ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-8p83-68cw-943f
Apache Ignite communicates to an external PHP server where sensitive information is sent
Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.
{'CVE-2017-7686'}
2022-04-26T19:13:38Z
2018-10-16T20:53:20Z
HIGH
7.5
{'CWE-200'}
{'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html', 'https://github.com/advisories/GHSA-8p83-68cw-943f', 'http://www.securityfocus.com/bid/99292', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7686'}
null
GHSA
GHSA-j9wf-vvm6-4r9w
Unverified Ownership in Kubernetes
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
{'CVE-2020-8554'}
2022-04-25T21:30:55Z
2022-02-08T21:50:34Z
MODERATE
6.3
{'CWE-283', 'CWE-863'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/kubernetes/kubernetes/issues/97076', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8554', 'https://github.com/kubernetes/kubernetes/issues/97110', 'https://github.com/advisories/GHSA-j9wf-vvm6-4r9w', 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E', 'https://groups.google.com/g/kubernetes-security-announce/c/iZWsF9nbKE8', 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-pv36-h7jh-qm62
Heap buffer overflow in CefSharp
### Impact A memory corruption bug(Heap overflow) in the FreeType font rendering library. > This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images . As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild. ### Patches Upgrade to 85.3.130 or higher ### References - https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ - https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 - https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942 To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
{'CVE-2020-15999'}
2022-01-31T22:01:41Z
2020-10-27T19:47:38Z
MODERATE
6.5
{'CWE-119', 'CWE-787'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/', 'https://crbug.com/1139963', 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html', 'https://security.gentoo.org/glsa/202012-04', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62', 'https://www.nuget.org/packages/CefSharp.Common/', 'https://www.nuget.org/packages/CefSharp.WinForms', 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html', 'http://seclists.org/fulldisclosure/2020/Nov/33', 'https://security.gentoo.org/glsa/202011-12', 'https://github.com/advisories/GHSA-pv36-h7jh-qm62', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999', 'https://www.nuget.org/packages/CefSharp.Wpf', 'https://www.debian.org/security/2021/dsa-4824', 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost'}
null
GHSA
GHSA-7322-9mx6-5j2m
High severity vulnerability that affects redcarpet
Stack-based buffer overflow in the header_anchor function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
{'CVE-2015-5147'}
2021-09-02T19:13:11Z
2018-08-15T20:04:30Z
HIGH
0
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-5147', 'https://github.com/advisories/GHSA-7322-9mx6-5j2m', 'http://www.securityfocus.com/bid/75508', 'http://www.openwall.com/lists/oss-security/2015/06/29/3', 'http://www.openwall.com/lists/oss-security/2015/06/30/10', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md'}
null
GHSA
GHSA-322v-p3jc-7hrg
Cross-Site Request Forgery in Anchor CMS
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts.
{'CVE-2022-25576'}
2022-04-05T20:55:18Z
2022-03-26T00:00:34Z
MODERATE
4.5
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25576', 'https://github.com/anchorcms/anchor-cms', 'https://github.com/advisories/GHSA-322v-p3jc-7hrg', 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'}
null
GHSA
GHSA-pg2f-r7pc-6fxx
Cross-Site Request Forgery in MicroPyramid Django CRM
Multiple CSRF issues exist in MicroPyramid Django CRM 0.2.1 via /change-password-by-admin/, /api/settings/add/, /cases/create/, /change-password-by-admin/, /comment/add/, /documents/1/view/, /documents/create/, /opportunities/create/, and /login/.
{'CVE-2019-11457'}
2021-08-17T22:19:47Z
2019-09-11T22:57:57Z
HIGH
8.8
{'CWE-352'}
{'http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html', 'http://seclists.org/fulldisclosure/2019/Aug/30', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11457', 'https://www.netsparker.com/blog/web-security/', 'https://github.com/advisories/GHSA-pg2f-r7pc-6fxx'}
null
GHSA
GHSA-3j9m-hcv9-rpj8
XSS vulnerability allowing arbitrary JavaScript execution
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ## CVE-2021-41174 XSS vulnerability on unauthenticated pages ### Summary CVSS Score: 6.9 Medium CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L) We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability. It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability. ### Impact If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. There are two ways an unauthenticated user can open a page in Grafana that contains the login button: - Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack. - The link is to an unauthenticated page. The following pages are vulnerable: - `/dashboard-solo/snapshot/*` - `/dashboard/snapshot/*` - `/invite/:code` The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this: https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1 When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. ### Attack audit We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment. #### Through reverse proxy/load balancer logs To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks. #### Through the Grafana Enterprise audit feature If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code. ### Patched versions Release 8.2.3: - [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/) ### Solutions and mitigations Download and install the appropriate patch for your version of Grafana. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ### Workaround If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path. Example of an Nginx rule to block the literal string `{{`: ``` location ~ \{\{ { deny all; } ``` ### Timeline and postmortem Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. * 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability. * 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2. * 2021-10-22 02:02 MEDIUM severity declared. * 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ . * 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure. * 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests. * 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud. * 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected. * 2021-10-22 14:05 Grafana Cloud instances updated with a fix. * 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified. * 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation. * 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo. * 2021-11-03 12:00: Public release. ## Reporting security issues If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index). ## Security announcements There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).
{'CVE-2021-41174'}
2021-11-29T15:05:32Z
2021-11-08T18:13:19Z
MODERATE
6.9
{'CWE-79'}
{'https://github.com/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'}
null
GHSA
GHSA-h726-x36v-rx45
Prototype Pollution in lodash.merge
Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.2 or later.
null
2021-09-28T22:24:14Z
2020-09-03T18:04:54Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1066', 'https://github.com/advisories/GHSA-h726-x36v-rx45'}
null
GHSA
GHSA-m8gq-83gh-v42v
XML External Entities Vulnerability in CVRF-CSAF-Converter
CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.
{'CVE-2022-27193'}
2022-03-28T17:24:08Z
2022-03-16T00:00:49Z
MODERATE
6.1
{'CWE-552', 'CWE-611'}
{'https://github.com/advisories/GHSA-m8gq-83gh-v42v', 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'}
null
GHSA
GHSA-2vxm-vp4c-fjfw
Authentication Bypass in Apache Cassandra
Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.
