ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-8p83-68cw-943f | Apache Ignite communicates to an external PHP server where sensitive information is sent | Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information. | {'CVE-2017-7686'} | 2022-04-26T19:13:38Z | 2018-10-16T20:53:20Z | HIGH | 7.5 | {'CWE-200'} | {'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html', 'https://github.com/advisories/GHSA-8p83-68cw-943f', 'http://www.securityfocus.com/bid/99292', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7686'} | null |
GHSA | GHSA-j9wf-vvm6-4r9w | Unverified Ownership in Kubernetes | Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect. | {'CVE-2020-8554'} | 2022-04-25T21:30:55Z | 2022-02-08T21:50:34Z | MODERATE | 6.3 | {'CWE-283', 'CWE-863'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/kubernetes/kubernetes/issues/97076', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8554', 'https://github.com/kubernetes/kubernetes/issues/97110', 'https://github.com/advisories/GHSA-j9wf-vvm6-4r9w', 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E', 'https://groups.google.com/g/kubernetes-security-announce/c/iZWsF9nbKE8', 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-pv36-h7jh-qm62 | Heap buffer overflow in CefSharp | ### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.
> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .
As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.
### Patches
Upgrade to 85.3.130 or higher
### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942
To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d | {'CVE-2020-15999'} | 2022-01-31T22:01:41Z | 2020-10-27T19:47:38Z | MODERATE | 6.5 | {'CWE-119', 'CWE-787'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/', 'https://crbug.com/1139963', 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html', 'https://security.gentoo.org/glsa/202012-04', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62', 'https://www.nuget.org/packages/CefSharp.Common/', 'https://www.nuget.org/packages/CefSharp.WinForms', 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html', 'http://seclists.org/fulldisclosure/2020/Nov/33', 'https://security.gentoo.org/glsa/202011-12', 'https://github.com/advisories/GHSA-pv36-h7jh-qm62', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999', 'https://www.nuget.org/packages/CefSharp.Wpf', 'https://www.debian.org/security/2021/dsa-4824', 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost'} | null |
GHSA | GHSA-7322-9mx6-5j2m | High severity vulnerability that affects redcarpet | Stack-based buffer overflow in the header_anchor function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. | {'CVE-2015-5147'} | 2021-09-02T19:13:11Z | 2018-08-15T20:04:30Z | HIGH | 0 | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-5147', 'https://github.com/advisories/GHSA-7322-9mx6-5j2m', 'http://www.securityfocus.com/bid/75508', 'http://www.openwall.com/lists/oss-security/2015/06/29/3', 'http://www.openwall.com/lists/oss-security/2015/06/30/10', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md'} | null |
GHSA | GHSA-322v-p3jc-7hrg | Cross-Site Request Forgery in Anchor CMS | Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts. | {'CVE-2022-25576'} | 2022-04-05T20:55:18Z | 2022-03-26T00:00:34Z | MODERATE | 4.5 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25576', 'https://github.com/anchorcms/anchor-cms', 'https://github.com/advisories/GHSA-322v-p3jc-7hrg', 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'} | null |
GHSA | GHSA-pg2f-r7pc-6fxx | Cross-Site Request Forgery in MicroPyramid Django CRM | Multiple CSRF issues exist in MicroPyramid Django CRM 0.2.1 via /change-password-by-admin/, /api/settings/add/, /cases/create/, /change-password-by-admin/, /comment/add/, /documents/1/view/, /documents/create/, /opportunities/create/, and /login/. | {'CVE-2019-11457'} | 2021-08-17T22:19:47Z | 2019-09-11T22:57:57Z | HIGH | 8.8 | {'CWE-352'} | {'http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html', 'http://seclists.org/fulldisclosure/2019/Aug/30', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11457', 'https://www.netsparker.com/blog/web-security/', 'https://github.com/advisories/GHSA-pg2f-r7pc-6fxx'} | null |
GHSA | GHSA-3j9m-hcv9-rpj8 | XSS vulnerability allowing arbitrary JavaScript execution | Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
## CVE-2021-41174 XSS vulnerability on unauthenticated pages
### Summary
CVSS Score: 6.9 Medium
CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L)
We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability.
It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability.
### Impact
If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser.
The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar.
