ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-q4qf-3fc6-8x34 | Segfault and data corruption in tensorflow-lite | ### Impact
To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72
If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption.
### Patches
We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15207'} | 2021-11-19T15:11:40Z | 2020-09-25T18:28:43Z | HIGH | 8.7 | {'CWE-119', 'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207'} | null |
GHSA | GHSA-rr77-w4w8-w8wp | Directory Traversal in tencent-server | Affected versions of `tencent-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16216'} | 2021-01-14T15:45:48Z | 2020-09-01T17:37:46Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16216', 'https://nodesecurity.io/advisories/418', 'https://github.com/advisories/GHSA-rr77-w4w8-w8wp', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server', 'https://www.npmjs.com/advisories/418'} | null |
GHSA | GHSA-hwch-749c-rv63 | Potential Command Injection in hubot-scripts | Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module.
### Mitigating Factors
The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts.
## Recommendation
Update hubot-scripts to version 2.4.4 or later. | {'CVE-2013-7378'} | 2021-04-12T21:34:55Z | 2020-08-31T22:46:38Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-7378', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/13', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'https://web.archive.org/web/20140731222413/https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'https://github.com/advisories/GHSA-hwch-749c-rv63', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'} | null |
GHSA | GHSA-8vv3-jxm8-f4vf | Prototype Pollution in connie-lang | The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie. | {'CVE-2020-7706'} | 2021-07-29T22:00:16Z | 2021-05-06T17:29:25Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853', 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://github.com/advisories/GHSA-8vv3-jxm8-f4vf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7706'} | null |
GHSA | GHSA-q347-cg56-pcq4 | SSRF in repository migration | ### Impact
The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected.
### Patches
Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
### Workarounds
Run Gogs in its own private network.
### References
https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/
### For more information
If you have any questions or comments about this advisory, please post on #6754.
| null | 2022-04-19T19:03:27Z | 2022-03-14T22:57:00Z | MODERATE | 5 | {'CWE-918'} | {'https://github.com/advisories/GHSA-q347-cg56-pcq4', 'https://github.com/gogs/gogs/security/advisories/GHSA-q347-cg56-pcq4', 'https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/'} | null |
GHSA | GHSA-5w65-6875-rhq8 | Undefined Behavior in sailsjs-cacheman | All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-21T17:05:45Z | 2019-09-11T23:01:57Z | LOW | 0 | null | {'https://www.npmjs.com/advisories/752', 'https://github.com/advisories/GHSA-5w65-6875-rhq8', 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'} | null |
GHSA | GHSA-g489-xrw3-3v8w | Data races in aovec | An issue was discovered in the aovec crate through 2020-12-10 for Rust. Because Aovec<T> does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur. | {'CVE-2020-36207'} | 2021-08-25T20:50:46Z | 2021-08-25T20:50:46Z | HIGH | 7 | {'CWE-662', 'CWE-787'} | {'https://github.com/advisories/GHSA-g489-xrw3-3v8w', 'https://rustsec.org/advisories/RUSTSEC-2020-0099.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36207'} | null |
GHSA | GHSA-h68q-55jf-x68w | Prototype pollution in chart.js | This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution. | {'CVE-2020-7746'} | 2021-08-02T15:36:23Z | 2021-05-10T18:47:53Z | HIGH | 7.5 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375', 'https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374', 'https://github.com/advisories/GHSA-h68q-55jf-x68w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7746', 'https://github.com/chartjs/Chart.js/pull/7920', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376'} | null |
GHSA | GHSA-mc36-5m36-hjh5 | Data races in slock | An issue was discovered in the slock crate through 2020-11-17 for Rust. Slock<T> unconditionally implements Send and Sync. | {'CVE-2020-36455'} | 2021-08-25T20:58:00Z | 2021-08-25T20:58:00Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://github.com/advisories/GHSA-mc36-5m36-hjh5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36455', 'https://github.com/BrokenLamp/slock-rs/issues/2', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/slock/RUSTSEC-2020-0135.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'} | null |
GHSA | GHSA-34gh-3cwv-wvp2 | Directory traversal in rollup-plugin-server | This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function. | {'CVE-2020-7683'} | 2021-09-23T17:29:24Z | 2020-07-29T18:07:11Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-34gh-3cwv-wvp2', 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'} | null |
GHSA | GHSA-xfmw-2vmm-579c | Hijacked Environment Variables in nodesass | The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16080'} | 2021-01-14T15:32:47Z | 2020-09-01T18:59:50Z | MODERATE | 0 | {'CWE-506'} | {'https://github.com/advisories/GHSA-xfmw-2vmm-579c', 'https://nodesecurity.io/advisories/519', 'https://www.npmjs.com/advisories/519', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080'} | null |
GHSA | GHSA-wmrx-57hm-mw7r | Arbitrary file reads in HashiCorp Nomad | Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root. There are currently no known workarounds. Users are recommended to upgrade as soon as possible to avoid this issue. | {'CVE-2022-24683'} | 2022-03-24T22:47:40Z | 2022-02-18T00:00:34Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24683', 'https://github.com/advisories/GHSA-wmrx-57hm-mw7r', 'https://discuss.hashicorp.com', 'https://security.netapp.com/advisory/ntap-20220318-0008/', 'https://discuss.hashicorp.com/t/hcsec-2022-02-nomad-alloc-filesystem-and-container-escape/35560'} | null |
GHSA | GHSA-p62r-jf56-h429 | Malicious Package in evil-package | All versions of `evil-package` contain malicious code. The package uploads the contents of `process.env` to `example.com/log`.
## Recommendation
Remove the package from your environment. Given the host where the information was uploaded to there is no further indication of compromise. | null | 2021-09-29T20:31:18Z | 2020-09-03T20:29:58Z | CRITICAL | 0 | {'CWE-506'} | {'https://github.com/advisories/GHSA-p62r-jf56-h429', 'https://www.npmjs.com/advisories/1162'} | null |
GHSA | GHSA-9x4c-63pf-525f | Arbitrary Code Generation | ### Impact
Clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
Giving this a CVSS of 8.0 (high) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C .
### Patches
Fix will be included in version 0.5.3
### Workarounds
Inspect OpenAPI documents before generating, or inspect generated code before executing.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues)
* Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com) | {'CVE-2020-15142'} | 2022-04-19T19:02:33Z | 2020-08-20T14:38:24Z | HIGH | 8 | {'CWE-94'} | {'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a', 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-9x4c-63pf-525f', 'https://pypi.org/project/openapi-python-client/', 'https://github.com/advisories/GHSA-9x4c-63pf-525f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15142'} | null |
GHSA | GHSA-qh62-ch95-63wh | python-gnupg allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended | **Withdrawn:** Duplicate of GHSA-2fch-jvg5-crf6 | {'CVE-2019-6690'} | 2020-06-16T20:25:51Z | 2020-03-13T20:05:10Z | MODERATE | 0 | null | {'https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/', 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/', 'https://pypi.org/project/python-gnupg/#history', 'http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html', 'https://github.com/advisories/GHSA-qh62-ch95-63wh', 'http://www.securityfocus.com/bid/106756', 'https://seclists.org/bugtraq/2019/Jan/41', 'https://bitbucket.org/vinay.sajip/python-gnupg/commits/1a5196800604c05f9e347110b4ecca538ba68cdc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6690', 'https://usn.ubuntu.com/3964-1/', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html'} | null |
GHSA | GHSA-h376-j262-vhq6 | RCE in H2 Console | ### Impact
H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI.