{'CVE-2020-17516'}
2022-02-09T01:01:39Z
2022-02-09T01:01:22Z
HIGH
7.5
{'CWE-290'}
{'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/advisories/GHSA-2vxm-vp4c-fjfw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516', 'https://security.netapp.com/advisory/ntap-20210521-0002/', 'https://lists.apache.org/thread.html/rd84bec24907617bdb72f7ec907cd7437a0fd5a8886eb55aa84dd1eb8@%3Ccommits.cassandra.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/cassandra-user/202102.mbox/%3c6E4340A5-D7BE-4D33-9EC5-3B505A626D8D@apache.org%3e', 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e94033f87d0fc274c4752d467f3a09f2ceae4@%3Ccommits.cassandra.apache.org%3E'}
null
GHSA
GHSA-rrqv-vjrw-hrcr
Arbitrary Code Execution in json-ptr
There is a security vulnerability in `json-ptr` versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.
null
2021-05-26T19:59:19Z
2021-05-26T19:59:19Z
HIGH
0
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.npmjs.com/package/json-ptr', 'https://github.com/418sec/json-ptr/pull/3', 'https://github.com/advisories/GHSA-rrqv-vjrw-hrcr', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://github.com/flitbit/json-ptr/blob/456a1728b45c8663bb1ac20a249c5fb17495ec6b/README.md#security-vulnerability-prior-to-v210', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://www.npmjs.com/advisories/1706', 'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174'}
null
GHSA
GHSA-m87f-9fvv-2mgg
Deserialization of Untrusted Data in parlai
### Impact Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. ### Patches The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls. ### References - https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 - https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 - https://anon-artist.github.io/blogs/blog3.html
{'CVE-2021-39207'}
2022-04-19T19:03:08Z
2021-09-13T20:05:39Z
HIGH
8.4
{'CWE-502'}
{'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207'}
null
GHSA
GHSA-gv5f-cjw9-5vxg
Camel-xstream component in Apache Camel can allow remote attackers to execute arbitrary commands
The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
{'CVE-2015-5344'}
2022-04-26T19:21:34Z
2018-10-16T23:10:23Z
CRITICAL
9.8
null
{'http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc', 'http://www.securityfocus.com/archive/1/537414/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5344', 'http://www.securityfocus.com/bid/82260', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://github.com/advisories/GHSA-gv5f-cjw9-5vxg', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-gjcg-vrxg-xmgv
Incorrect handling of H2 GOAWAY + SETTINGS frames
Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. ### Impact This can lead to a DoS in the presence of untrusted *upstream* servers. ### Patches 0.15.1 contains an upgraded envoy binary with this vulnerability patched. ### Workarounds If only trusted upstreams are configured, there is not substantial risk of this condition being triggered. ### References [envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8) [envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32780) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-39162'}
2021-09-13T20:31:12Z
2021-09-10T17:54:01Z
HIGH
8.6
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39162', 'https://github.com/advisories/GHSA-gjcg-vrxg-xmgv', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8', 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv'}
null
GHSA
GHSA-pf59-j7c2-rh6x
Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod.
{'CVE-2020-13597'}
2022-04-12T22:53:10Z
2022-02-15T01:57:18Z
LOW
6
{'CWE-200', 'CWE-201'}
{'https://github.com/containernetworking/plugins/pull/484/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597', 'https://github.com/advisories/GHSA-pf59-j7c2-rh6x', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8', 'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965', 'https://github.com/kubernetes/kubernetes/issues/91507', 'https://www.projectcalico.org/security-bulletins/'}
null
GHSA
GHSA-389p-fchr-q2mg
Path Traversal in ImpressCMS
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
{'CVE-2022-24977'}
2022-02-26T00:34:46Z
2022-02-15T00:02:47Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://r0.haxors.org/posts?id=8', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://github.com/advisories/GHSA-389p-fchr-q2mg'}
null
GHSA
GHSA-mw36-7c6c-q4q2
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14. ### Workarounds No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use. Users of XStream 1.4.13 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type)); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### Credits Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html). ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26217'}
2022-04-25T23:05:50Z
2020-11-16T20:07:59Z
HIGH
8
{'CWE-78'}
{'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://github.com/advisories/GHSA-mw36-7c6c-q4q2', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-qv8p-v9qw-wc7g
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
{'CVE-2012-1098'}
2021-09-16T21:07:57Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2012/03/02/6', 'https://github.com/advisories/GHSA-qv8p-v9qw-wc7g', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=799275', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}
null
GHSA
GHSA-x7vr-c387-8w57
Integer Overflow/Infinite Loop in the http crate
An issue was discovered in the http crate before 0.1.20 for Rust. An integer overflow in HeaderMap::reserve() could result in denial of service (e.g., an infinite loop).
{'CVE-2020-25574'}
2021-08-25T21:01:31Z
2021-08-25T21:01:31Z
HIGH
7.5
{'CWE-835', 'CWE-190'}
{'https://github.com/hyperium/http/issues/352', 'https://rustsec.org/advisories/RUSTSEC-2019-0033.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25574', 'https://github.com/advisories/GHSA-x7vr-c387-8w57'}
null
GHSA
GHSA-v73m-fjxv-w4rh
Hijacked Environment Variables in fabric-js
The `fabric-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16053'}
2021-01-08T01:57:39Z
2018-07-23T20:50:18Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/487', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16053', 'https://github.com/advisories/GHSA-v73m-fjxv-w4rh', 'https://www.npmjs.com/advisories/487'}
null
GHSA
GHSA-rjjg-hgv6-h69v
Memory corruption in Tensorflow
### Impact The implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/tfe_wrapper.cc#L1361 However, there is nothing stopping users from passing in a Python object instead of a tensor. ```python In [2]: tf.experimental.dlpack.to_dlpack([2]) ==1720623==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x55b0ba5c410a in tensorflow::(anonymous namespace)::GetTensorFromHandle(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:46:7 #1 0x55b0ba5c38f4 in tensorflow::TFE_HandleToDLPack(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:252:26 ... ``` The uninitialized memory address is due to a `reinterpret_cast` https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/eager/pywrap_tensor.cc#L848-L850 Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. ### Patches We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15193'}
2021-08-26T15:11:04Z
2020-09-25T18:28:27Z
HIGH
7.1
{'CWE-908'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15193', 'https://github.com/advisories/GHSA-rjjg-hgv6-h69v', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v'}
null
GHSA
GHSA-3crj-w4f5-gwh4
Processing untrusted theming resources might execute arbitrary code (ACE)
### Impact When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process. While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development. Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat: An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files. This is an example of inline JavaScript in a Less file: ```less .rule { @var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`; color: @var; } ``` Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3. Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it: ```less .rule { @var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`"; color: @var; } ``` ### Patches We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork. This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0) ### Workarounds Only process trusted theming resources. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/less-openui5 * Email us at secure@sap.com
{'CVE-2021-21316'}
2021-02-17T17:18:20Z
2021-01-29T20:51:37Z
HIGH
6.3
{'CWE-74'}
{'https://www.npmjs.com/package/less-openui5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://github.com/advisories/GHSA-3crj-w4f5-gwh4', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}
null
GHSA
GHSA-hxw9-jxqw-jc8j
Data races in dces
An issue was discovered in the dces crate through 2020-12-09 for Rust. The World type is marked as Send but lacks bounds on its EntityStore and ComponentStore. This allows non-thread safe `EntityStore` and `ComponentStore`s to be sent across threads and cause data races.