There are two ways an unauthenticated user can open a page in Grafana that contains the login button:
- Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack.
- The link is to an unauthenticated page. The following pages are vulnerable:
- `/dashboard-solo/snapshot/*`
- `/dashboard/snapshot/*`
- `/invite/:code`
The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }}
An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this:
https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1
When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL.
### Attack audit
We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment.
#### Through reverse proxy/load balancer logs
To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks.
#### Through the Grafana Enterprise audit feature
If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code.
### Patched versions
Release 8.2.3:
- [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/)
### Solutions and mitigations
Download and install the appropriate patch for your version of Grafana.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
### Workaround
If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path.
Example of an Nginx rule to block the literal string `{{`:
```
location ~ \{\{ {
deny all;
}
```
### Timeline and postmortem
Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
* 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability.
* 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2.
* 2021-10-22 02:02 MEDIUM severity declared.
* 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ .
* 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure.
* 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests.
* 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud.
* 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected.
* 2021-10-22 14:05 Grafana Cloud instances updated with a fix.
* 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified.
* 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation.
* 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo.
* 2021-11-03 12:00: Public release.
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index).
## Security announcements
There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml). | {'CVE-2021-41174'} | 2021-11-29T15:05:32Z | 2021-11-08T18:13:19Z | MODERATE | 6.9 | {'CWE-79'} | {'https://github.com/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'} | null |
GHSA | GHSA-h726-x36v-rx45 | Prototype Pollution in lodash.merge | Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.2 or later. | null | 2021-09-28T22:24:14Z | 2020-09-03T18:04:54Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1066', 'https://github.com/advisories/GHSA-h726-x36v-rx45'} | null |
GHSA | GHSA-m8gq-83gh-v42v | XML External Entities Vulnerability in CVRF-CSAF-Converter | CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter. | {'CVE-2022-27193'} | 2022-03-28T17:24:08Z | 2022-03-16T00:00:49Z | MODERATE | 6.1 | {'CWE-552', 'CWE-611'} | {'https://github.com/advisories/GHSA-m8gq-83gh-v42v', 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'} | null |
GHSA | GHSA-2vxm-vp4c-fjfw | Authentication Bypass in Apache Cassandra | Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement. | {'CVE-2020-17516'} | 2022-02-09T01:01:39Z | 2022-02-09T01:01:22Z | HIGH | 7.5 | {'CWE-290'} | {'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/advisories/GHSA-2vxm-vp4c-fjfw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516', 'https://security.netapp.com/advisory/ntap-20210521-0002/', 'https://lists.apache.org/thread.html/rd84bec24907617bdb72f7ec907cd7437a0fd5a8886eb55aa84dd1eb8@%3Ccommits.cassandra.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/cassandra-user/202102.mbox/%3c6E4340A5-D7BE-4D33-9EC5-3B505A626D8D@apache.org%3e', 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e94033f87d0fc274c4752d467f3a09f2ceae4@%3Ccommits.cassandra.apache.org%3E'} | null |
GHSA | GHSA-rrqv-vjrw-hrcr | Arbitrary Code Execution in json-ptr | There is a security vulnerability in `json-ptr` versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability. | null | 2021-05-26T19:59:19Z | 2021-05-26T19:59:19Z | HIGH | 0 | {'CWE-74'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.npmjs.com/package/json-ptr', 'https://github.com/418sec/json-ptr/pull/3', 'https://github.com/advisories/GHSA-rrqv-vjrw-hrcr', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://github.com/flitbit/json-ptr/blob/456a1728b45c8663bb1ac20a249c5fb17495ec6b/README.md#security-vulnerability-prior-to-v210', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://www.npmjs.com/advisories/1706', 'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174'} | null |
GHSA | GHSA-m87f-9fvv-2mgg | Deserialization of Untrusted Data in parlai | ### Impact
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.
### Patches
The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.