H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) wasn't set, an intruder can load own custom class and execute its code in a process with H2 Console (H2 Server process or a web server with H2 Console servlet).
It is also possible to load them by creation a linked table in these versions, but it requires `ADMIN` privileges and user with `ADMIN` privileges has full access to the Java process by design. These privileges should never be granted to untrusted users.
### Patches
Since version 2.0.206 H2 Console and linked tables explicitly forbid attempts to specify LDAP URLs for JNDI. Only local data sources can be used.
### Workarounds
H2 Console should never be available to untrusted users.
`-webAllowOthers` is a dangerous setting that should be avoided.
H2 Console Servlet deployed on a web server can be protected with a security constraint:
https://h2database.com/html/tutorial.html#usingH2ConsoleServlet
If `webAllowOthers` is specified, you need to uncomment and edit `<security-role>` and `<security-constraint>` as necessary. See documentation of your web server for more details.
### References
This issue was found and privately reported to H2 team by [JFrog Security](https://www.jfrog.com/)'s vulnerability research team with detailed information.
| {'CVE-2021-42392'} | 2022-04-22T15:35:52Z | 2022-01-06T23:55:09Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-42392', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20220119-0001/', 'https://github.com/advisories/GHSA-h376-j262-vhq6', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://github.com/h2database/h2database/releases/tag/version-2.0.206', 'https://www.debian.org/security/2022/dsa-5076', 'https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/', 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6'} | null |
GHSA | GHSA-fm4j-4xhm-xpwx | Sandbox Breakout / Arbitrary Code Execution in sandbox | All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors.
## Proof of concept
```
var Sandbox = require("sandbox")
s = new Sandbox()
code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")`
s.run(code)
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2020-09-02T15:51:34Z | 2020-09-02T15:51:34Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-fm4j-4xhm-xpwx', 'https://github.com/gf3/sandbox/issues/50', 'https://www.npmjs.com/advisories/766'} | null |
GHSA | GHSA-q3x2-jvp3-wj78 | Unrestricted XML files leading to cross-site scripting in Microweber | Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack. | {'CVE-2022-0963'} | 2022-03-29T21:18:46Z | 2022-03-16T00:00:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0963', 'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://github.com/advisories/GHSA-q3x2-jvp3-wj78', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c'} | null |
GHSA | GHSA-98pq-pmw9-4gpm | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`.
## Recommendation
Update to version 3.17.0 or later. | {'CVE-2016-10550'} | 2021-01-08T19:05:38Z | 2019-02-18T23:54:34Z | HIGH | 0 | {'CWE-89'} | {'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://nodesecurity.io/advisories/112'} | null |
GHSA | GHSA-w8h4-vw8f-rvvj | Improper Control of Dynamically-Managed Code Resources in config-shield | scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data. | {'CVE-2021-26276'} | 2022-04-27T20:27:31Z | 2021-04-13T15:30:09Z | MODERATE | 5.3 | {'CWE-913'} | {'https://advisory.checkmarx.net/advisory/CX-2021-4773', 'https://github.com/advisories/GHSA-w8h4-vw8f-rvvj', 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'} | null |
GHSA | GHSA-w5p7-h5w8-2hfq | Regular Expression Denial of Service in trim | All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim(). | {'CVE-2020-7753'} | 2022-04-27T19:19:29Z | 2021-05-10T18:44:22Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-TRIM-1017038', 'https://github.com/component/trim/blob/master/index.js', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132', 'https://lists.apache.org/thread.html/rb8462df3b6484e778905c09cd49a8912e1a302659860017ebe36da03@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r51ff3c2a4c7b8402f321eae7e624672cc2295c7bc8c12c8b871f6b0b@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r10faad1ef9166d37a1a5c9142b1af7099b8ecdc5ad05c51b8ea993d9@%3Ccommits.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-w5p7-h5w8-2hfq', 'https://github.com/component/trim/pull/8', 'https://lists.apache.org/thread.html/r75b8d0b88833d7d96afcdce3ead65e212572ead4e7a9f34d21040196@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7753', 'https://lists.apache.org/thread.html/rcc7c2865a52b544a8e49386c6880e9b9ab29bfce1052b5569d09ee4a@%3Ccommits.airflow.apache.org%3E', 'https://github.com/component/trim/blob/master/index.js%23L6'} | null |
GHSA | GHSA-2w8g-m5j8-7m87 | Zalgo-like output that crashes the server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
[`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers.
**Only NPM users that recently upgraded or installed the NPM package are affected.**
Docker users seem to not be affected as the dependencies were bundled at the time of the build, which were tested.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Latest patch. `0.26.1` to be exact at the time of writing.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You cannot get around this as it's related to dependencies.
### References
_Are there any links users can visit to find out more?_
- https://github.com/Marak/colors.js/issues/289
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issues board](https://github.com/soketi/soketi/issues)
* Email us at [alex@renoki.org](mailto:alex@renoki.org)
| null | 2022-01-12T21:45:59Z | 2022-01-12T21:45:59Z | CRITICAL | 0 | null | {'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87', 'https://github.com/advisories/GHSA-2w8g-m5j8-7m87'} | null |
GHSA | GHSA-wvcv-832q-fjg7 | RSA weakness in tslite-ng | ### Impact
The code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant.
In particular, code in current (as of 0.8.0-alpha38) master
https://github.com/tlsfuzzer/tlslite-ng/blob/0812ed60860fa61a6573b2c0e18771414958f46d/tlslite/utils/rsakey.py#L407-L441
and code in 0.7.5 branch
https://github.com/tlsfuzzer/tlslite-ng/blob/acdde3161124d6ae37c506b3476aea9996d12e97/tlslite/utils/rsakey.py#L394-L425
has multiple ways in which it leaks information (for one, it aborts as soon as the plaintext doesn't start with 0x00, 0x02) about the decrypted ciphertext (both the bit length of the decrypted message as well as where the first unexpected byte lays).
All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable.
All previous versions of tlslite-ng are vulnerable.
### Patches
The patches to fix it are proposed in
https://github.com/tlsfuzzer/tlslite-ng/pull/438
https://github.com/tlsfuzzer/tlslite-ng/pull/439
Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not be the case: https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/
As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the [security policy](https://github.com/tlsfuzzer/tlslite-ng/blob/master/SECURITY.md) of tlslite-ng.
### Workarounds
There is no way to workaround this issue.
### References
https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/
### For more information
If you have any questions or comments about this advisory please open an issue in [tlslite-ng](https://github.com/tlsfuzzer/tlslite-ng/issues). | {'CVE-2020-26263'} | 2022-04-19T19:02:42Z | 2020-12-21T16:56:37Z | LOW | 7.5 | {'CWE-326'} | {'https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/pull/438', 'https://pypi.org/project/tlslite-ng/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26263', 'https://github.com/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368', 'https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/', 'https://github.com/tlsfuzzer/tlslite-ng/pull/439'} | null |
GHSA | GHSA-2mm9-c2fx-c7m4 | XSS in docsify | This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters | {'CVE-2021-23342'} | 2021-03-15T23:55:40Z | 2021-03-01T19:44:27Z | HIGH | 0 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://www.npmjs.com/package/docsify', 'https://github.com/advisories/GHSA-2mm9-c2fx-c7m4'} | null |
GHSA | GHSA-7px3-6f6g-hxcj | Moderate severity vulnerability that affects org.apache.solr:solr-core | This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability. | {'CVE-2018-8026'} | 2021-09-03T21:01:45Z | 2018-10-17T19:55:34Z | MODERATE | 5.5 | {'CWE-611'} | {'http://www.securityfocus.com/bid/104690', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026', 'https://security.netapp.com/advisory/ntap-20190307-0002/', 'https://issues.apache.org/jira/browse/SOLR-12450', 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E', 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj'} | null |
GHSA | GHSA-59m2-j944-839w | Downloads Resources over HTTP in clang-extra | Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`.
