-Site Scripting in glance
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
{'CVE-2018-3748'}
2021-09-02T19:13:46Z
2018-09-27T11:37:19Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://hackerone.com/reports/310133', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'}
null
GHSA
GHSA-7378-6268-4278
High severity vulnerability that affects DotNetZip
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002205'}
2021-01-08T19:18:21Z
2018-10-16T17:16:40Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'}
null
GHSA
GHSA-q9mp-79cp-9g8j
Improper Authentication
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
{'CVE-2019-20894'}
2021-09-02T22:00:09Z
2021-09-02T22:00:09Z
HIGH
7.5
{'CWE-287', 'CWE-295'}
{'https://github.com/containous/traefik/pull/7008', 'https://github.com/containous/traefik/issues/5312', 'https://github.com/advisories/GHSA-q9mp-79cp-9g8j', 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894'}
null
GHSA
GHSA-85cw-hj65-qqv9
Polymorphic Typing issue in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
{'CVE-2019-16335'}
2021-08-17T22:28:01Z
2019-09-23T18:33:45Z
CRITICAL
9.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-85cw-hj65-qqv9', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16335', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-3x8c-fmpc-5rmq
Cross-site scripting (XSS) vulnerability in the fallback authentication endpoint
### Impact The fallback authentication endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed by #8444, which is included in Synapse v1.21.0. ### Workarounds If the homeserver is not configured to use reCAPTCHA, consent (terms of service), or single sign-on then the affected endpoint can be blocked at a reverse proxy: * `/_matrix/client/r0/auth/.*/fallback/web` * `/_matrix/client/unstable/auth/.*/fallback/web`
{'CVE-2020-26891'}
2022-04-19T19:02:38Z
2020-10-16T16:56:04Z
MODERATE
0
{'CWE-79'}
{'https://github.com/matrix-org/synapse/pull/8444', 'https://github.com/advisories/GHSA-3x8c-fmpc-5rmq', 'https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory', 'https://github.com/matrix-org/synapse/releases', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26891', 'https://github.com/matrix-org/synapse/releases/tag/v1.21.2'}
null
GHSA
GHSA-p6j8-hgv5-m35g
Uncontrolled Resource Consumption in jboss-remoting
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
{'CVE-2020-35510'}
2022-03-21T21:44:45Z
2022-03-18T17:58:30Z
HIGH
7.5
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1905796', 'https://github.com/advisories/GHSA-p6j8-hgv5-m35g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'}
null
GHSA
GHSA-xw93-v57j-fcgh
Division by 0 in `SparseMatMul`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`: ```python import tensorflow as tf a = tf.constant([100.0, 100.0, 100.0, 100.0], shape=[2, 2], dtype=tf.float32) b = tf.constant([], shape=[0, 2], dtype=tf.float32) tf.raw_ops.SparseMatMul( a=a, b=b, transpose_a=True, transpose_b=True, a_is_sparse=True, b_is_sparse=True) ``` The division by 0 occurs deep in Eigen code because the `b` tensor is empty. ### Patches We have patched the issue in GitHub commit [7f283ff806b2031f407db64c4d3edcda8fb9f9f5](https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29557'}
2021-05-21T14:24:48Z
2021-05-21T14:24:48Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29557', 'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh', 'https://github.com/advisories/GHSA-xw93-v57j-fcgh'}
null
GHSA
GHSA-8wrg-m8vm-5fvj
Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server
### Impact Authentication Bypass by Primary Weakness (CWE-305) Commit: https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1 ALL Users is impacted. ### Patches Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6
{'CVE-2021-21403'}
2022-04-19T19:02:51Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-305'}
{'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj', 'https://github.com/advisories/GHSA-8wrg-m8vm-5fvj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403', 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
null
GHSA
GHSA-69vj-xx27-g45w
Data race in eventio
An issue was discovered in Input<R> in the eventio crate before 0.5.1 for Rust. Because a non-Send type can be sent to a different thread, a data race and memory corruption can occur.