### References
- https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725
- https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879
- https://anon-artist.github.io/blogs/blog3.html | {'CVE-2021-39207'} | 2022-04-19T19:03:08Z | 2021-09-13T20:05:39Z | HIGH | 8.4 | {'CWE-502'} | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207'} | null |
GHSA | GHSA-gv5f-cjw9-5vxg | Camel-xstream component in Apache Camel can allow remote attackers to execute arbitrary commands | The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | {'CVE-2015-5344'} | 2022-04-26T19:21:34Z | 2018-10-16T23:10:23Z | CRITICAL | 9.8 | null | {'http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc', 'http://www.securityfocus.com/archive/1/537414/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5344', 'http://www.securityfocus.com/bid/82260', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://github.com/advisories/GHSA-gv5f-cjw9-5vxg', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-gjcg-vrxg-xmgv | Incorrect handling of H2 GOAWAY + SETTINGS frames | Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event.
### Impact
This can lead to a DoS in the presence of untrusted *upstream* servers.
### Patches
0.15.1 contains an upgraded envoy binary with this vulnerability patched.
### Workarounds
If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.
### References
[envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8)
[envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32780)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
| {'CVE-2021-39162'} | 2021-09-13T20:31:12Z | 2021-09-10T17:54:01Z | HIGH | 8.6 | {'CWE-754'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39162', 'https://github.com/advisories/GHSA-gjcg-vrxg-xmgv', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8', 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv'} | null |
GHSA | GHSA-pf59-j7c2-rh6x | Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico | Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod. | {'CVE-2020-13597'} | 2022-04-12T22:53:10Z | 2022-02-15T01:57:18Z | LOW | 6 | {'CWE-200', 'CWE-201'} | {'https://github.com/containernetworking/plugins/pull/484/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597', 'https://github.com/advisories/GHSA-pf59-j7c2-rh6x', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8', 'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965', 'https://github.com/kubernetes/kubernetes/issues/91507', 'https://www.projectcalico.org/security-bulletins/'} | null |
GHSA | GHSA-389p-fchr-q2mg | Path Traversal in ImpressCMS | ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress. | {'CVE-2022-24977'} | 2022-02-26T00:34:46Z | 2022-02-15T00:02:47Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://r0.haxors.org/posts?id=8', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://github.com/advisories/GHSA-389p-fchr-q2mg'} | null |
GHSA | GHSA-mw36-7c6c-q4q2 | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.
### Workarounds
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.
Users of XStream 1.4.13 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### Credits
Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26217'} | 2022-04-25T23:05:50Z | 2020-11-16T20:07:59Z | HIGH | 8 | {'CWE-78'} | {'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://github.com/advisories/GHSA-mw36-7c6c-q4q2', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-qv8p-v9qw-wc7g | Moderate severity vulnerability that affects activesupport | Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods. | {'CVE-2012-1098'} | 2021-09-16T21:07:57Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2012/03/02/6', 'https://github.com/advisories/GHSA-qv8p-v9qw-wc7g', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=799275', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'} | null |
GHSA | GHSA-x7vr-c387-8w57 | Integer Overflow/Infinite Loop in the http crate | An issue was discovered in the http crate before 0.1.20 for Rust. An integer overflow in HeaderMap::reserve() could result in denial of service (e.g., an infinite loop). | {'CVE-2020-25574'} | 2021-08-25T21:01:31Z | 2021-08-25T21:01:31Z | HIGH | 7.5 | {'CWE-835', 'CWE-190'} | {'https://github.com/hyperium/http/issues/352', 'https://rustsec.org/advisories/RUSTSEC-2019-0033.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25574', 'https://github.com/advisories/GHSA-x7vr-c387-8w57'} | null |
GHSA | GHSA-v73m-fjxv-w4rh | Hijacked Environment Variables in fabric-js | The `fabric-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16053'} | 2021-01-08T01:57:39Z | 2018-07-23T20:50:18Z | MODERATE | 0 | {'CWE-506'} | {'https://nodesecurity.io/advisories/487', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16053', 'https://github.com/advisories/GHSA-v73m-fjxv-w4rh', 'https://www.npmjs.com/advisories/487'} | null |
GHSA | GHSA-rjjg-hgv6-h69v | Memory corruption in Tensorflow | ### Impact
The implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/tfe_wrapper.cc#L1361
However, there is nothing stopping users from passing in a Python object instead of a tensor.
```python
In [2]: tf.experimental.dlpack.to_dlpack([2])
==1720623==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x55b0ba5c410a in tensorflow::(anonymous namespace)::GetTensorFromHandle(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:46:7
#1 0x55b0ba5c38f4 in tensorflow::TFE_HandleToDLPack(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:252:26
...