{'CVE-2020-36459'}
2021-08-25T20:58:05Z
2021-08-25T20:58:05Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36459', 'https://github.com/advisories/GHSA-hxw9-jxqw-jc8j', 'https://gitlab.redox-os.org/redox-os/dces-rust/-/issues/8', 'https://rustsec.org/advisories/RUSTSEC-2020-0139.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/dces/RUSTSEC-2020-0139.md'}
null
GHSA
GHSA-q5c4-39f5-m68j
Regular Expression Denial of Service in decamelize
Affected versions of `decamelize` are susceptible to a denial of service vulnerability when user input is passed directly into `decamelize`. ## Recommendation Update to version 1.1.2 or later.
{'CVE-2017-16023'}
2021-01-08T18:17:03Z
2018-07-24T20:00:17Z
HIGH
0
{'CWE-400'}
{'https://github.com/sindresorhus/decamelize/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16023', 'https://github.com/advisories/GHSA-q5c4-39f5-m68j', 'https://nodesecurity.io/advisories/308', 'https://www.npmjs.com/advisories/308'}
null
GHSA
GHSA-p6mc-m468-83gw
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
{'CVE-2020-8203'}
2022-04-26T20:58:31Z
2020-07-15T19:15:48Z
HIGH
7.4
{'CWE-770', 'CWE-1321'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://github.com/lodash/lodash/issues/4874', 'https://github.com/advisories/GHSA-p6mc-m468-83gw', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://hackerone.com/reports/712065', 'https://github.com/lodash/lodash/issues/4744', 'https://www.npmjs.com/advisories/1523', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-cwx2-736x-mf6w
Prototype pollution in object-path
### Impact A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. ### Patches Upgrade to version >= 0.11.5 ### Workarounds Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. ### References [Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) ### For more information If you have any questions or comments about this advisory: * Open an issue in [object-path](https://github.com/mariocasciaro/object-path)
{'CVE-2020-15256'}
2022-04-19T19:02:39Z
2020-10-19T20:55:55Z
HIGH
7.7
{'CWE-20', 'CWE-471'}
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/advisories/GHSA-cwx2-736x-mf6w', 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'}
null
GHSA
GHSA-p9pm-55vp-2jqw
Downloads Resources over HTTP in soci
Affected versions of `soci` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `soci`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10669'}
2021-01-08T18:21:56Z
2019-02-18T23:44:32Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10669', 'https://github.com/advisories/GHSA-p9pm-55vp-2jqw', 'https://www.npmjs.com/advisories/270', 'https://nodesecurity.io/advisories/270'}
null
GHSA
GHSA-x949-7cm6-fm6p
Code Injection in md-to-pdf.
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
{'CVE-2021-23639'}
2021-12-16T14:34:40Z
2021-12-16T14:34:40Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/advisories/GHSA-x949-7cm6-fm6p', 'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf/issues/99', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}
null
GHSA
GHSA-x26f-26qw-hhhx
Path Traversal in hekto
Versions of `hekto` before 0.2.3 are vulnerable to path traversal. This allows a remote attacker to read content of arbitrary files. ## Recommendation Update to version 0.2.3 or later.
{'CVE-2018-3725'}
2021-01-08T00:47:49Z
2018-07-26T15:22:00Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/586', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3725', 'https://hackerone.com/reports/311218', 'https://github.com/advisories/GHSA-x26f-26qw-hhhx'}
null
GHSA
GHSA-p59g-6cqr-m73w
Malicious Package in bmap
Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-29T20:33:18Z
2020-09-03T20:45:27Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-p59g-6cqr-m73w', 'https://www.npmjs.com/advisories/1192'}
null
GHSA
GHSA-6fcq-3cm2-j3j5
Kcapifony gem for Ruby places database user passwords on the command line
lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.
{'CVE-2014-5001'}
2022-04-26T18:17:30Z
2018-07-23T19:50:11Z
HIGH
7.8
{'CWE-200'}
{'http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/21', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5001', 'https://github.com/advisories/GHSA-6fcq-3cm2-j3j5'}
null
GHSA
GHSA-m42x-37p3-fv5w
Circumvention of file size limits in ActiveStorage
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user. Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1 Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.
{'CVE-2020-8162'}
2021-01-08T21:29:30Z
2020-05-26T15:09:48Z
LOW
0
{'CWE-602'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2020-8162.yml', 'https://www.debian.org/security/2020/dsa-4766', 'https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ', 'https://hackerone.com/reports/789579', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162', 'https://github.com/advisories/GHSA-m42x-37p3-fv5w'}
null
GHSA
GHSA-8xjv-v9xq-m5h9
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
{'CVE-2016-0775'}
2021-09-07T20:34:14Z
2018-07-24T20:15:36Z
MODERATE
6.5
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-0775', 'http://www.debian.org/security/2016/dsa-3499', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b', 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'}
null
GHSA
GHSA-pg36-wpm5-g57p
HTTP Request Smuggling: LF vs CRLF handling in Waitress
### Impact Waitress implemented a &amp;quot;MAY&amp;quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states: Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR. Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. Example: ``` Content-Length: 100[CRLF] X-Header: x[LF]Content-Length: 0[CRLF] ``` Would get treated by Waitress as if it were: ``` Content-Length: 100 X-Header: x Content-Length: 0 ``` This could potentially get used by attackers to split the HTTP request and smuggle a second request in the body of the first. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. Waitress no longer implements the MAY part of the specification and instead requires that all lines are terminated correctly with CRLF. If any lines are found with a bare CR or LF a 400 Bad Request is sent back to the requesting entity. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&amp;#39;t cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&amp;#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method) ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
{'CVE-2019-16785'}
2022-04-25T23:10:29Z
2019-12-20T23:03:57Z
HIGH
7.1
{'CWE-444'}
{'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-pg36-wpm5-g57p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785', 'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}
null
GHSA
GHSA-9wgh-vjj7-7433
Mutable reference with immutable provenance in image
An issue was discovered in the image crate before 0.23.12 for Rust. A Mutable reference has immutable provenance. (In the case of LLVM, the IR may be always correct.)