{'CVE-2020-36216'}
2021-08-25T20:51:49Z
2021-08-25T20:51:49Z
MODERATE
5.9
{'CWE-662', 'CWE-787'}
{'https://github.com/petabi/eventio/issues/33', 'https://rustsec.org/advisories/RUSTSEC-2020-0108.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36216', 'https://github.com/advisories/GHSA-69vj-xx27-g45w'}
null
GHSA
GHSA-9qcf-c26r-x5rf
XML external entity injection in Terracotta Quartz Scheduler
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
{'CVE-2019-13990'}
2021-10-21T21:18:40Z
2020-07-01T17:55:03Z
CRITICAL
9.8
{'CWE-611'}
{'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-9qcf-c26r-x5rf', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-7g65-ghrg-hpf5
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
{'CVE-2012-3465'}
2021-09-02T21:18:21Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://secunia.com/advisories/50694', 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465', 'https://github.com/advisories/GHSA-7g65-ghrg-hpf5', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
GHSA
GHSA-x2fc-mxcx-w4mf
Prototype Pollution in mathjs
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
{'CVE-2020-7743'}
2021-05-10T18:39:04Z
2021-05-10T18:39:04Z
HIGH
0
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://www.npmjs.com/package/mathjs', 'https://github.com/advisories/GHSA-x2fc-mxcx-w4mf', 'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}
null
GHSA
GHSA-gcv8-gh4r-25x6
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
{'CVE-2022-0613'}
2022-04-01T18:06:55Z
2022-02-17T00:00:35Z
MODERATE
6.5
{'CWE-639'}
{'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/', 'https://github.com/advisories/GHSA-gcv8-gh4r-25x6', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613'}
null
GHSA
GHSA-m7fq-cf8q-35q7
High severity vulnerability that affects crack
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1800'}
2021-09-15T18:18:56Z
2017-10-24T18:33:37Z
HIGH
0
null
{'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'http://secunia.com/advisories/52897', 'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html'}
null
GHSA
GHSA-f8q4-jwww-x3wv
Race Condition in Paramiko
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.
{'CVE-2022-24302'}
2022-04-18T22:19:04Z
2022-03-19T00:01:03Z
MODERATE
5.9
{'CWE-362'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/', 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html', 'https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml', 'https://www.paramiko.org/changelog.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/', 'https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/', 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'}
null
GHSA
GHSA-2p6g-gjp8-ggg9
Validation bypass in personnummer
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-11T16:41:26Z
2020-09-09T17:29:34Z
LOW
0
null
{'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'}
null
GHSA
GHSA-4r97-78gf-q24v
Prototype Pollution in klona
Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.1.1 or later.
null
2021-10-04T20:52:22Z
2020-09-04T17:53:27Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1463', 'https://hackerone.com/reports/778414', 'https://github.com/advisories/GHSA-4r97-78gf-q24v'}
null
GHSA
GHSA-cgjx-mwpx-47jv
Private Data Disclosure in express-restify-mongoose
Affected versions of `express-restify-mongoose` are susceptible to an information leakage vulnerability which may allow an attacker to access fields on a model even if those fields are marked as private. ## Proof of Concept If you have a user model that you want to protect, such as the following User model: ``` const User = mongoose.model('User', new mongoose.Schema({ name: String, password: String, })); ``` You would normally do something such as: ``` restify.serve(router, User, { private: ['password'], // Set the password part of User as private, so outside people can't read it }) ``` This would hide the password field from people that send your application a `GET /User` and `GET /User/some-user-id` request. A malicious user can go to your application and send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This could be used for other private data, if the malicious user knew what was set as private for specific routes. ## Recommendation Version 2.x: Update to version 2.5.0 or later. Version 3.x: Update to version 3.1.0 or later.
{'CVE-2016-10533'}
2021-01-08T18:58:32Z
2018-10-23T17:14:57Z
HIGH
0
{'CWE-200'}
{'https://nodesecurity.io/advisories/92', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10533', 'https://github.com/florianholzapfel/express-restify-mongoose/issues/252', 'https://www.npmjs.com/advisories/92', 'https://github.com/advisories/GHSA-cgjx-mwpx-47jv'}
null
GHSA
GHSA-m6wh-m8m8-6xx5
Exfiltrates data on installation in cofeescript
The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofeescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16202'}
2021-01-08T18:30:25Z
2018-08-06T20:05:28Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/541', 'https://nodesecurity.io/advisories/541', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202', 'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5'}
null
GHSA
GHSA-4g54-95xv-f353
Hijacked Environment Variables in http-proxy.js
The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16075'}
2021-01-08T19:55:20Z
2018-08-29T23:16:56Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-4g54-95xv-f353', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075', 'https://www.npmjs.com/advisories/514', 'https://nodesecurity.io/advisories/514'}
null
GHSA
GHSA-pw2r-vq6v-hr8c
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
{'CVE-2022-0536'}
2022-02-14T22:27:57Z
2022-02-10T00:00:31Z
MODERATE
5.9
{'CWE-200'}
{'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://github.com/advisories/GHSA-pw2r-vq6v-hr8c', 'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'}
null
GHSA
GHSA-388g-jwpg-x6j4
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.0.13 or later.