```
The uninitialized memory address is due to a `reinterpret_cast`
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/eager/pywrap_tensor.cc#L848-L850
Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails.
### Patches
We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15193'} | 2021-08-26T15:11:04Z | 2020-09-25T18:28:27Z | HIGH | 7.1 | {'CWE-908'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15193', 'https://github.com/advisories/GHSA-rjjg-hgv6-h69v', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v'} | null |
GHSA | GHSA-3crj-w4f5-gwh4 | Processing untrusted theming resources might execute arbitrary code (ACE) | ### Impact
When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process.
While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development.
Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat:
An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files.
This is an example of inline JavaScript in a Less file:
```less
.rule {
@var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`;
color: @var;
}
```
Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3.
Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it:
```less
.rule {
@var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`";
color: @var;
}
```
### Patches
We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork.
This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0)
### Workarounds
Only process trusted theming resources.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/less-openui5
* Email us at secure@sap.com | {'CVE-2021-21316'} | 2021-02-17T17:18:20Z | 2021-01-29T20:51:37Z | HIGH | 6.3 | {'CWE-74'} | {'https://www.npmjs.com/package/less-openui5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://github.com/advisories/GHSA-3crj-w4f5-gwh4', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'} | null |
GHSA | GHSA-hxw9-jxqw-jc8j | Data races in dces | An issue was discovered in the dces crate through 2020-12-09 for Rust. The World type is marked as Send but lacks bounds on its EntityStore and ComponentStore. This allows non-thread safe `EntityStore` and `ComponentStore`s to be sent
across threads and cause data races.
| {'CVE-2020-36459'} | 2021-08-25T20:58:05Z | 2021-08-25T20:58:05Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36459', 'https://github.com/advisories/GHSA-hxw9-jxqw-jc8j', 'https://gitlab.redox-os.org/redox-os/dces-rust/-/issues/8', 'https://rustsec.org/advisories/RUSTSEC-2020-0139.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/dces/RUSTSEC-2020-0139.md'} | null |
GHSA | GHSA-q5c4-39f5-m68j | Regular Expression Denial of Service in decamelize | Affected versions of `decamelize` are susceptible to a denial of service vulnerability when user input is passed directly into `decamelize`.
## Recommendation
Update to version 1.1.2 or later. | {'CVE-2017-16023'} | 2021-01-08T18:17:03Z | 2018-07-24T20:00:17Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/sindresorhus/decamelize/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16023', 'https://github.com/advisories/GHSA-q5c4-39f5-m68j', 'https://nodesecurity.io/advisories/308', 'https://www.npmjs.com/advisories/308'} | null |
GHSA | GHSA-p6mc-m468-83gw | Prototype Pollution in lodash | Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances. | {'CVE-2020-8203'} | 2022-04-26T20:58:31Z | 2020-07-15T19:15:48Z | HIGH | 7.4 | {'CWE-770', 'CWE-1321'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://github.com/lodash/lodash/issues/4874', 'https://github.com/advisories/GHSA-p6mc-m468-83gw', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://hackerone.com/reports/712065', 'https://github.com/lodash/lodash/issues/4744', 'https://www.npmjs.com/advisories/1523', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-cwx2-736x-mf6w | Prototype pollution in object-path | ### Impact
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable.
### Patches
Upgrade to version >= 0.11.5
### Workarounds
Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
### References
[Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [object-path](https://github.com/mariocasciaro/object-path) | {'CVE-2020-15256'} | 2022-04-19T19:02:39Z | 2020-10-19T20:55:55Z | HIGH | 7.7 | {'CWE-20', 'CWE-471'} | {'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/advisories/GHSA-cwx2-736x-mf6w', 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'} | null |
GHSA | GHSA-p9pm-55vp-2jqw | Downloads Resources over HTTP in soci | Affected versions of `soci` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `soci`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10669'} | 2021-01-08T18:21:56Z | 2019-02-18T23:44:32Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10669', 'https://github.com/advisories/GHSA-p9pm-55vp-2jqw', 'https://www.npmjs.com/advisories/270', 'https://nodesecurity.io/advisories/270'} | null |
GHSA | GHSA-x949-7cm6-fm6p | Code Injection in md-to-pdf. | The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine. | {'CVE-2021-23639'} | 2021-12-16T14:34:40Z | 2021-12-16T14:34:40Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/advisories/GHSA-x949-7cm6-fm6p', 'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf/issues/99', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'} | null |
GHSA | GHSA-x26f-26qw-hhhx | Path Traversal in hekto | Versions of `hekto` before 0.2.3 are vulnerable to path traversal. This allows a remote attacker to read content of arbitrary files.