{'CVE-2020-35916'}
2021-08-25T20:49:54Z
2021-08-25T20:49:54Z
MODERATE
5.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35916', 'https://github.com/advisories/GHSA-9wgh-vjj7-7433', 'https://github.com/image-rs/image/issues/1357', 'https://rustsec.org/advisories/RUSTSEC-2020-0073.html'}
null
GHSA
GHSA-pg97-ww7h-5mjr
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
### Impact _What kind of vulnerability is it? Who is impacted?_ Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo: * 1.16.1 * 1.15.2 * 1.14.5 * 1.13.6 * 1.12.7 * 1.11.9 Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch. ### For more information If you have any questions or comments about this advisory: * Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
{'CVE-2019-10785'}
2022-04-19T19:02:30Z
2020-02-13T22:21:06Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://github.com/dojo/dojox/pull/315', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://github.com/advisories/GHSA-pg97-ww7h-5mjr'}
null
GHSA
GHSA-246r-r2wf-frhx
Malicious password-reset in Akaunting
Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications.
{'CVE-2021-36804'}
2021-09-03T15:58:47Z
2021-09-01T18:31:36Z
HIGH
8.1
{'CWE-640'}
{'https://github.com/laravel/laravel/blob/75a7dba9c44ce3555cc57dd1826467839fd9774f/CHANGELOG.md#v844-2020-12-01', 'https://github.com/advisories/GHSA-246r-r2wf-frhx', 'https://github.com/laravel/laravel/pull/5477', 'https://www.laravel-enlightn.com/docs/security/host-injection-analyzer.html', 'https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36804'}
null
GHSA
GHSA-8qrh-h9m2-5fvf
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
{'CVE-2009-3009'}
2021-09-07T20:30:34Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails', 'http://www.vupen.com/english/advisories/2009/2544', 'http://support.apple.com/kb/HT4077', 'http://secunia.com/advisories/36717', 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'http://www.securityfocus.com/bid/36278', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.debian.org/security/2009/dsa-1887', 'http://secunia.com/advisories/36600', 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036', 'http://www.osvdb.org/57666', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063', 'http://securitytracker.com/id?1022824', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'}
null
GHSA
GHSA-hp4c-x6r7-6555
Floating point exception in `SparseDenseCwiseDiv`
### Impact The implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseDenseCwiseDiv( sp_indices=np.array([[4]]), sp_values=np.array([-400]), sp_shape=np.array([647.]), dense=np.array([0])) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. ### Patches We have patched the issue in GitHub commit [d9204be9f49520cdaaeb2541d1dc5187b23f31d9](https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37636'}
2021-08-25T14:44:14Z
2021-08-25T14:44:14Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37636'}
null
GHSA
GHSA-3949-f494-cm99
Cross-site Scripting in Prism
### Impact Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. ### Patches This bug has been fixed in v1.27.0. ### Workarounds Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin. ### References - https://github.com/PrismJS/prism/pull/3341
{'CVE-2022-23647'}
2022-02-26T01:32:38Z
2022-02-22T19:32:18Z
HIGH
7.5
{'CWE-79'}
{'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism/pull/3341', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://github.com/advisories/GHSA-3949-f494-cm99'}
null
GHSA
GHSA-p92q-7fhh-mq35
Cross-Site Request Forgery in Jenkins
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
{'CVE-2022-20612'}
2022-04-22T15:36:00Z
2022-01-21T23:37:57Z
MODERATE
4.3
{'CWE-352'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/changelog-stable/#v2.319.2', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.jenkins.io/changelog/#v2.330', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558', 'https://github.com/advisories/GHSA-p92q-7fhh-mq35', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'}
null
GHSA
GHSA-rpj6-2q8r-98f8
Incorrect default pattern in Jenkins Audit Trail Plugin
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
{'CVE-2020-2287'}
2022-02-10T20:29:39Z
2022-02-10T20:29:39Z
MODERATE
5.3
{'CWE-435'}
{'http://www.openwall.com/lists/oss-security/2020/10/08/5', 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815', 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287', 'https://github.com/advisories/GHSA-rpj6-2q8r-98f8'}
null
GHSA
GHSA-347x-877p-hcwx
Information Disclosure in Password Reset
In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts. This has been fixed in 10.4.2. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-001
{'CVE-2020-11063'}
2022-04-19T19:02:26Z
2020-05-13T22:19:21Z
LOW
3.7
{'CWE-204'}
{'https://github.com/advisories/GHSA-347x-877p-hcwx', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11063'}
null
GHSA
GHSA-w5cr-frph-hw7f
Use of uninitialized buffer in rkyv
An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct.
{'CVE-2021-31919'}
2021-08-25T21:01:50Z
2021-08-25T21:01:50Z
HIGH
7.5
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0054.html', 'https://github.com/advisories/GHSA-w5cr-frph-hw7f', 'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31919'}
null
GHSA
GHSA-fmr4-7g9q-7hc7
Moderate severity vulnerability that affects handlebars
**Withdrawn:** Duplicate of GHSA-9prh-257w-9277
null
2021-12-02T21:43:30Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}
null
GHSA
GHSA-7289-chwj-7h86
Path traversal in librenms/librenms
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.
{'CVE-2021-44278'}
2021-12-10T20:18:30Z
2021-12-10T20:18:30Z
CRITICAL
9.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44278', 'https://github.com/librenms/librenms/pull/13554', 'https://github.com/advisories/GHSA-7289-chwj-7h86'}
null
GHSA
GHSA-rph7-j9qr-h8q8
Potential Command Injection in codem-transcode
When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution. ### Mitigating Factors: The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default. ## Recommendation An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..