null
2021-09-28T17:00:24Z
2020-09-11T21:20:14Z
MODERATE
6.5
{'CWE-79'}
{'https://www.npmjs.com/advisories/985', 'https://github.com/advisories/GHSA-388g-jwpg-x6j4', 'https://github.com/swagger-api/swagger-ui/issues/3163', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941'}
null
GHSA
GHSA-8qm2-24qc-c4qg
Malicious Package in freshdom
Version 0.0.6 of `freshdom` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.6 of this module is found installed you will want to replace it with a version before or after 0.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T17:32:51Z
2020-09-01T19:57:56Z
CRITICAL
9.8
{'CWE-506'}
{'https://snyk.io/vuln/SNYK-JS-FRESHDOM-450987', 'https://github.com/advisories/GHSA-8qm2-24qc-c4qg', 'https://github.com/jamiller619/freshdom', 'https://www.npmjs.com/advisories/627'}
null
GHSA
GHSA-m36x-mgfh-8g78
Subdomain Takeover in Interactsh server
A domain configured with interactsh server was vulnerable to subdomain takeover for specfic subdomain, i.e `app`, Interactsh server before `< 1.0.0` used to create cname entries for `app` pointing to `projectdiscovery.github.io` as default which intended to used for hosting interactsh [web client](https://github.com/projectdiscovery/interactsh-web) using GitHub pages. It turns out to be a security issue with a self-hosted interactsh server in which the user may not have configured a web client but still have a cname entry pointing to GitHub pages, making them vulnerable to subdomain takeover. This issue was initially reported to us as a subdomain takeover for one of our domains that runs interactsh server by **Melih** at `security@projectdiscovery.io`, and after conducting an internal investigation, we determined that it was an issue with the default config of interactsh server affecting all the server running self-hosted instance of interactsh, as a result - cname entry has been removed in the latest release. #### Impact This allows one to host / run arbitrary client side code (XSS) in a user's browser when browsing the vulnerable subdomain, for more details on the impact, please read this [detailed blogpost](https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/) from Detectify. #### Patches Update to [Interactsh server v1.0.0 ](https://github.com/projectdiscovery/interactsh/releases/tag/v1.0.0)with `go install -v github.com/projectdiscovery/interactsh/cmd/interactsh-server@latest` #### References https://github.com/projectdiscovery/interactsh/issues/136 #### For more information If you have any questions or comments about this advisory: * Email us at [security@projectdiscovery.io](mailto:security@projectdiscovery.io)
null
2022-01-27T15:15:25Z
2022-01-27T15:15:25Z
HIGH
0
{'CWE-79'}
{'https://github.com/projectdiscovery/interactsh/security/advisories/GHSA-m36x-mgfh-8g78', 'https://github.com/projectdiscovery/interactsh/issues/136', 'https://github.com/advisories/GHSA-m36x-mgfh-8g78'}
null
GHSA
GHSA-9g9w-hmvj-5h57
Prototype Pollution in merge-deep
Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2018-3722'}
2021-01-08T19:04:35Z
2018-07-26T15:17:15Z
LOW
0
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://www.npmjs.com/advisories/580', 'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://hackerone.com/reports/310708', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57'}
null
GHSA
GHSA-mqf3-28j7-3mj6
Information Exposure in Kubernetes
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
{'CVE-2015-7528'}
2022-04-12T22:40:23Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-200'}
{'https://access.redhat.com/errata/RHSA-2015:2544', 'https://github.com/kubernetes/kubernetes/pull/17886', 'https://github.com/openshift/origin/pull/6113', 'http://rhn.redhat.com/errata/RHSA-2015-2615.html', 'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7528', 'https://github.com/advisories/GHSA-mqf3-28j7-3mj6', 'https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5'}
null
GHSA
GHSA-9j5m-873f-xh76
Directory Traversal in static-html-server
Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16152'}
2021-01-08T19:03:58Z
2018-07-23T20:46:32Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16152', 'https://nodesecurity.io/advisories/376', 'https://www.npmjs.com/advisories/376', 'https://github.com/advisories/GHSA-9j5m-873f-xh76', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}
null
GHSA
GHSA-88cc-g835-76rp