## Recommendation
Update to version 0.2.3 or later. | {'CVE-2018-3725'} | 2021-01-08T00:47:49Z | 2018-07-26T15:22:00Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/586', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3725', 'https://hackerone.com/reports/311218', 'https://github.com/advisories/GHSA-x26f-26qw-hhhx'} | null |
GHSA | GHSA-p59g-6cqr-m73w | Malicious Package in bmap | Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2021-09-29T20:33:18Z | 2020-09-03T20:45:27Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-p59g-6cqr-m73w', 'https://www.npmjs.com/advisories/1192'} | null |
GHSA | GHSA-6fcq-3cm2-j3j5 | Kcapifony gem for Ruby places database user passwords on the command line | lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes. | {'CVE-2014-5001'} | 2022-04-26T18:17:30Z | 2018-07-23T19:50:11Z | HIGH | 7.8 | {'CWE-200'} | {'http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/21', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5001', 'https://github.com/advisories/GHSA-6fcq-3cm2-j3j5'} | null |
GHSA | GHSA-m42x-37p3-fv5w | Circumvention of file size limits in ActiveStorage | There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a
direct file upload to be modified by an end user.
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a
new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily
until such time as the application can be upgraded. | {'CVE-2020-8162'} | 2021-01-08T21:29:30Z | 2020-05-26T15:09:48Z | LOW | 0 | {'CWE-602'} | {'https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2020-8162.yml', 'https://www.debian.org/security/2020/dsa-4766', 'https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ', 'https://hackerone.com/reports/789579', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162', 'https://github.com/advisories/GHSA-m42x-37p3-fv5w'} | null |
GHSA | GHSA-8xjv-v9xq-m5h9 | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. | {'CVE-2016-0775'} | 2021-09-07T20:34:14Z | 2018-07-24T20:15:36Z | MODERATE | 6.5 | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-0775', 'http://www.debian.org/security/2016/dsa-3499', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b', 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'} | null |
GHSA | GHSA-pg36-wpm5-g57p | HTTP Request Smuggling: LF vs CRLF handling in Waitress | ### Impact
Waitress implemented a &quot;MAY&quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states:
Although the line terminator for the start-line and header fields is
the sequence CRLF, a recipient MAY recognize a single LF as a line
terminator and ignore any preceding CR.
Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message.
Example:
```
Content-Length: 100[CRLF]
X-Header: x[LF]Content-Length: 0[CRLF]
```
Would get treated by Waitress as if it were:
```
Content-Length: 100
X-Header: x
Content-Length: 0
```
This could potentially get used by attackers to split the HTTP request and smuggle a second request in the body of the first.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
Waitress no longer implements the MAY part of the specification and instead requires that all lines are terminated correctly with CRLF. If any lines are found with a bare CR or LF a 400 Bad Request is sent back to the requesting entity.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&#39;t cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method)
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | {'CVE-2019-16785'} | 2022-04-25T23:10:29Z | 2019-12-20T23:03:57Z | HIGH | 7.1 | {'CWE-444'} | {'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-pg36-wpm5-g57p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785', 'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'} | null |
GHSA | GHSA-9wgh-vjj7-7433 | Mutable reference with immutable provenance in image | An issue was discovered in the image crate before 0.23.12 for Rust. A Mutable reference has immutable provenance. (In the case of LLVM, the IR may be always correct.) | {'CVE-2020-35916'} | 2021-08-25T20:49:54Z | 2021-08-25T20:49:54Z | MODERATE | 5.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35916', 'https://github.com/advisories/GHSA-9wgh-vjj7-7433', 'https://github.com/image-rs/image/issues/1357', 'https://rustsec.org/advisories/RUSTSEC-2020-0073.html'} | null |