{'CVE-2013-7377'}
2021-09-17T19:23:33Z
2017-11-28T22:20:17Z
HIGH
8.1
{'CWE-77'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/codem-transcode_command_injection', 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8', 'https://www.npmjs.com/advisories/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-g92x-8m54-p89v
Cross-Site Request Forgery in snipe-it
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3858'}
2021-10-22T13:56:57Z
2021-10-21T17:48:55Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://github.com/advisories/GHSA-g92x-8m54-p89v', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}
null
GHSA
GHSA-756h-r2c9-qp5j
An authenticated user can execute arbitrary command in Gerapy
### Impact An authenticated user can execute arbitrary command, see more in https://github.com/Gerapy/Gerapy/issues/211. ### Patches Fixed in 0.9.9
{'CVE-2021-32849'}
2022-02-03T20:20:15Z
2022-01-06T23:48:50Z
HIGH
8.8
{'CWE-77', 'CWE-78'}
{'https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/', 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j', 'https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253', 'https://github.com/advisories/GHSA-756h-r2c9-qp5j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32849', 'https://github.com/Gerapy/Gerapy/issues/197', 'https://github.com/Gerapy/Gerapy/issues/217'}
null
GHSA
GHSA-jx5q-g37m-h5hj
Client-Side JavaScript Prototype Pollution in oro/platform
### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype`
{'CVE-2021-43852'}
2022-01-13T18:33:44Z
2022-01-06T18:29:51Z
MODERATE
5.3
{'CWE-74', 'CWE-1321'}
{'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43852'}
null
GHSA
GHSA-xx4c-jj58-r7x6
Inefficient Regular Expression Complexity in Validator.js
### Impact Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers. ### Patches The problem has been patched in validator 13.7.0
null
2022-04-19T19:03:14Z
2021-11-19T20:14:23Z
MODERATE
5.3
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/issues/1599', 'https://github.com/validatorjs/validator.js/pull/1738', 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6', 'https://github.com/advisories/GHSA-xx4c-jj58-r7x6', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/'}
null
GHSA
GHSA-rgvq-pcvf-hx75
Heap OOB and null pointer dereference in `RaggedTensorToTensor`
### Impact Due to lack of validation in `tf.raw_ops.RaggedTensorToTensor`, an attacker can exploit an undefined behavior if input arguments are empty: ```python import tensorflow as tf shape = tf.constant([-1, -1], shape=[2], dtype=tf.int64) values = tf.constant([], shape=[0], dtype=tf.int64) default_value = tf.constant(404, dtype=tf.int64) row = tf.constant([269, 404, 0, 0, 0, 0, 0], shape=[7], dtype=tf.int64) rows = [row] types = ['ROW_SPLITS'] tf.raw_ops.RaggedTensorToTensor( shape=shape, values=values, default_value=default_value, row_partition_tensors=rows, row_partition_types=types) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L356-L360) only checks that one of the tensors is not empty, but does not check for the other ones. There are multiple `DCHECK` validations to prevent heap OOB, but these are no-op in release builds, hence they don't prevent anything. ### Patches We have patched the issue in GitHub commit [b761c9b652af2107cfbc33efd19be0ce41daa33e](https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e) followed by GitHub commit [f94ef358bb3e91d517446454edff6535bcfe8e4a](https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a) and GitHub commit [c4d7afb6a5986b04505aca4466ae1951686c80f6](https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6). The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29608'}
2021-05-21T14:28:27Z
2021-05-21T14:28:27Z
MODERATE
5.3
{'CWE-131'}
{'https://github.com/advisories/GHSA-rgvq-pcvf-hx75', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29608', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e'}
null
GHSA
GHSA-g485-29gq-6h2h
Sensitive Data Exposure in miniorange_saml
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys.
{'CVE-2021-36786'}
2021-09-01T18:36:24Z
2021-09-01T18:36:24Z
HIGH
7.5
{'CWE-922'}
{'https://github.com/advisories/GHSA-g485-29gq-6h2h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36786', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}
null
GHSA
GHSA-77gp-3h4r-6428
Out of bounds read and write in Tensorflow
### Impact There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write: ```cc for (int i = 0; i < op_def.output_arg_size(); i++) { // ... for (int j = 0; j < t->args_size(); j++) { auto* arg = t->mutable_args(i); // ... } } ``` Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data. ### Patches We have patched the issue in GitHub commit [0657c83d08845cc434175934c642299de2c0f042](https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23574'}
2022-02-11T20:46:43Z
2022-02-09T23:25:40Z
HIGH
8.8
{'CWE-787', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23574', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428', 'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102', 'https://github.com/advisories/GHSA-77gp-3h4r-6428'}
null
GHSA
GHSA-7322-jrq4-x5hf
File reference keys leads to incorrect hashes on HMAC algorithms
### Impact Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly. ### Patches All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. ### Workarounds Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys: ```diff -use Lcobucci\JWT\Signer\Key\LocalFileReference; +use Lcobucci\JWT\Signer\Key\InMemory; -$key = LocalFileReference::file(__DIR__ . '/public-key.pem'); +$key = InMemory::file(__DIR__ . '/public-key.pem'); ```
{'CVE-2021-41106'}
2022-04-19T19:03:10Z
2021-09-29T17:09:40Z
MODERATE
4.4
{'CWE-345'}
{'https://github.com/advisories/GHSA-7322-jrq4-x5hf', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73'}
null
GHSA
GHSA-8fp4-rp6c-5gcv
Path Traversal in com.linecorp.armeria:armeria
### Impact An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. ### Patches Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. ### Workarounds This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g. ```java Server .builder() .serviceUnder( "/files", FileService .of(...) .decorate((delegate, ctx, req) -> { String path = req.headers().path(); if (path.contains("%2f") || path.contains("%2F")) { return HttpResponse.of(HttpStatus.BAD_REQUEST); } return delegate.serve(ctx, req); }) ) .build() ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [line/armeria](https://github.com/line/armeria) * Chat with us at [Slack](https://armeria.dev/s/slack) ### Credits This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)).
{'CVE-2021-43795'}
2021-12-03T15:15:09Z
2021-12-02T22:25:54Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/line/armeria/pull/3855', 'https://github.com/advisories/GHSA-8fp4-rp6c-5gcv'}
null
GHSA
GHSA-2rvv-w9r2-rg7m
Information Disclosure in Apache Tomcat
When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
{'CVE-2021-24122'}
2021-05-13T22:30:02Z
2021-05-13T22:30:02Z
MODERATE
5.9
{'CWE-200'}
{'https://security.netapp.com/advisory/ntap-20210212-0008/', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-2rvv-w9r2-rg7m', 'https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/14/1', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24122', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E'}
null
GHSA
GHSA-v4x4-98cg-wr4g
Code injection in definitions
There is a vulnerability in load() method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution.