## Recommendation
No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future.
The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10655'} | 2021-01-08T19:50:59Z | 2019-02-18T23:45:13Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-59m2-j944-839w', 'https://www.npmjs.com/advisories/265', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655', 'https://nodesecurity.io/advisories/265'} | null |
GHSA | GHSA-3hvm-hgpw-rx4j | Path Traversal in knightjs | All versions of `knightjs` are vulnerable to Path Traversal.
This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation.
## Recommendation
As there is currently no fix for this module we recommend not using this module in production environments. | {'CVE-2018-16475'} | 2021-01-08T20:01:15Z | 2018-11-06T23:11:10Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://hackerone.com/reports/403707', 'https://www.npmjs.com/advisories/743', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16475'} | null |
GHSA | GHSA-9w2p-5mgw-p94c | Integer overflow due to conversion to unsigned | ### Impact
The implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value.
```python
import tensorflow as tf
tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=[1.0,2.0],
input=[1.0,1.0],
input_min=[0.0],
input_max=[10.0],
axis=-100)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L126) uses the `axis` value as the size argument to `absl::InlinedVector` constructor. But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer.
### Patches
We have patched the issue in GitHub commit [96f364a1ca3009f98980021c4b32be5fdcca33a1](https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, and TensorFlow 2.4.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37645'} | 2021-08-25T14:43:37Z | 2021-08-25T14:43:37Z | MODERATE | 5.5 | {'CWE-681'} | {'https://github.com/advisories/GHSA-9w2p-5mgw-p94c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37645', 'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c'} | null |
GHSA | GHSA-prv2-xwr7-hr57 | Uncontrolled Resource Consumption in rdf-graph-array | rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype. | {'CVE-2019-10798'} | 2021-04-13T15:23:21Z | 2021-04-13T15:23:21Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798', 'https://github.com/advisories/GHSA-prv2-xwr7-hr57', 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'} | null |
GHSA | GHSA-3227-r97m-8j95 | Relative Path Traversal in afire serve_static | ### Impact
This vulnerability effects the built-in afire serve_static extension allowing paths containing `//....` to bypass the previous path sanitation and request files in higher directories that should not be accessible.
### Patches
The issue has been fixed in [afire 1.1.0](https://crates.io/crates/afire/1.1.0).
If you can, just update to the newest version of afire.
### Workarounds
If you can't update afire you can simply disallow paths containing `/..` with the following middleware.
Make sure this is the last middleware added to the server so it runs first, stopping the bad requests.
```rust
use afire::prelude::*;
struct PathTraversalFix;
impl Middleware for PathTraversalFix {
fn pre(&self, req: Request) -> MiddleRequest {
if req.path.replace("\\", "/").contains("/..") {
return MiddleRequest::Send(
Response::new()
.status(400)
.text("Paths containing `..` are not allowed"),
);
}
MiddleRequest::Continue
}
}
```
```rust
let mut server = Server::new(host, port);
PathTraversalFix.attach(&mut server);
```
### References
You can read about the new changes to afire in 1.1.0 [here](https://connorcode.com/writing/afire/update-3)
### For more information
If you have any questions or comments about this advisory you can email me or message me on discord.
[[https://connorcode.com/contact](https://connorcode.com/contact)] | null | 2022-04-22T20:16:47Z | 2022-04-22T20:16:45Z | HIGH | 0 | {'CWE-22', 'CWE-34'} | {'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921', 'https://github.com/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/security/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/releases/tag/v1.1.0'} | null |
GHSA | GHSA-p7jq-v8jp-j424 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | {'CVE-2021-31406'} | 2022-04-19T19:02:54Z | 2021-04-19T14:50:38Z | MODERATE | 4 | {'CWE-208', 'CWE-203'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31406', 'https://github.com/vaadin/flow/pull/10157', 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424', 'https://vaadin.com/security/cve-2021-31406', 'https://github.com/advisories/GHSA-p7jq-v8jp-j424'} | null |
GHSA | GHSA-9pgx-gcph-mpqr | XSS via the history parameter in SQL command | ### Impact
Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected.
### Patches
Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
Use browser which encodes URL parameters (e.g. Chrome or Firefox).
### References
https://sourceforge.net/p/adminer/bugs-and-features/775/
### For more information
If you have any questions or comments about this advisory:
* Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
| {'CVE-2020-35572'} | 2022-04-19T19:02:47Z | 2021-02-11T20:42:28Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/vrana/adminer', 'https://packagist.org/packages/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/news/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://github.com/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr'} | null |
GHSA | GHSA-cm5x-837x-jf3c | Division by 0 in inplace operations | ### Impact
An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0:
```python
import tensorflow as tf
tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`.
### Patches
We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37660'} | 2021-08-25T14:42:44Z | 2021-08-25T14:42:44Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-cm5x-837x-jf3c', 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'} | null |
GHSA | GHSA-5j2h-h5hg-3wf8 | Moderate severity vulnerability that affects django | Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447. | {'CVE-2011-0696'} | 2021-09-01T22:15:34Z | 2018-07-23T19:51:10Z | MODERATE | 0 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2011-0696', 'http://www.vupen.com/english/advisories/2011/0429', 'http://www.vupen.com/english/advisories/2011/0372', 'http://www.ubuntu.com/usn/USN-1066-1', 'http://www.vupen.com/english/advisories/2011/0441', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054208.html', 'http://secunia.com/advisories/43382', 'https://bugzilla.redhat.com/show_bug.cgi?id=676357', 'http://secunia.com/advisories/43426', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://www.vupen.com/english/advisories/2011/0439', 'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054207.html', 'http://secunia.com/advisories/43297', 'http://secunia.com/advisories/43230', 'http://www.debian.org/security/2011/dsa-2163', 'http://www.vupen.com/english/advisories/2011/0388', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'https://github.com/advisories/GHSA-5j2h-h5hg-3wf8', 'http://www.securityfocus.com/bid/46296'} | null |
GHSA | GHSA-88rc-3p98-rgvx | After order payment process manipulation in shopware/platform and shopware/core | ### Impact
After order payment process manipulation
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021 | null | 2021-04-13T15:13:48Z | 2021-04-13T15:13:48Z | CRITICAL | 0 | {'CWE-668'} | {'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx', 'https://github.com/advisories/GHSA-88rc-3p98-rgvx'} | null |
GHSA | GHSA-2wx6-wc87-rmjm | GitHub personal access token leaking into temporary EasyBuild (debug) logs | ### Impact
The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files.
Scope:
* the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html);
- as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories;
* the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default);
* the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully;
* you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700);
* the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone;
* for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it;
### Patches
The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248.