Improper Restriction of XML External Entity Reference
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
{'CVE-2020-13692'}
2022-02-10T00:30:23Z
2022-02-10T00:30:07Z
HIGH
7.7
{'CWE-611'}
{'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://github.com/advisories/GHSA-88cc-g835-76rp', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-j6qj-j888-vvgq
Directory exposure in jetty
### Impact If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download. For example, the problem manifests in the following `${jetty.base}`: ```$ tree demo-base/ demo-base/ ├── etc ├── lib ├── resources ├── start.d ├── deploy │   └── async-rest.war └── webapps -> deploy ``` ### Workarounds Do not use a symlink
{'CVE-2021-28163'}
2022-04-22T15:49:56Z
2021-04-06T17:32:00Z
LOW
2.7
{'CWE-200', 'CWE-59'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-j6qj-j888-vvgq', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/'}
null
GHSA
GHSA-xqh8-5j36-4556
SQL Injection in connect-pg-simple
Versions of `connect-pg-simple` are vulnerable to SQL Injection. The `PGStore.prototype.quotedTable` function allows for the query to be manipulated if the input has double quotes through the `schemaName` or `tableName` variables. These variables are passed to the constructor and are unlikely to be controlled by user-input. If they are controlled by user-input it could allow attackers to execute arbitrary SQL queries. ## Recommendation Upgrade to version 6.0.1 or later.
{'CVE-2019-15658'}
2021-09-22T15:15:41Z
2019-08-26T16:59:45Z
HIGH
7.3
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15658', 'https://www.npmjs.com/advisories/1153', 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556', 'https://github.com/advisories/GHSA-xqh8-5j36-4556', 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}
null
GHSA
GHSA-f5cv-xrv9-r8w7
NoSQL injection in express-cart
Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection. The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators. These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start. ## Recommendation Update to version 1.1.8 or later.
null
2021-09-24T20:58:37Z
2020-09-01T21:17:16Z
HIGH
0
{'CWE-89'}
{'https://www.npmjs.com/advisories/724', 'https://hackerone.com/reports/397445', 'https://github.com/advisories/GHSA-f5cv-xrv9-r8w7', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json'}
null
GHSA
GHSA-9fhw-r42p-5c7r
Regular expression Denial of Service in @progfay/scrapbox-parser
### Impact A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js. The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU. ### Patches Upgrade to version 6.0.3, 7.0.2 or later. ### Workarounds Avoid to parse text with a lot of `[` chars. ### References * https://github.com/progfay/scrapbox-parser/pull/519 * https://github.com/progfay/scrapbox-parser/pull/539 * https://github.com/progfay/scrapbox-parser/pull/540 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405 * https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues)
{'CVE-2021-27405'}
2022-04-19T19:02:48Z
2021-03-01T20:44:44Z
MODERATE
4.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27405', 'https://github.com/progfay/scrapbox-parser/pull/539', 'https://security.netapp.com/advisory/ntap-20210326-0002/', 'https://github.com/progfay/scrapbox-parser/pull/519', 'https://github.com/advisories/GHSA-9fhw-r42p-5c7r', 'https://github.com/progfay/scrapbox-parser/pull/540', 'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r'}
null
GHSA
GHSA-cqxx-66wh-8pjw
Improper Removal of Sensitive Information Before Storage or Transfer in irrd
IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. The issue occurred: * For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected. * For any GraphQL queries that queried the `auth` field on `mntner` objects. * For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access. The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x]
{'CVE-2022-24798'}
2022-04-13T01:15:56Z
2022-04-01T13:59:17Z
HIGH
7.5
{'CWE-212'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24798', 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw', 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6', 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/', 'https://github.com/advisories/GHSA-cqxx-66wh-8pjw'}
null
GHSA
GHSA-9qj7-jvg4-qr2x
Moderate severity vulnerability that affects passenger
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem.