{'CVE-2018-20325'}
2022-03-21T20:09:37Z
2018-12-26T17:45:19Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20325', 'https://github.com/advisories/GHSA-v4x4-98cg-wr4g', 'https://github.com/danijar/definitions/issues/14'}
null
GHSA
GHSA-9vwf-54m9-gc4f
snipe-it is vulnerable to Improper Access Control
snipe-it is vulnerable to Improper Access Control
{'CVE-2021-4089'}
2021-12-16T14:32:39Z
2021-12-16T14:32:39Z
MODERATE
4.3
{'CWE-863', 'CWE-284'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://github.com/advisories/GHSA-9vwf-54m9-gc4f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}
null
GHSA
GHSA-8w9j-6wg6-qv4f
Malicious Package in axioss
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:13:24Z
2020-09-03T19:41:17Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-8w9j-6wg6-qv4f', 'https://www.npmjs.com/advisories/1124'}
null
GHSA
GHSA-rphc-h572-2x9f
Cross-site Scripting in showdoc/showdoc
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround.
{'CVE-2022-0960'}
2022-03-24T22:38:55Z
2022-03-15T00:00:55Z
CRITICAL
9
{'CWE-434', 'CWE-79'}
{'https://github.com/advisories/GHSA-rphc-h572-2x9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e', 'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
null
GHSA
GHSA-m273-wwfv-h6jp
Directory Traversal in fancy-server
Versions 0.1.4 and earlier of fancy-server are vulnerable to a directory traversal attack. Standard attack vectors such as `../` will allow an attacker to read files outside of the served directory. ## Recommendation Upgrade to version 0.1.4 or greater.
{'CVE-2014-10066'}
2021-01-07T23:38:47Z
2020-08-31T22:44:33Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/9', 'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10066', 'https://www.npmjs.com/advisories/9', 'https://github.com/advisories/GHSA-m273-wwfv-h6jp'}
null
GHSA
GHSA-wwgq-9jhf-qgw6
Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
### Impact Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: * Sending a test email. * Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. ### Patches This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`. ### Workarounds Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
{'CVE-2021-41273'}
2022-04-19T19:03:15Z
2021-11-18T15:46:57Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'}
null
GHSA
GHSA-58r4-h6v8-jcvm
Regression in JWT Signature Validation
### Overview Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using `omniauth-auth0`. - You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. ### How to fix that? Upgrade to version `2.4.1`. ### Will this update impact my users? The fix provided in this version will not affect your users.
{'CVE-2020-15240'}
2021-11-19T14:41:31Z
2020-11-03T02:31:38Z
HIGH
7.4
{'CWE-287', 'CWE-347'}
{'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://rubygems.org/gems/omniauth-auth0', 'https://github.com/advisories/GHSA-58r4-h6v8-jcvm'}
null
GHSA
GHSA-5hp8-35wj-m525
Uncontrolled recursion in ammonia
An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization.
{'CVE-2019-15542'}
2021-08-25T20:44:03Z
2021-08-25T20:44:03Z
HIGH
7.5
{'CWE-674'}
{'https://github.com/advisories/GHSA-5hp8-35wj-m525', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15542', 'https://github.com/rust-ammonia/ammonia/blob/master/CHANGELOG.md#210', 'https://rustsec.org/advisories/RUSTSEC-2019-0001.html'}
null
GHSA
GHSA-7r28-3m3f-r2pr
Regular Expression Denial of Service (ReDoS)
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
{'CVE-2021-28092'}
2021-05-14T17:09:26Z
2021-03-19T21:25:50Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-7r28-3m3f-r2pr', 'https://github.com/sindresorhus/is-svg/releases', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'https://www.npmjs.com/package/is-svg'}
null
GHSA
GHSA-jxjr-5h69-qw3w
Moderate severity vulnerability that affects nokogiri
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
{'CVE-2015-7499'}
2021-06-10T22:54:33Z
2018-09-17T21:57:38Z
MODERATE
0
{'CWE-119'}
{'https://support.apple.com/HT206167', 'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da', 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206168', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925', 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://www.securityfocus.com/bid/79509', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://security.gentoo.org/glsa/201701-37', 'https://support.apple.com/HT206166', 'http://www.securitytracker.com/id/1034243', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html', 'http://xmlsoft.org/news.html', 'http://www.debian.org/security/2015/dsa-3430'}
null
GHSA
GHSA-563h-49v8-g7x4
Malicious Package in ks-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T16:10:31Z
2020-09-03T23:17:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1297', 'https://github.com/advisories/GHSA-563h-49v8-g7x4'}
null
GHSA
GHSA-9hqj-38j2-5jgm
Command Injection in ascii-art
Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command. Example Proof of concept: `ascii-art preview 'doom"; touch /tmp/malicious; echo "'` Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`. ## Recommendation Update to version 1.4.4 or later.
null
2021-09-24T20:59:44Z
2020-09-01T21:19:23Z
LOW
0
{'CWE-77'}
{'https://hackerone.com/reports/390631', 'https://github.com/advisories/GHSA-9hqj-38j2-5jgm', 'https://www.npmjs.com/advisories/727', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json'}
null
GHSA
GHSA-4x6x-782q-jfc4
Command Injection in node-wifi
Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T13:47:35Z
2020-09-03T02:38:47Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-4x6x-782q-jfc4', 'https://www.npmjs.com/advisories/952'}
null
GHSA
GHSA-56p8-3fh9-4cvq
XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos)
### Impact The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21348'}
2022-04-19T19:02:48Z
2021-03-22T23:29:09Z
MODERATE
5.3
{'CWE-400', 'CWE-502'}
{'https://x-stream.github.io/CVE-2021-21348.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348', 'https://github.com/advisories/GHSA-56p8-3fh9-4cvq', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-8727-m6gj-mc37
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack. Versions Affected: rails <= 6.0.3 Not affected: rails < 4.0.0 Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ In some cases user supplied information can be inadvertently leaked from Strong Parameters. Specifically the return value of `each`, or `each_value`, or `each_pair` will return the underlying "untrusted" hash of data that was read from the parameters. Applications that use this return value may be inadvertently use untrusted user input. Impacted code will look something like this: ``` def update # Attacker has included the parameter: `{ is_admin: true }` User.update(clean_up_params) end def clean_up_params params.each { |k, v| SomeModel.check(v) if k == :name } end ``` Note the mistaken use of `each` in the `clean_up_params` method in the above example. Workarounds ----------- Do not use the return values of `each`, `each_value`, or `each_pair` in your application.