This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.).
**Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using "`eb --install-github-token --force`" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token).
### Workarounds
* avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2;
* don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them;
* clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild
### References
* https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue)
* (release announcement to EasyBuild mailing list)
### For more information
* Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework)
* Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be) | {'CVE-2020-5262'} | 2022-04-19T19:02:45Z | 2020-03-19T17:29:58Z | MODERATE | 7.7 | {'CWE-532'} | {'https://github.com/easybuilders/easybuild-framework/pull/3249', 'https://github.com/advisories/GHSA-2wx6-wc87-rmjm', 'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262', 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9', 'https://github.com/easybuilders/easybuild-framework/pull/3248'} | null |
GHSA | GHSA-8554-jxcw-454q | High severity vulnerability that affects webargs | An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests. | {'CVE-2019-9710'} | 2021-09-03T22:58:26Z | 2019-03-12T15:16:12Z | HIGH | 8.1 | {'CWE-362'} | {'https://github.com/marshmallow-code/webargs/issues/371', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9710', 'https://github.com/advisories/GHSA-8554-jxcw-454q', 'https://webargs.readthedocs.io/en/latest/changelog.html'} | null |
GHSA | GHSA-56pc-6jqp-xqj8 | Context isolation bypass in Electron | ### Impact
Apps using both `contextIsolation` and `sandbox: true` are affected.
Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `11.0.0-beta.6`
* `10.1.2`
* `9.3.1`
* `8.5.2`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | {'CVE-2020-15215'} | 2022-04-19T19:02:35Z | 2020-10-06T17:46:40Z | LOW | 5.6 | {'CWE-668', 'CWE-693'} | {'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15215', 'https://github.com/advisories/GHSA-56pc-6jqp-xqj8'} | null |
GHSA | GHSA-5f37-gxvh-23v6 | Remote code execution in PHPMailer | ### Impact
The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted `Sender` property.
### Patches
Fixed in 5.2.18
### Workarounds
Filter and validate user input before passing it to internal functions.
### References
https://nvd.nist.gov/vuln/detail/CVE-2016-10033
Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2016-10033'} | 2021-08-19T19:41:00Z | 2020-03-05T22:09:17Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://www.exploit-db.com/exploits/40968/', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'https://www.exploit-db.com/exploits/41996/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6', 'https://www.exploit-db.com/exploits/40969/', 'http://www.securitytracker.com/id/1037533', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml', 'http://seclists.org/fulldisclosure/2016/Dec/78', 'https://www.exploit-db.com/exploits/42221/', 'https://www.exploit-db.com/exploits/42024/', 'http://www.securityfocus.com/bid/95108', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18', 'http://www.securityfocus.com/archive/1/539963/100/0/threaded', 'https://www.drupal.org/psa-2016-004', 'https://www.exploit-db.com/exploits/40970/', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10033', 'https://www.exploit-db.com/exploits/41962/', 'https://www.exploit-db.com/exploits/40974/', 'https://www.exploit-db.com/exploits/40986/', 'http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html', 'https://github.com/advisories/GHSA-5f37-gxvh-23v6'} | null |
GHSA | GHSA-p2v9-g2qv-p635 | HTTP Request Smuggling in Netty | HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. | {'CVE-2019-20445'} | 2021-08-25T17:37:44Z | 2020-02-21T18:55:04Z | MODERATE | 0 | {'CWE-444'} | {'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-p2v9-g2qv-p635', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/netty/netty/pull/9865', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/issues/9861', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0601', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E'} | null |
GHSA | GHSA-5v9h-q3gj-c32x | SQL Injection via GeoJSON in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documents using `GeomFromText`.
## Recommendation
Update to version 3.23.6 or later. | {'CVE-2016-1000225'} | 2021-09-23T21:29:15Z | 2020-09-01T15:27:40Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/advisories/GHSA-5v9h-q3gj-c32x', 'https://github.com/sequelize/sequelize/issues/6194', 'https://www.npmjs.com/advisories/122', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000225', 'https://snyk.io/vuln/npm:sequelize:20160718'} | null |
GHSA | GHSA-cxjc-r2fp-7mq6 | XSS in dijit editor's LinkDialog plugin | ### Impact
XSS possible for users of the Dijit Editor's LinkDialog plugin
### Patches
Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3
### Workarounds
Users may apply the patch made in these releases.
### For more information
If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/) | {'CVE-2020-4051'} | 2022-04-19T19:02:29Z | 2020-06-15T21:53:12Z | LOW | 3.7 | {'CWE-79'} | {'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051'} | null |
GHSA | GHSA-mh27-rxmr-8q4c | Cross-site Scripting in Jenkins SiteMonitor Plugin | Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-28153'} | 2022-04-12T21:58:32Z | 2022-03-30T00:00:23Z | MODERATE | 5.4 | {'CWE-79'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932', 'https://github.com/advisories/GHSA-mh27-rxmr-8q4c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153', 'http://www.openwall.com/lists/oss-security/2022/03/29/1'} | null |
GHSA | GHSA-2wwc-w2gw-4329 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335. | {'CVE-2019-1366'} | 2021-03-29T20:55:36Z | 2021-03-29T20:55:36Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366', 'https://github.com/advisories/GHSA-2wwc-w2gw-4329'} | null |
GHSA | GHSA-rqrc-8q8f-cp9c | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | {'CVE-2020-1469'} | 2022-04-08T22:43:53Z | 2022-04-08T18:11:51Z | HIGH | 7.5 | {'CWE-835', 'CWE-434'} | {'https://github.com/advisories/GHSA-rqrc-8q8f-cp9c', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'} | null |
GHSA | GHSA-7375-vjr2-3g7w | Cross-Site Scripting in glance | Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package. | {'CVE-2018-3748'} | 2021-09-02T19:13:46Z | 2018-09-27T11:37:19Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://hackerone.com/reports/310133', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'} | null |
GHSA | GHSA-7378-6268-4278 | High severity vulnerability that affects DotNetZip | DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002205'} | 2021-01-08T19:18:21Z | 2018-10-16T17:16:40Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} | null |
GHSA | GHSA-q9mp-79cp-9g8j | Improper Authentication | Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. | {'CVE-2019-20894'} | 2021-09-02T22:00:09Z | 2021-09-02T22:00:09Z | HIGH | 7.5 | {'CWE-287', 'CWE-295'} | {'https://github.com/containous/traefik/pull/7008', 'https://github.com/containous/traefik/issues/5312', 'https://github.com/advisories/GHSA-q9mp-79cp-9g8j', 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894'} | null |
GHSA | GHSA-85cw-hj65-qqv9 | Polymorphic Typing issue in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. | {'CVE-2019-16335'} | 2021-08-17T22:28:01Z | 2019-09-23T18:33:45Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-85cw-hj65-qqv9', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16335', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'} | null |
GHSA | GHSA-3x8c-fmpc-5rmq | Cross-site scripting (XSS) vulnerability in the fallback authentication endpoint | ### Impact
The fallback authentication endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains.
### Patches
This is fixed by #8444, which is included in Synapse v1.21.0.