GHSA | GHSA-pg97-ww7h-5mjr | XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:
* 1.16.1
* 1.15.2
* 1.14.5
* 1.13.6
* 1.12.7
* 1.11.9
Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dojo/dojox](https://github.com/dojo/dojox/) | {'CVE-2019-10785'} | 2022-04-19T19:02:30Z | 2020-02-13T22:21:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://github.com/dojo/dojox/pull/315', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://github.com/advisories/GHSA-pg97-ww7h-5mjr'} | null |
GHSA | GHSA-246r-r2wf-frhx | Malicious password-reset in Akaunting | Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications. | {'CVE-2021-36804'} | 2021-09-03T15:58:47Z | 2021-09-01T18:31:36Z | HIGH | 8.1 | {'CWE-640'} | {'https://github.com/laravel/laravel/blob/75a7dba9c44ce3555cc57dd1826467839fd9774f/CHANGELOG.md#v844-2020-12-01', 'https://github.com/advisories/GHSA-246r-r2wf-frhx', 'https://github.com/laravel/laravel/pull/5477', 'https://www.laravel-enlightn.com/docs/security/host-injection-analyzer.html', 'https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36804'} | null |
GHSA | GHSA-8qrh-h9m2-5fvf | Moderate severity vulnerability that affects rails | Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper. | {'CVE-2009-3009'} | 2021-09-07T20:30:34Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails', 'http://www.vupen.com/english/advisories/2009/2544', 'http://support.apple.com/kb/HT4077', 'http://secunia.com/advisories/36717', 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'http://www.securityfocus.com/bid/36278', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.debian.org/security/2009/dsa-1887', 'http://secunia.com/advisories/36600', 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036', 'http://www.osvdb.org/57666', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063', 'http://securitytracker.com/id?1022824', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'} | null |
GHSA | GHSA-hp4c-x6r7-6555 | Floating point exception in `SparseDenseCwiseDiv` | ### Impact
The implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseDenseCwiseDiv(
sp_indices=np.array([[4]]),
sp_values=np.array([-400]),
sp_shape=np.array([647.]),
dense=np.array([0]))
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately.
### Patches
We have patched the issue in GitHub commit [d9204be9f49520cdaaeb2541d1dc5187b23f31d9](https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37636'} | 2021-08-25T14:44:14Z | 2021-08-25T14:44:14Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37636'} | null |
GHSA | GHSA-3949-f494-cm99 | Cross-site Scripting in Prism | ### Impact
Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code.
Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted.
### Patches
This bug has been fixed in v1.27.0.
### Workarounds
Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin.
### References
- https://github.com/PrismJS/prism/pull/3341 | {'CVE-2022-23647'} | 2022-02-26T01:32:38Z | 2022-02-22T19:32:18Z | HIGH | 7.5 | {'CWE-79'} | {'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism/pull/3341', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://github.com/advisories/GHSA-3949-f494-cm99'} | null |
GHSA | GHSA-p92q-7fhh-mq35 | Cross-Site Request Forgery in Jenkins | A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set. | {'CVE-2022-20612'} | 2022-04-22T15:36:00Z | 2022-01-21T23:37:57Z | MODERATE | 4.3 | {'CWE-352'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/changelog-stable/#v2.319.2', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.jenkins.io/changelog/#v2.330', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558', 'https://github.com/advisories/GHSA-p92q-7fhh-mq35', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'} | null |
GHSA | GHSA-rpj6-2q8r-98f8 | Incorrect default pattern in Jenkins Audit Trail Plugin | Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL. | {'CVE-2020-2287'} | 2022-02-10T20:29:39Z | 2022-02-10T20:29:39Z | MODERATE | 5.3 | {'CWE-435'} | {'http://www.openwall.com/lists/oss-security/2020/10/08/5', 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815', 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287', 'https://github.com/advisories/GHSA-rpj6-2q8r-98f8'} | null |
GHSA | GHSA-347x-877p-hcwx | Information Disclosure in Password Reset | In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.