{'CVE-2020-8164'}
2021-01-08T21:29:25Z
2020-05-26T15:09:16Z
MODERATE
0
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164', 'https://github.com/advisories/GHSA-8727-m6gj-mc37', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml', 'https://www.debian.org/security/2020/dsa-4766', 'https://hackerone.com/reports/292797', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html', 'https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY', 'https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY'}
null
GHSA
GHSA-pp7m-6j83-m7r6
Cross-site Scripting in video.js
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
{'CVE-2021-23414'}
2021-08-31T21:01:29Z
2021-08-10T16:09:36Z
MODERATE
6.5
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://github.com/advisories/GHSA-pp7m-6j83-m7r6'}
null
GHSA
GHSA-cvm9-fjm9-3572
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36181'}
2022-04-22T17:28:13Z
2021-12-09T19:16:10Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/advisories/GHSA-cvm9-fjm9-3572', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-vfr4-x8j2-3rf9
Division by zero in TFLite's implementation of `TransposeConv`
### Impact The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222): ```cc int height_col = (height + pad_t + pad_b - filter_h) / stride_h + 1; int width_col = (width + pad_l + pad_r - filter_w) / stride_w + 1; ``` An attacker can craft a model such that `stride_{h,w}` values are 0. Code calling this function must validate these arguments. ### Patches We have patched the issue in GitHub commit [801c1c6be5324219689c98e1bd3e0ca365ee834d](https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29588'}
2021-05-21T14:26:48Z
2021-05-21T14:26:48Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-vfr4-x8j2-3rf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29588', 'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9'}
null
GHSA
GHSA-pjxv-w3qj-j8m3
Directory Traversal in elFinder.AspNet
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23415'}
2021-08-31T21:00:59Z
2021-08-09T20:42:13Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://github.com/advisories/GHSA-pjxv-w3qj-j8m3'}
null
GHSA
GHSA-8m49-2xj8-67v9
Data Loss/Denial of Service in SWHKD
SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository.
{'CVE-2022-27816'}
2022-04-28T18:02:04Z
2022-03-31T00:00:24Z
HIGH
7.1
{'CWE-59'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27816', 'https://github.com/advisories/GHSA-8m49-2xj8-67v9', 'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'}
null
GHSA
GHSA-fcqf-h4h4-695m
Moderate severity vulnerability that affects actionpack
CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
{'CVE-2011-3186'}
2021-09-10T17:32:18Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-94'}
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/advisories/GHSA-fcqf-h4h4-695m', 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'}
null
GHSA
GHSA-89qr-369f-5m5x
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36182'}
2022-04-22T18:16:55Z
2021-12-09T19:15:46Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/advisories/GHSA-89qr-369f-5m5x', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-q9q6-f556-gpm7
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43571'}
2021-11-15T14:44:14Z
2021-11-10T20:58:42Z
CRITICAL
9.8
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43571', 'https://github.com/advisories/GHSA-q9q6-f556-gpm7', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3'}
null
GHSA
GHSA-cfhg-9x44-78h2
Command Injection in ps
Versions of `ps` before 1.0.0 are vulnerable to command injection. Proof of concept: ``` var ps = require('ps'); ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection if (err) {throw err;} if (proc) { console.log(proc); // Process name, something like "node" or "bash" } else { console.log('No such process'); } }); // Result: The file success.txt will exist on the filesystem if the touch command was executed ``` ## Recommendation Update to version 1.0.0 or later.
{'CVE-2018-16460'}
2021-01-08T21:19:23Z
2018-09-17T20:43:59Z
MODERATE
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16460', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json', 'https://github.com/advisories/GHSA-cfhg-9x44-78h2', 'https://hackerone.com/reports/390848', 'https://www.npmjs.com/advisories/728'}
null
GHSA
GHSA-w9p3-5cr8-m3jj
Deserialization of Untrusted Data in Log4j 1.x
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
{'CVE-2022-23302'}
2022-04-22T15:35:26Z
2022-01-21T23:27:14Z
HIGH
8.8
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://logging.apache.org/log4j/1.2/index.html', 'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w', 'https://github.com/advisories/GHSA-w9p3-5cr8-m3jj', 'https://security.netapp.com/advisory/ntap-20220217-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302', 'http://www.openwall.com/lists/oss-security/2022/01/18/3'}
null
GHSA
GHSA-m744-2jj8-vpfv
Command injection in git-parse
The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
{'CVE-2021-26543'}
2022-02-10T23:51:27Z
2022-02-10T23:51:16Z
HIGH
8.8
{'CWE-74'}
{'https://www.npmjs.com/package/git-parse', 'https://github.com/advisories/GHSA-m744-2jj8-vpfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26543'}
null
GHSA
GHSA-ph62-8768-r87v
Arbitrary file delete in ectouch/ectouch
ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter.
{'CVE-2022-25098'}
2022-03-04T14:47:36Z
2022-02-25T00:01:04Z
CRITICAL
9.1
null
{'https://github.com/dota-st/Vulnerability/blob/master/ECTouchV2.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25098', 'https://github.com/advisories/GHSA-ph62-8768-r87v'}
null
GHSA
GHSA-gvj8-4cj4-h776
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
null
2022-04-29T15:40:52Z
2022-04-29T15:40:48Z
CRITICAL
0
{'CWE-281'}
{'https://github.com/advisories/GHSA-gvj8-4cj4-h776', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}
null
GHSA
GHSA-q6cw-2553-7837
Moderate severity vulnerability that affects newrelic_rpm
Ruby agent 3.2.0 through 3.5.2 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
{'CVE-2013-0284'}
2021-06-10T21:12:51Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-q6cw-2553-7837', 'http://seclists.org/oss-sec/2013/q1/304', 'https://newrelic.com/docs/ruby/ruby-agent-security-notification', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'}
null
GHSA
GHSA-48p3-xfvw-g59c
Incorrect Access Control in ImpressCMS
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
{'CVE-2021-26598'}
2022-04-05T21:19:07Z
2022-03-29T00:01:16Z
MODERATE
5.3
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26598', 'https://hackerone.com/reports/1081137', 'https://github.com/advisories/GHSA-48p3-xfvw-g59c', 'https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html', 'http://seclists.org/fulldisclosure/2022/Mar/45', 'http://karmainsecurity.com/KIS-2022-03', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://github.com/ImpressCMS/impresscms/pull/967'}
null
GHSA
GHSA-c8hq-x4mm-p6q6
Memory handling issues in xcb
An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur.