### Workarounds
If the homeserver is not configured to use reCAPTCHA, consent (terms of service), or single sign-on then the affected endpoint can be blocked at a reverse proxy:
* `/_matrix/client/r0/auth/.*/fallback/web`
* `/_matrix/client/unstable/auth/.*/fallback/web` | {'CVE-2020-26891'} | 2022-04-19T19:02:38Z | 2020-10-16T16:56:04Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/matrix-org/synapse/pull/8444', 'https://github.com/advisories/GHSA-3x8c-fmpc-5rmq', 'https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory', 'https://github.com/matrix-org/synapse/releases', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26891', 'https://github.com/matrix-org/synapse/releases/tag/v1.21.2'} | null |
GHSA | GHSA-p6j8-hgv5-m35g | Uncontrolled Resource Consumption in jboss-remoting | A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability. | {'CVE-2020-35510'} | 2022-03-21T21:44:45Z | 2022-03-18T17:58:30Z | HIGH | 7.5 | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1905796', 'https://github.com/advisories/GHSA-p6j8-hgv5-m35g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'} | null |
GHSA | GHSA-xw93-v57j-fcgh | Division by 0 in `SparseMatMul` | ### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`:
```python
import tensorflow as tf
a = tf.constant([100.0, 100.0, 100.0, 100.0], shape=[2, 2], dtype=tf.float32)
b = tf.constant([], shape=[0, 2], dtype=tf.float32)
tf.raw_ops.SparseMatMul(
a=a, b=b, transpose_a=True, transpose_b=True,
a_is_sparse=True, b_is_sparse=True)
```
The division by 0 occurs deep in Eigen code because the `b` tensor is empty.
### Patches
We have patched the issue in GitHub commit [7f283ff806b2031f407db64c4d3edcda8fb9f9f5](https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29557'} | 2021-05-21T14:24:48Z | 2021-05-21T14:24:48Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29557', 'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh', 'https://github.com/advisories/GHSA-xw93-v57j-fcgh'} | null |
GHSA | GHSA-8wrg-m8vm-5fvj | Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server | ### Impact
Authentication Bypass by Primary Weakness (CWE-305)
Commit:
https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1
ALL Users is impacted.
### Patches
Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6 | {'CVE-2021-21403'} | 2022-04-19T19:02:51Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-305'} | {'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj', 'https://github.com/advisories/GHSA-8wrg-m8vm-5fvj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403', 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'} | null |
GHSA | GHSA-69vj-xx27-g45w | Data race in eventio | An issue was discovered in Input<R> in the eventio crate before 0.5.1 for Rust. Because a non-Send type can be sent to a different thread, a data race and memory corruption can occur. | {'CVE-2020-36216'} | 2021-08-25T20:51:49Z | 2021-08-25T20:51:49Z | MODERATE | 5.9 | {'CWE-662', 'CWE-787'} | {'https://github.com/petabi/eventio/issues/33', 'https://rustsec.org/advisories/RUSTSEC-2020-0108.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36216', 'https://github.com/advisories/GHSA-69vj-xx27-g45w'} | null |
GHSA | GHSA-9qcf-c26r-x5rf | XML external entity injection in Terracotta Quartz Scheduler | initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | {'CVE-2019-13990'} | 2021-10-21T21:18:40Z | 2020-07-01T17:55:03Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-9qcf-c26r-x5rf', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-7g65-ghrg-hpf5 | Moderate severity vulnerability that affects actionpack | Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup. | {'CVE-2012-3465'} | 2021-09-02T21:18:21Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-79'} | {'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://secunia.com/advisories/50694', 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465', 'https://github.com/advisories/GHSA-7g65-ghrg-hpf5', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'} | null |
GHSA | GHSA-x2fc-mxcx-w4mf | Prototype Pollution in mathjs | The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates. | {'CVE-2020-7743'} | 2021-05-10T18:39:04Z | 2021-05-10T18:39:04Z | HIGH | 0 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://www.npmjs.com/package/mathjs', 'https://github.com/advisories/GHSA-x2fc-mxcx-w4mf', 'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'} | null |
GHSA | GHSA-gcv8-gh4r-25x6 | Authorization Bypass Through User-Controlled Key in urijs | Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647. | {'CVE-2022-0613'} | 2022-04-01T18:06:55Z | 2022-02-17T00:00:35Z | MODERATE | 6.5 | {'CWE-639'} | {'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/', 'https://github.com/advisories/GHSA-gcv8-gh4r-25x6', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613'} | null |
GHSA | GHSA-m7fq-cf8q-35q7 | High severity vulnerability that affects crack | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-1800'} | 2021-09-15T18:18:56Z | 2017-10-24T18:33:37Z | HIGH | 0 | null | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'http://secunia.com/advisories/52897', 'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html'} | null |
GHSA | GHSA-f8q4-jwww-x3wv | Race Condition in Paramiko | In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. | {'CVE-2022-24302'} | 2022-04-18T22:19:04Z | 2022-03-19T00:01:03Z | MODERATE | 5.9 | {'CWE-362'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/', 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html', 'https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml', 'https://www.paramiko.org/changelog.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/', 'https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/', 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'} | null |
GHSA | GHSA-2p6g-gjp8-ggg9 | Validation bypass in personnummer | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2020-09-11T16:41:26Z | 2020-09-09T17:29:34Z | LOW | 0 | null | {'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'} | null |
GHSA | GHSA-4r97-78gf-q24v | Prototype Pollution in klona | Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.1.1 or later. | null | 2021-10-04T20:52:22Z | 2020-09-04T17:53:27Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1463', 'https://hackerone.com/reports/778414', 'https://github.com/advisories/GHSA-4r97-78gf-q24v'} | null |
GHSA | GHSA-cgjx-mwpx-47jv | Private Data Disclosure in express-restify-mongoose | Affected versions of `express-restify-mongoose` are susceptible to an information leakage vulnerability which may allow an attacker to access fields on a model even if those fields are marked as private.
## Proof of Concept
If you have a user model that you want to protect, such as the following User model:
```
const User = mongoose.model('User', new mongoose.Schema({
name: String,
password: String,
}));
```
You would normally do something such as:
```
restify.serve(router, User, {
private: ['password'], // Set the password part of User as private, so outside people can't read it
})
```
This would hide the password field from people that send your application a `GET /User` and `GET /User/some-user-id` request.
A malicious user can go to your application and send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This could be used for other private data, if the malicious user knew what was set as private for specific routes.
## Recommendation
Version 2.x: Update to version 2.5.0 or later.