This has been fixed in 10.4.2.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-001 | {'CVE-2020-11063'} | 2022-04-19T19:02:26Z | 2020-05-13T22:19:21Z | LOW | 3.7 | {'CWE-204'} | {'https://github.com/advisories/GHSA-347x-877p-hcwx', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11063'} | null |
GHSA | GHSA-w5cr-frph-hw7f | Use of uninitialized buffer in rkyv | An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct. | {'CVE-2021-31919'} | 2021-08-25T21:01:50Z | 2021-08-25T21:01:50Z | HIGH | 7.5 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0054.html', 'https://github.com/advisories/GHSA-w5cr-frph-hw7f', 'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31919'} | null |
GHSA | GHSA-fmr4-7g9q-7hc7 | Moderate severity vulnerability that affects handlebars | **Withdrawn:** Duplicate of GHSA-9prh-257w-9277 | null | 2021-12-02T21:43:30Z | 2017-10-24T18:33:36Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'} | null |
GHSA | GHSA-7289-chwj-7h86 | Path traversal in librenms/librenms | Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php. | {'CVE-2021-44278'} | 2021-12-10T20:18:30Z | 2021-12-10T20:18:30Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44278', 'https://github.com/librenms/librenms/pull/13554', 'https://github.com/advisories/GHSA-7289-chwj-7h86'} | null |
GHSA | GHSA-rph7-j9qr-h8q8 | Potential Command Injection in codem-transcode | When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.
### Mitigating Factors:
The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default.
## Recommendation
An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade.. | {'CVE-2013-7377'} | 2021-09-17T19:23:33Z | 2017-11-28T22:20:17Z | HIGH | 8.1 | {'CWE-77'} | {'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/codem-transcode_command_injection', 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8', 'https://www.npmjs.com/advisories/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'} | null |
GHSA | GHSA-g92x-8m54-p89v | Cross-Site Request Forgery in snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3858'} | 2021-10-22T13:56:57Z | 2021-10-21T17:48:55Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://github.com/advisories/GHSA-g92x-8m54-p89v', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'} | null |
GHSA | GHSA-756h-r2c9-qp5j | An authenticated user can execute arbitrary command in Gerapy | ### Impact
An authenticated user can execute arbitrary command, see more in https://github.com/Gerapy/Gerapy/issues/211.
### Patches
Fixed in 0.9.9 | {'CVE-2021-32849'} | 2022-02-03T20:20:15Z | 2022-01-06T23:48:50Z | HIGH | 8.8 | {'CWE-77', 'CWE-78'} | {'https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/', 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j', 'https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253', 'https://github.com/advisories/GHSA-756h-r2c9-qp5j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32849', 'https://github.com/Gerapy/Gerapy/issues/197', 'https://github.com/Gerapy/Gerapy/issues/217'} | null |
GHSA | GHSA-jx5q-g37m-h5hj | Client-Side JavaScript Prototype Pollution in oro/platform | ### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype` | {'CVE-2021-43852'} | 2022-01-13T18:33:44Z | 2022-01-06T18:29:51Z | MODERATE | 5.3 | {'CWE-74', 'CWE-1321'} | {'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43852'} | null |
GHSA | GHSA-xx4c-jj58-r7x6 | Inefficient Regular Expression Complexity in Validator.js | ### Impact
Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers.
### Patches
The problem has been patched in validator 13.7.0 | null | 2022-04-19T19:03:14Z | 2021-11-19T20:14:23Z | MODERATE | 5.3 | {'CWE-1333'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/issues/1599', 'https://github.com/validatorjs/validator.js/pull/1738', 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6', 'https://github.com/advisories/GHSA-xx4c-jj58-r7x6', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/'} | null |
GHSA | GHSA-rgvq-pcvf-hx75 | Heap OOB and null pointer dereference in `RaggedTensorToTensor` | ### Impact
Due to lack of validation in `tf.raw_ops.RaggedTensorToTensor`, an attacker can exploit an undefined behavior if input arguments are empty:
```python
import tensorflow as tf
shape = tf.constant([-1, -1], shape=[2], dtype=tf.int64)
values = tf.constant([], shape=[0], dtype=tf.int64)
default_value = tf.constant(404, dtype=tf.int64)
row = tf.constant([269, 404, 0, 0, 0, 0, 0], shape=[7], dtype=tf.int64)
rows = [row]
types = ['ROW_SPLITS']
tf.raw_ops.RaggedTensorToTensor(
shape=shape, values=values, default_value=default_value,
row_partition_tensors=rows, row_partition_types=types)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L356-L360) only checks that one of the tensors is not empty, but does not check for the other ones.
There are multiple `DCHECK` validations to prevent heap OOB, but these are no-op in release builds, hence they don't prevent anything.