{'CVE-2013-2119'}
2021-09-08T20:47:39Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x', 'https://bugzilla.redhat.com/show_bug.cgi?id=892813', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}
null
GHSA
GHSA-mmph-wp49-r48h
Malicious Package in experss
All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:02:46Z
2020-09-02T20:20:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-mmph-wp49-r48h', 'https://www.npmjs.com/advisories/852'}
null
GHSA
GHSA-fr32-gr5c-xq5c
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
{'CVE-2019-8321'}
2021-08-17T13:32:02Z
2019-06-20T16:06:04Z
HIGH
7.5
{'CWE-88'}
{'https://hackerone.com/reports/317330', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://github.com/advisories/GHSA-fr32-gr5c-xq5c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321'}
null
GHSA
GHSA-45h5-r968-5xr7
Exposure of sensitive information in Elasticsearch
A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
{'CVE-2021-22147'}
2021-10-11T18:43:29Z
2021-09-20T20:29:40Z
MODERATE
6.5
{'CWE-732'}
{'https://github.com/advisories/GHSA-45h5-r968-5xr7', 'https://www.elastic.co/community/security/', 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147', 'https://security.netapp.com/advisory/ntap-20211008-0002/'}
null
GHSA
GHSA-fw76-p9p2-6pvf
Malicious Package in serilize
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:28:14Z
2020-09-03T19:58:58Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1140', 'https://github.com/advisories/GHSA-fw76-p9p2-6pvf'}
null
GHSA
GHSA-5mjw-6jrh-hvfq
Sandbox Breakout / Arbitrary Code Execution in static-eval
Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package. ## Proof of concept ``` var evaluate = require('static-eval'); var parse = require('esprima').parse; var src = '(function(){console.log(process.pid)})()'; var ast = parse(src).body[0].expression; var res = evaluate(ast, {}); // Will print the process id ``` ## Recommendation Update to version 2.0.0 or later.
{'CVE-2017-16226'}
2021-01-08T21:14:45Z
2018-08-06T21:37:06Z
MODERATE
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16226', 'https://github.com/substack/static-eval/pull/18', 'https://nodesecurity.io/advisories/548', 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq', 'https://www.npmjs.com/advisories/548', 'https://maustin.net/articles/2017-10/static_eval'}
null
GHSA
GHSA-qrvj-274h-hfcg
Deserialization of Untrusted Data in topthink/framework
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.
{'CVE-2021-36567'}
2022-04-05T21:16:58Z
2021-12-07T00:00:28Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/top-think/framework/issues/2561', 'https://github.com/advisories/GHSA-qrvj-274h-hfcg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567'}
null
GHSA
GHSA-vwx4-frpr-w27j
Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
{'CVE-2022-25210'}
2022-02-26T00:37:35Z
2022-02-16T00:01:14Z
MODERATE
6.5
{'CWE-662', 'CWE-820'}
{'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25210', 'https://github.com/advisories/GHSA-vwx4-frpr-w27j'}
null
GHSA
GHSA-rmw5-xpg9-jr29
Use of Cryptographically Weak Pseudo-Random Number Generator in Rclone
An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
{'CVE-2020-28924'}
2022-04-27T20:30:32Z
2021-06-10T17:23:21Z
HIGH
7.5
{'CWE-338', 'CWE-331'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/', 'https://github.com/rclone/rclone/issues/4783', 'https://github.com/advisories/GHSA-rmw5-xpg9-jr29', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28924', 'https://security.gentoo.org/glsa/202107-14'}
null
GHSA
GHSA-4gf2-xv97-63m2
Exposure of Sensitive Information in keycloak
A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
{'CVE-2020-1744'}
2021-09-20T20:43:24Z
2021-09-20T20:43:24Z
MODERATE
5.6
{'CWE-200', 'CWE-755'}
{'https://access.redhat.com/security/cve/CVE-2020-1744', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744', 'https://github.com/advisories/GHSA-4gf2-xv97-63m2'}
null
GHSA
GHSA-3j95-fjv2-3m4p
CSS Injection in Chartkick gem
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
{'CVE-2020-16254'}
2021-09-23T18:53:25Z
2020-08-12T14:29:15Z
MODERATE
6.1
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f', 'https://github.com/advisories/GHSA-3j95-fjv2-3m4p', 'https://github.com/ankane/chartkick', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml'}
null
GHSA
GHSA-6w7g-p4jh-rf92
"Verify All" Returns Success Despite Validation Failures in Singularity