Version 3.x: Update to version 3.1.0 or later. | {'CVE-2016-10533'} | 2021-01-08T18:58:32Z | 2018-10-23T17:14:57Z | HIGH | 0 | {'CWE-200'} | {'https://nodesecurity.io/advisories/92', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10533', 'https://github.com/florianholzapfel/express-restify-mongoose/issues/252', 'https://www.npmjs.com/advisories/92', 'https://github.com/advisories/GHSA-cgjx-mwpx-47jv'} | null |
GHSA | GHSA-m6wh-m8m8-6xx5 | Exfiltrates data on installation in cofeescript | The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofeescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16202'} | 2021-01-08T18:30:25Z | 2018-08-06T20:05:28Z | MODERATE | 0 | {'CWE-506'} | {'https://www.npmjs.com/advisories/541', 'https://nodesecurity.io/advisories/541', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202', 'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5'} | null |
GHSA | GHSA-4g54-95xv-f353 | Hijacked Environment Variables in http-proxy.js | The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16075'} | 2021-01-08T19:55:20Z | 2018-08-29T23:16:56Z | MODERATE | 0 | {'CWE-506'} | {'https://github.com/advisories/GHSA-4g54-95xv-f353', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075', 'https://www.npmjs.com/advisories/514', 'https://nodesecurity.io/advisories/514'} | null |
GHSA | GHSA-pw2r-vq6v-hr8c | Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects | Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8. | {'CVE-2022-0536'} | 2022-02-14T22:27:57Z | 2022-02-10T00:00:31Z | MODERATE | 5.9 | {'CWE-200'} | {'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://github.com/advisories/GHSA-pw2r-vq6v-hr8c', 'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'} | null |
GHSA | GHSA-388g-jwpg-x6j4 | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.0.13 or later. | null | 2021-09-28T17:00:24Z | 2020-09-11T21:20:14Z | MODERATE | 6.5 | {'CWE-79'} | {'https://www.npmjs.com/advisories/985', 'https://github.com/advisories/GHSA-388g-jwpg-x6j4', 'https://github.com/swagger-api/swagger-ui/issues/3163', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941'} | null |
GHSA | GHSA-8qm2-24qc-c4qg | Malicious Package in freshdom | Version 0.0.6 of `freshdom` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.6 of this module is found installed you will want to replace it with a version before or after 0.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2021-09-24T17:32:51Z | 2020-09-01T19:57:56Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://snyk.io/vuln/SNYK-JS-FRESHDOM-450987', 'https://github.com/advisories/GHSA-8qm2-24qc-c4qg', 'https://github.com/jamiller619/freshdom', 'https://www.npmjs.com/advisories/627'} | null |
GHSA | GHSA-m36x-mgfh-8g78 | Subdomain Takeover in Interactsh server | A domain configured with interactsh server was vulnerable to subdomain takeover for specfic subdomain, i.e `app`, Interactsh server before `< 1.0.0` used to create cname entries for `app` pointing to `projectdiscovery.github.io` as default which intended to used for hosting interactsh [web client](https://github.com/projectdiscovery/interactsh-web) using GitHub pages. It turns out to be a security issue with a self-hosted interactsh server in which the user may not have configured a web client but still have a cname entry pointing to GitHub pages, making them vulnerable to subdomain takeover.
This issue was initially reported to us as a subdomain takeover for one of our domains that runs interactsh server by **Melih** at `security@projectdiscovery.io`, and after conducting an internal investigation, we determined that it was an issue with the default config of interactsh server affecting all the server running self-hosted instance of interactsh, as a result - cname entry has been removed in the latest release.
#### Impact
This allows one to host / run arbitrary client side code (XSS) in a user's browser when browsing the vulnerable subdomain, for more details on the impact, please read this [detailed blogpost](https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/) from Detectify.
#### Patches
Update to [Interactsh server v1.0.0 ](https://github.com/projectdiscovery/interactsh/releases/tag/v1.0.0)with `go install -v github.com/projectdiscovery/interactsh/cmd/interactsh-server@latest`
#### References
https://github.com/projectdiscovery/interactsh/issues/136
#### For more information
If you have any questions or comments about this advisory:
* Email us at [security@projectdiscovery.io](mailto:security@projectdiscovery.io)
| null | 2022-01-27T15:15:25Z | 2022-01-27T15:15:25Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/projectdiscovery/interactsh/security/advisories/GHSA-m36x-mgfh-8g78', 'https://github.com/projectdiscovery/interactsh/issues/136', 'https://github.com/advisories/GHSA-m36x-mgfh-8g78'} | null |
GHSA | GHSA-9g9w-hmvj-5h57 | Prototype Pollution in merge-deep | Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 3.0.1 or later. | {'CVE-2018-3722'} | 2021-01-08T19:04:35Z | 2018-07-26T15:17:15Z | LOW | 0 | {'CWE-471'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://www.npmjs.com/advisories/580', 'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://hackerone.com/reports/310708', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57'} | null |
GHSA | GHSA-mqf3-28j7-3mj6 | Information Exposure in Kubernetes | Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name. | {'CVE-2015-7528'} | 2022-04-12T22:40:23Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-200'} | {'https://access.redhat.com/errata/RHSA-2015:2544', 'https://github.com/kubernetes/kubernetes/pull/17886', 'https://github.com/openshift/origin/pull/6113', 'http://rhn.redhat.com/errata/RHSA-2015-2615.html', 'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7528', 'https://github.com/advisories/GHSA-mqf3-28j7-3mj6', 'https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5'} | null |
GHSA | GHSA-9j5m-873f-xh76 | Directory Traversal in static-html-server | Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16152'} | 2021-01-08T19:03:58Z | 2018-07-23T20:46:32Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16152', 'https://nodesecurity.io/advisories/376', 'https://www.npmjs.com/advisories/376', 'https://github.com/advisories/GHSA-9j5m-873f-xh76', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'} | null |
GHSA | GHSA-88cc-g835-76rp | Improper Restriction of XML External Entity Reference | PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | {'CVE-2020-13692'} | 2022-02-10T00:30:23Z | 2022-02-10T00:30:07Z | HIGH | 7.7 | {'CWE-611'} | {'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://github.com/advisories/GHSA-88cc-g835-76rp', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-j6qj-j888-vvgq | Directory exposure in jetty | ### Impact
If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download.
For example, the problem manifests in the following `${jetty.base}`:
```$ tree demo-base/
demo-base/
├── etc
├── lib
├── resources
├── start.d
├── deploy
│ └── async-rest.war
└── webapps -> deploy
```
### Workarounds
Do not use a symlink | {'CVE-2021-28163'} | 2022-04-22T15:49:56Z | 2021-04-06T17:32:00Z | LOW | 2.7 | {'CWE-200', 'CWE-59'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-j6qj-j888-vvgq', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/'} | null |
GHSA | GHSA-xqh8-5j36-4556 | SQL Injection in connect-pg-simple | Versions of `connect-pg-simple` are vulnerable to SQL Injection. The `PGStore.prototype.quotedTable` function allows for the query to be manipulated if the input has double quotes through the `schemaName` or `tableName` variables. These variables are passed to the constructor and are unlikely to be controlled by user-input. If they are controlled by user-input it could allow attackers to execute arbitrary SQL queries.
## Recommendation
Upgrade to version 6.0.1 or later. | {'CVE-2019-15658'} | 2021-09-22T15:15:41Z | 2019-08-26T16:59:45Z | HIGH | 7.3 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-15658', 'https://www.npmjs.com/advisories/1153', 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556', 'https://github.com/advisories/GHSA-xqh8-5j36-4556', 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'} | null |
GHSA | GHSA-f5cv-xrv9-r8w7 | NoSQL injection in express-cart | Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection.
The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators.
These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start.
## Recommendation
Update to version 1.1.8 or later. | null | 2021-09-24T20:58:37Z | 2020-09-01T21:17:16Z | HIGH | 0 | {'CWE-89'} | {'https://www.npmjs.com/advisories/724', 'https://hackerone.com/reports/397445', 'https://github.com/advisories/GHSA-f5cv-xrv9-r8w7', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json'} | null |
GHSA | GHSA-9fhw-r42p-5c7r | Regular expression Denial of Service in @progfay/scrapbox-parser | ### Impact
A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js.
The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU.
### Patches
Upgrade to version 6.0.3, 7.0.2 or later.
### Workarounds
Avoid to parse text with a lot of `[` chars.