{'CVE-2020-36205'}
2021-08-25T20:50:54Z
2021-08-25T20:50:54Z
MODERATE
5.5
{'CWE-415', 'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0097.html', 'https://github.com/advisories/GHSA-c8hq-x4mm-p6q6', 'https://github.com/rtbo/rust-xcb/issues/93', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36205'}
null
GHSA
GHSA-4fgq-gq9g-3rw7
Improper Verification of Cryptographic Signature in keycloak
It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
{'CVE-2019-10201'}
2021-04-01T20:57:58Z
2019-09-23T18:32:16Z
MODERATE
8.1
{'CWE-347'}
{'https://github.com/advisories/GHSA-4fgq-gq9g-3rw7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10201', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'}
null
GHSA
GHSA-6xvq-2gj8-4276
Cross site scripting in valine
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
{'CVE-2020-28847'}
2022-04-15T03:05:57Z
2022-04-06T00:01:29Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28847', 'https://github.com/xCss/Valine/issues/348', 'https://github.com/advisories/GHSA-6xvq-2gj8-4276', 'https://github.com/xCss/Valine/releases/tag/v1.4.15'}
null
GHSA
GHSA-rf54-44jr-q5vf
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
{'CVE-2022-25839'}
2022-03-28T22:33:08Z
2022-03-12T00:00:26Z
MODERATE
5.3
{'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-URLJS-2414030', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/advisories/GHSA-rf54-44jr-q5vf'}
null
GHSA
GHSA-r8pr-83cc-ccv7
Umbraco Persistent Password Reset Poison
The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
{'CVE-2022-22691'}
2022-01-27T18:26:23Z
2022-01-21T23:34:27Z
HIGH
7.4
{'CWE-640', 'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22691', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://github.com/advisories/GHSA-r8pr-83cc-ccv7'}
null
GHSA
GHSA-758m-v56v-grj4
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
{'CVE-2020-10969'}
2021-10-21T21:11:05Z
2020-04-23T21:36:03Z
HIGH
8.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-758m-v56v-grj4', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/FasterXML/jackson-databind/issues/2642'}
null
GHSA
GHSA-gpfh-jvf9-7wg5
Use after free / memory leak in `CollectiveReduceV2`
### Impact The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free: ```python import tensorflow as tf tf.raw_ops.CollectiveReduceV2( input=[], group_size=[-10, -10, -10], group_key=[-10, -10], instance_key=[-10], ordering_token=[], merge_op='Mul', final_op='Div') ``` This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed: ```cc auto done_with_cleanup = [col_params, done = std::move(done)]() { done(); col_params->Unref(); }; OP_REQUIRES_OK_ASYNC(c, FillCollectiveParams(col_params, REDUCTION_COLLECTIVE, /*group_size*/ c->input(1), /*group_key*/ c->input(2), /*instance_key*/ c->input(3)), done); ``` Here, `done` is already moved from by the time `OP_REQUIRES_OK_ASYNC` macro needs to invoke it in case of errors. In this case, we get an undefined behavior, which can manifest via crashes, `std::bad_alloc` throws or just memory leaks. ### Patches We have patched the issue in GitHub commit [ca38dab9d3ee66c5de06f11af9a4b1200da5ef75](https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41220'}
2021-11-10T18:51:21Z
2021-11-10T18:51:21Z
HIGH
7.8
{'CWE-416'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5', 'https://github.com/advisories/GHSA-gpfh-jvf9-7wg5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220', 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}
null
GHSA
GHSA-c597-f74m-jgc2
Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak
A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.
{'CVE-2020-1758'}
2022-02-09T00:56:26Z
2022-02-09T00:56:26Z
MODERATE
5.9
{'CWE-297', 'CWE-295'}
{'https://github.com/advisories/GHSA-c597-f74m-jgc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1758', 'https://issues.redhat.com/browse/KEYCLOAK-13285'}
null
GHSA
GHSA-4x37-5rh2-hp8c
Hijacked Environment Variables in node-opencv
The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16067'}
2021-01-08T19:52:18Z
2018-08-29T23:50:59Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16067', 'https://nodesecurity.io/advisories/506', 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c', 'https://www.npmjs.com/advisories/506'}
null
GHSA
GHSA-g2qx-6ghw-67hm
Denial of Service in Gitea
An issue was discovered in Gitea in which an attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another.
{'CVE-2020-13246'}
2022-02-15T00:33:30Z
2022-02-15T00:33:30Z
HIGH
7.5
{'CWE-667'}
{'https://www.youtube.com/watch?v=DmVgADSVS88', 'https://github.com/go-gitea/gitea/pull/11438', 'https://github.com/go-gitea/gitea/issues/10549', 'https://github.com/advisories/GHSA-g2qx-6ghw-67hm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13246'}
null
GHSA
GHSA-29gr-w57f-rpfw
Moderate severity vulnerability that affects actionpack
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
{'CVE-2014-7818'}
2021-08-30T16:19:19Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-22'}
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://github.com/advisories/GHSA-29gr-w57f-rpfw', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://puppet.com/security/cve/cve-2014-7829'}
null
GHSA
GHSA-5c66-v29h-xjh8
XSS Cross Site Scripting
### Impact It is possible to persistently inject scripts in XWiki. For unregistred users: - By filling simple text fields For registered users: - By filling their personal information - (if they have edit rights) By filling the values of static lists using App Within Minutes That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities. That can also lead to the attacker taking over an account. If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account. ### Patches It has been patched on XWiki 12.8 and 12.6.3. ### Workarounds There is no easy workaround except upgrading XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17374 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at our [security mailing list](mailto:security@xwiki.org)
{'CVE-2021-29459'}
2021-04-22T16:11:55Z
2021-04-22T16:11:55Z
CRITICAL
9.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-5c66-v29h-xjh8', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'}
null
GHSA
GHSA-wc7v-77jr-5c3m
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3944'}
2021-12-03T20:38:37Z
2021-12-03T20:38:37Z
LOW
3.1
{'CWE-352'}
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/advisories/GHSA-wc7v-77jr-5c3m', 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9'}
null