### Impact The `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified. The SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0` are returned. Workflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior. ``` $ singularity verify -a image.sif WARNING: Missing signature for SIF descriptor 2 (JSON.Generic) WARNING: Missing signature for SIF descriptor 3 (FS) Container is signed by 1 key(s): Verifying partition: Def.FILE: 12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84 [LOCAL] Unit Test <unit@test.com> [OK] Data integrity verified INFO: Container verified: image.sif $ echo $? 0 ``` ### Patches Singularity 3.6.0 has a new implementation of sign/verify that fixes this issue. All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0. Version 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. ### Workarounds If you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container. Note that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
{'CVE-2020-13846'}
2022-04-19T19:02:30Z
2021-12-20T18:24:43Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-6w7g-p4jh-rf92', 'https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13846'}
null
GHSA
GHSA-v935-pqmr-g8v9
Unexpected panics in num-bigint
### Impact Two scenarios were reported where `BigInt` and `BigUint` multiplication may unexpectedly panic. - The internal `mac3` function did not expect the possibility of non-empty all-zero inputs, leading to an `unwrap()` panic. - A buffer was allocated with less capacity than needed for an intermediate result, leading to an assertion panic. Rust panics can either cause stack unwinding or program abort, depending on the application configuration. In some settings, an unexpected panic may constitute a denial-of-service vulnerability. ### Patches Both problems were introduced in version 0.4.1, and are fixed in version 0.4.3. ### For more information If you have any questions or comments about this advisory, please open an issue in the [num-bigint](https://github.com/rust-num/num-bigint) repo. ### Acknowledgements Thanks to Guido Vranken and Arvid Norberg for privately reporting these issues to the author. ### References * [GHSA-v935-pqmr-g8v9](https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9) * [num-bigint#228](https://github.com/rust-num/num-bigint/pull/228)
null
2022-04-19T19:03:13Z
2021-11-03T17:36:04Z
MODERATE
0
{'CWE-131', 'CWE-20'}
{'https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9', 'https://github.com/advisories/GHSA-v935-pqmr-g8v9', 'https://github.com/rust-num/num-bigint/pull/228'}
null
GHSA
GHSA-vrgp-3ph6-2wwq
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
{'CVE-2021-36625'}
2022-04-15T23:31:18Z
2022-04-01T00:00:41Z
HIGH
8.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-vrgp-3ph6-2wwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
null
GHSA
GHSA-7cg8-pq9v-x98q
Sandbox Breakout in realms-shim
Versions of `realms-shim` prior to 1.2.1 are vulnerable to a Sandbox Breakout. The Realms evaluation function has an option to apply Babel-like transformations to the source code before it reaches the evaluator. One portion of this transform pipeline exposed a primal-Realm object to the rewriting function. Confined code which used the evaluator itself could provide a malicious rewriter function that captured this object, and use it to breach the sandbox. ## Recommendation Upgrade to version 1.2.1 or later.
null
2021-09-02T21:14:20Z
2019-10-21T21:58:55Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-7cg8-pq9v-x98q', 'https://www.npmjs.com/advisories/1218', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-7cg8-pq9v-x98q', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-536069'}
null
GHSA
GHSA-3q32-j57w-q4w7
Path Traversal in total.js
Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths. The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`. ## Recommendation - If you are using version 2.1.x, upgrade to 2.1.1 or later. - If you are using version 2.2.x, upgrade to 2.2.1 or later. - If you are using version 2.3.x, upgrade to 2.3.1 or later. - If you are using version 2.4.x, upgrade to 2.4.1 or later. - If you are using version 2.5.x, upgrade to 2.5.1 or later. - If you are using version 2.6.x, upgrade to 2.6.3 or later. - If you are using version 2.7.x, upgrade to 2.7.1 or later. - If you are using version 2.8.x, upgrade to 2.8.1 or later. - If you are using version 2.9.x, upgrade to 2.9.5 or later. - If you are using version 3.0.x, upgrade to 3.0.1 or later. - If you are using version 3.1.x, upgrade to 3.1.1 or later. - If you are using version 3.2.x, upgrade to 3.2.4 or later.