### References
* https://github.com/progfay/scrapbox-parser/pull/519
* https://github.com/progfay/scrapbox-parser/pull/539
* https://github.com/progfay/scrapbox-parser/pull/540
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405
* https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues) | {'CVE-2021-27405'} | 2022-04-19T19:02:48Z | 2021-03-01T20:44:44Z | MODERATE | 4.3 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27405', 'https://github.com/progfay/scrapbox-parser/pull/539', 'https://security.netapp.com/advisory/ntap-20210326-0002/', 'https://github.com/progfay/scrapbox-parser/pull/519', 'https://github.com/advisories/GHSA-9fhw-r42p-5c7r', 'https://github.com/progfay/scrapbox-parser/pull/540', 'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r'} | null |
GHSA | GHSA-cqxx-66wh-8pjw | Improper Removal of Sensitive Information Before Storage or Transfer in irrd | IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected.
The issue occurred:
* For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected.
* For any GraphQL queries that queried the `auth` field on `mntner` objects.
* For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access.
The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed.
This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x] | {'CVE-2022-24798'} | 2022-04-13T01:15:56Z | 2022-04-01T13:59:17Z | HIGH | 7.5 | {'CWE-212'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24798', 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw', 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6', 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/', 'https://github.com/advisories/GHSA-cqxx-66wh-8pjw'} | null |
GHSA | GHSA-9qj7-jvg4-qr2x | Moderate severity vulnerability that affects passenger | Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem. | {'CVE-2013-2119'} | 2021-09-08T20:47:39Z | 2017-10-24T18:33:37Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x', 'https://bugzilla.redhat.com/show_bug.cgi?id=892813', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'} | null |
GHSA | GHSA-mmph-wp49-r48h | Malicious Package in experss | All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:02:46Z | 2020-09-02T20:20:26Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-mmph-wp49-r48h', 'https://www.npmjs.com/advisories/852'} | null |
GHSA | GHSA-fr32-gr5c-xq5c | Escape sequence injection in RubyGems | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible. | {'CVE-2019-8321'} | 2021-08-17T13:32:02Z | 2019-06-20T16:06:04Z | HIGH | 7.5 | {'CWE-88'} | {'https://hackerone.com/reports/317330', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://github.com/advisories/GHSA-fr32-gr5c-xq5c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321'} | null |
GHSA | GHSA-45h5-r968-5xr7 | Exposure of sensitive information in Elasticsearch | A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | {'CVE-2021-22147'} | 2021-10-11T18:43:29Z | 2021-09-20T20:29:40Z | MODERATE | 6.5 | {'CWE-732'} | {'https://github.com/advisories/GHSA-45h5-r968-5xr7', 'https://www.elastic.co/community/security/', 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147', 'https://security.netapp.com/advisory/ntap-20211008-0002/'} | null |
GHSA | GHSA-fw76-p9p2-6pvf | Malicious Package in serilize | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:28:14Z | 2020-09-03T19:58:58Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1140', 'https://github.com/advisories/GHSA-fw76-p9p2-6pvf'} | null |
GHSA | GHSA-5mjw-6jrh-hvfq | Sandbox Breakout / Arbitrary Code Execution in static-eval | Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = '(function(){console.log(process.pid)})()';
var ast = parse(src).body[0].expression;
var res = evaluate(ast, {});
// Will print the process id
```
## Recommendation
Update to version 2.0.0 or later. | {'CVE-2017-16226'} | 2021-01-08T21:14:45Z | 2018-08-06T21:37:06Z | MODERATE | 0 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16226', 'https://github.com/substack/static-eval/pull/18', 'https://nodesecurity.io/advisories/548', 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq', 'https://www.npmjs.com/advisories/548', 'https://maustin.net/articles/2017-10/static_eval'} | null |
GHSA | GHSA-qrvj-274h-hfcg | Deserialization of Untrusted Data in topthink/framework | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache. | {'CVE-2021-36567'} | 2022-04-05T21:16:58Z | 2021-12-07T00:00:28Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/top-think/framework/issues/2561', 'https://github.com/advisories/GHSA-qrvj-274h-hfcg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567'} | null |
GHSA | GHSA-vwx4-frpr-w27j | Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin | Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured. | {'CVE-2022-25210'} | 2022-02-26T00:37:35Z | 2022-02-16T00:01:14Z | MODERATE | 6.5 | {'CWE-662', 'CWE-820'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25210', 'https://github.com/advisories/GHSA-vwx4-frpr-w27j'} | null |
GHSA | GHSA-rmw5-xpg9-jr29 | Use of Cryptographically Weak Pseudo-Random Number Generator in Rclone | An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed. | {'CVE-2020-28924'} | 2022-04-27T20:30:32Z | 2021-06-10T17:23:21Z | HIGH | 7.5 | {'CWE-338', 'CWE-331'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/', 'https://github.com/rclone/rclone/issues/4783', 'https://github.com/advisories/GHSA-rmw5-xpg9-jr29', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28924', 'https://security.gentoo.org/glsa/202107-14'} | null |
GHSA | GHSA-4gf2-xv97-63m2 | Exposure of Sensitive Information in keycloak | A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events. | {'CVE-2020-1744'} | 2021-09-20T20:43:24Z | 2021-09-20T20:43:24Z | MODERATE | 5.6 | {'CWE-200', 'CWE-755'} | {'https://access.redhat.com/security/cve/CVE-2020-1744', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744', 'https://github.com/advisories/GHSA-4gf2-xv97-63m2'} | null |
GHSA | GHSA-3j95-fjv2-3m4p | CSS Injection in Chartkick gem | The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute). | {'CVE-2020-16254'} | 2021-09-23T18:53:25Z | 2020-08-12T14:29:15Z | MODERATE | 6.1 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f', 'https://github.com/advisories/GHSA-3j95-fjv2-3m4p', 'https://github.com/ankane/chartkick', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml'} | null |
GHSA | GHSA-6w7g-p4jh-rf92 | "Verify All" Returns Success Despite Validation Failures in Singularity | ### Impact
The `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified.
The SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0` are returned.
Workflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior.
```
$ singularity verify -a image.sif
WARNING: Missing signature for SIF descriptor 2 (JSON.Generic)
WARNING: Missing signature for SIF descriptor 3 (FS)
Container is signed by 1 key(s):
Verifying partition: Def.FILE:
12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84
[LOCAL] Unit Test <unit@test.com>
[OK] Data integrity verified
INFO: Container verified: image.sif
$ echo $?
0
```
### Patches
Singularity 3.6.0 has a new implementation of sign/verify that fixes this issue.
All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.
Version 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format.
### Workarounds
If you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container.
Note that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy | {'CVE-2020-13846'} | 2022-04-19T19:02:30Z | 2021-12-20T18:24:43Z | HIGH | 7.5 | null | {'https://github.com/advisories/GHSA-6w7g-p4jh-rf92', 'https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13846'} | null |
GHSA | GHSA-v935-pqmr-g8v9 | Unexpected panics in num-bigint | ### Impact
Two scenarios were reported where `BigInt` and `BigUint` multiplication may unexpectedly panic.
- The internal `mac3` function did not expect the possibility of non-empty all-zero inputs, leading to an `unwrap()` panic.
- A buffer was allocated with less capacity than needed for an intermediate result, leading to an assertion panic.
Rust panics can either cause stack unwinding or program abort, depending on the application configuration. In some settings, an unexpected panic may constitute a denial-of-service vulnerability.
### Patches
Both problems were introduced in version 0.4.1, and are fixed in version 0.4.3.
### For more information
If you have any questions or comments about this advisory, please open an issue in the [num-bigint](https://github.com/rust-num/num-bigint) repo.
### Acknowledgements
Thanks to Guido Vranken and Arvid Norberg for privately reporting these issues to the author.
### References
* [GHSA-v935-pqmr-g8v9](https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9)
* [num-bigint#228](https://github.com/rust-num/num-bigint/pull/228)
| null | 2022-04-19T19:03:13Z | 2021-11-03T17:36:04Z | MODERATE | 0 | {'CWE-131', 'CWE-20'} | {'https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9', 'https://github.com/advisories/GHSA-v935-pqmr-g8v9', 'https://github.com/rust-num/num-bigint/pull/228'} | null |
GHSA | GHSA-vrgp-3ph6-2wwq | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | {'CVE-2021-36625'} | 2022-04-15T23:31:18Z | 2022-04-01T00:00:41Z | HIGH | 8.8 | {'CWE-89'} | {'https://github.com/advisories/GHSA-vrgp-3ph6-2wwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | null |
GHSA | GHSA-7cg8-pq9v-x98q | Sandbox Breakout in realms-shim | Versions of `realms-shim` prior to 1.2.1 are vulnerable to a Sandbox Breakout. The Realms evaluation function has an option to apply Babel-like transformations to the source code before it reaches the evaluator. One portion of this transform pipeline exposed a primal-Realm object to the rewriting function. Confined code which used the evaluator itself could provide a malicious rewriter function that captured this object, and use it to breach the sandbox.
## Recommendation
Upgrade to version 1.2.1 or later. | null | 2021-09-02T21:14:20Z | 2019-10-21T21:58:55Z | CRITICAL | 9.8 | null | {'https://github.com/advisories/GHSA-7cg8-pq9v-x98q', 'https://www.npmjs.com/advisories/1218', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-7cg8-pq9v-x98q', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-536069'} | null |
GHSA | GHSA-3q32-j57w-q4w7 | Path Traversal in total.js | Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths.
The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`.
## Recommendation
- If you are using version 2.1.x, upgrade to 2.1.1 or later.
- If you are using version 2.2.x, upgrade to 2.2.1 or later.
- If you are using version 2.3.x, upgrade to 2.3.1 or later.
- If you are using version 2.4.x, upgrade to 2.4.1 or later.
- If you are using version 2.5.x, upgrade to 2.5.1 or later.
- If you are using version 2.6.x, upgrade to 2.6.3 or later.
- If you are using version 2.7.x, upgrade to 2.7.1 or later.
- If you are using version 2.8.x, upgrade to 2.8.1 or later.
- If you are using version 2.9.x, upgrade to 2.9.5 or later.
- If you are using version 3.0.x, upgrade to 3.0.1 or later.
- If you are using version 3.1.x, upgrade to 3.1.1 or later.
- If you are using version 3.2.x, upgrade to 3.2.4 or later. | {'CVE-2019-8903'} | 2021-08-31T21:22:07Z | 2019-02-20T15:40:13Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b', 'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8903'} | null |
GHSA | GHSA-6mww-xvh7-fq4f | Koji hub call does not perform correct access checks | Koji version 1.12, 1.13, 1.14 and 1.15 contain an incorrect access control vulnerability resulting in arbitrary filesystem read/write access. This vulnerability has been fixed in versions 1.12.1, 1.13.1, 1.14.1 and 1.15.1. | {'CVE-2018-1002150'} | 2022-04-26T18:08:41Z | 2018-07-12T20:29:40Z | CRITICAL | 9.1 | {'CWE-732'} | {'https://github.com/advisories/GHSA-6mww-xvh7-fq4f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002150', 'https://docs.pagure.org/koji/CVE-2018-1002150/', 'https://pagure.io/koji/c/ab1ade7', 'https://pagure.io/koji/issue/850'} | null |
GHSA | GHSA-mq35-wqvf-r23c | Sinatra has XSS via 400 Bad Request page via params parser exception | Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception. | {'CVE-2018-11627'} | 2022-04-26T18:04:34Z | 2018-06-05T21:32:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-mq35-wqvf-r23c', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://github.com/sinatra/sinatra/issues/1428', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://access.redhat.com/errata/RHSA-2019:0315'} | null |
GHSA | GHSA-45vg-2v73-vm62 | Moderate severity vulnerability that affects org.springframework:spring-core | The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors. | {'CVE-2015-0201'} | 2021-08-31T21:46:16Z | 2018-10-17T20:28:20Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-0201', 'https://pivotal.io/security/cve-2015-0201', 'https://github.com/advisories/GHSA-45vg-2v73-vm62'} | null |
GHSA | GHSA-q257-vv4p-fg92 | Header Forgery in http-signature | Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature.
This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names.
## Proof of Concept
Consider this to be the initial, untampered request:
```
POST /pay HTTP/1.1
Host: example.com
Date: Thu, 05 Jan 2012 21:31:40 GMT
X-Payment-Source: src@money.com
X-Payment-Destination: dst@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5...
```
And the request is intercepted and tampered as follows:
```
X-Payment-Source: dst@money.com // Emails switched
X-Payment-Destination: src@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5...
```
In the resulting responses, both requests would pass signature verification without issue.
```
src@money.com\n
dst@money.com\n
```
## Recommendation
Update to version 0.10.0 or higher. | {'CVE-2017-16005'} | 2021-01-08T18:19:04Z | 2018-11-09T17:49:34Z | LOW | 0 | {'CWE-20'} | {'https://github.com/joyent/node-http-signature/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005', 'https://github.com/advisories/GHSA-q257-vv4p-fg92', 'https://nodesecurity.io/advisories/318', 'https://www.npmjs.com/advisories/318'} | null |
GHSA | GHSA-v3wr-67px-44xg | Execution with Unnecessary Privileges in arc-electron | ### Impact
When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes file system access, data store access (which may contain sensitive information), and some additional processes that only ARC should have access to.
### Patches
This is patched in version 17.0.9.
### Workarounds
Do not click onto any link in the response headers view.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [advanced-rest-client/arc-electron](https://github.com/advanced-rest-client/arc-electron)
* Email us at [Salesforce Security](mailto:security@salesforce.com)
| null | 2022-03-08T21:08:36Z | 2022-03-03T19:11:14Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-v3wr-67px-44xg', 'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg'} | null |
GHSA | GHSA-wqv3-8cm6-h6wg | Improper Authentication in Kubernetes | A security issue was discovered in kube-proxy which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
https://www.openwall.com/lists/oss-security/2020/07/08/1 | {'CVE-2020-8558'} | 2022-04-12T22:19:38Z | 2022-02-15T01:57:18Z | HIGH | 8.8 | {'CWE-287', 'CWE-420'} | {'https://security.netapp.com/advisory/ntap-20200821-0001/', 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8558', 'https://github.com/advisories/GHSA-wqv3-8cm6-h6wg', 'https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE', 'https://bugzilla.redhat.com/show_bug.cgi?id=1843358', 'https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation', 'https://github.com/kubernetes/kubernetes/issues/92315', 'https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ', 'https://github.com/tabbysable/POC-2020-8558'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.