{'CVE-2019-8903'}
2021-08-31T21:22:07Z
2019-02-20T15:40:13Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b', 'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8903'}
null
GHSA
GHSA-6mww-xvh7-fq4f
Koji hub call does not perform correct access checks
Koji version 1.12, 1.13, 1.14 and 1.15 contain an incorrect access control vulnerability resulting in arbitrary filesystem read/write access. This vulnerability has been fixed in versions 1.12.1, 1.13.1, 1.14.1 and 1.15.1.
{'CVE-2018-1002150'}
2022-04-26T18:08:41Z
2018-07-12T20:29:40Z
CRITICAL
9.1
{'CWE-732'}
{'https://github.com/advisories/GHSA-6mww-xvh7-fq4f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002150', 'https://docs.pagure.org/koji/CVE-2018-1002150/', 'https://pagure.io/koji/c/ab1ade7', 'https://pagure.io/koji/issue/850'}
null
GHSA
GHSA-mq35-wqvf-r23c
Sinatra has XSS via 400 Bad Request page via params parser exception
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
{'CVE-2018-11627'}
2022-04-26T18:04:34Z
2018-06-05T21:32:06Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-mq35-wqvf-r23c', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://github.com/sinatra/sinatra/issues/1428', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://access.redhat.com/errata/RHSA-2019:0315'}
null
GHSA
GHSA-45vg-2v73-vm62
Moderate severity vulnerability that affects org.springframework:spring-core
The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors.
{'CVE-2015-0201'}
2021-08-31T21:46:16Z
2018-10-17T20:28:20Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-0201', 'https://pivotal.io/security/cve-2015-0201', 'https://github.com/advisories/GHSA-45vg-2v73-vm62'}
null
GHSA
GHSA-q257-vv4p-fg92
Header Forgery in http-signature
Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature. This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names. ## Proof of Concept Consider this to be the initial, untampered request: ``` POST /pay HTTP/1.1 Host: example.com Date: Thu, 05 Jan 2012 21:31:40 GMT X-Payment-Source: src@money.com X-Payment-Destination: dst@money.com Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5... ``` And the request is intercepted and tampered as follows: ``` X-Payment-Source: dst@money.com // Emails switched X-Payment-Destination: src@money.com Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5... ``` In the resulting responses, both requests would pass signature verification without issue. ``` src@money.com\n dst@money.com\n ``` ## Recommendation Update to version 0.10.0 or higher.
{'CVE-2017-16005'}
2021-01-08T18:19:04Z
2018-11-09T17:49:34Z
LOW
0
{'CWE-20'}
{'https://github.com/joyent/node-http-signature/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005', 'https://github.com/advisories/GHSA-q257-vv4p-fg92', 'https://nodesecurity.io/advisories/318', 'https://www.npmjs.com/advisories/318'}
null
GHSA
GHSA-v3wr-67px-44xg
Execution with Unnecessary Privileges in arc-electron
### Impact When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes file system access, data store access (which may contain sensitive information), and some additional processes that only ARC should have access to. ### Patches This is patched in version 17.0.9. ### Workarounds Do not click onto any link in the response headers view. ### For more information If you have any questions or comments about this advisory: * Open an issue in [advanced-rest-client/arc-electron](https://github.com/advanced-rest-client/arc-electron) * Email us at [Salesforce Security](mailto:security@salesforce.com)
null
2022-03-08T21:08:36Z
2022-03-03T19:11:14Z
HIGH
0
null
{'https://github.com/advisories/GHSA-v3wr-67px-44xg', 'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg'}
null
GHSA
GHSA-wqv3-8cm6-h6wg
Improper Authentication in Kubernetes
A security issue was discovered in kube-proxy which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558 https://www.openwall.com/lists/oss-security/2020/07/08/1
{'CVE-2020-8558'}
2022-04-12T22:19:38Z
2022-02-15T01:57:18Z
HIGH
8.8
{'CWE-287', 'CWE-420'}
{'https://security.netapp.com/advisory/ntap-20200821-0001/', 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8558', 'https://github.com/advisories/GHSA-wqv3-8cm6-h6wg', 'https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE', 'https://bugzilla.redhat.com/show_bug.cgi?id=1843358', 'https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation', 'https://github.com/kubernetes/kubernetes/issues/92315', 'https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ', 'https://github.com/tabbysable/POC-2020-8558'}
null