### Patches
We have patched the issue in GitHub commit [b761c9b652af2107cfbc33efd19be0ce41daa33e](https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e) followed by GitHub commit [f94ef358bb3e91d517446454edff6535bcfe8e4a](https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a) and GitHub commit [c4d7afb6a5986b04505aca4466ae1951686c80f6](https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29608'} | 2021-05-21T14:28:27Z | 2021-05-21T14:28:27Z | MODERATE | 5.3 | {'CWE-131'} | {'https://github.com/advisories/GHSA-rgvq-pcvf-hx75', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29608', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75', 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a', 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6', 'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e'} | null |
GHSA | GHSA-g485-29gq-6h2h | Sensitive Data Exposure in miniorange_saml | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. | {'CVE-2021-36786'} | 2021-09-01T18:36:24Z | 2021-09-01T18:36:24Z | HIGH | 7.5 | {'CWE-922'} | {'https://github.com/advisories/GHSA-g485-29gq-6h2h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36786', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'} | null |
GHSA | GHSA-77gp-3h4r-6428 | Out of bounds read and write in Tensorflow | ### Impact
There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write:
```cc
for (int i = 0; i < op_def.output_arg_size(); i++) {
// ...
for (int j = 0; j < t->args_size(); j++) {
auto* arg = t->mutable_args(i);
// ...
}
}
```
Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data.
### Patches
We have patched the issue in GitHub commit [0657c83d08845cc434175934c642299de2c0f042](https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23574'} | 2022-02-11T20:46:43Z | 2022-02-09T23:25:40Z | HIGH | 8.8 | {'CWE-787', 'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23574', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428', 'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102', 'https://github.com/advisories/GHSA-77gp-3h4r-6428'} | null |
GHSA | GHSA-7322-jrq4-x5hf | File reference keys leads to incorrect hashes on HMAC algorithms | ### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly.
### Patches
All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative.
### Workarounds
Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys:
```diff
-use Lcobucci\JWT\Signer\Key\LocalFileReference;
+use Lcobucci\JWT\Signer\Key\InMemory;
-$key = LocalFileReference::file(__DIR__ . '/public-key.pem');
+$key = InMemory::file(__DIR__ . '/public-key.pem');
``` | {'CVE-2021-41106'} | 2022-04-19T19:03:10Z | 2021-09-29T17:09:40Z | MODERATE | 4.4 | {'CWE-345'} | {'https://github.com/advisories/GHSA-7322-jrq4-x5hf', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73'} | null |
GHSA | GHSA-8fp4-rp6c-5gcv | Path Traversal in com.linecorp.armeria:armeria | ### Impact
An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic.
### Patches
Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly.
### Workarounds
This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g.
```java
Server
.builder()
.serviceUnder(
"/files",
FileService
.of(...)
.decorate((delegate, ctx, req) -> {
String path = req.headers().path();
if (path.contains("%2f") || path.contains("%2F")) {
return HttpResponse.of(HttpStatus.BAD_REQUEST);
}
return delegate.serve(ctx, req);
})
)
.build()
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [line/armeria](https://github.com/line/armeria)
* Chat with us at [Slack](https://armeria.dev/s/slack)
### Credits
This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)). | {'CVE-2021-43795'} | 2021-12-03T15:15:09Z | 2021-12-02T22:25:54Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/line/armeria/pull/3855', 'https://github.com/advisories/GHSA-8fp4-rp6c-5gcv'} | null |
GHSA | GHSA-2rvv-w9r2-rg7m | Information Disclosure in Apache Tomcat | When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. | {'CVE-2021-24122'} | 2021-05-13T22:30:02Z | 2021-05-13T22:30:02Z | MODERATE | 5.9 | {'CWE-200'} | {'https://security.netapp.com/advisory/ntap-20210212-0008/', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-2rvv-w9r2-rg7m', 'https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/14/1', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24122', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E'} | null |
GHSA | GHSA-v4x4-98cg-wr4g | Code injection in definitions | There is a vulnerability in load() method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution. | {'CVE-2018-20325'} | 2022-03-21T20:09:37Z | 2018-12-26T17:45:19Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20325', 'https://github.com/advisories/GHSA-v4x4-98cg-wr4g', 'https://github.com/danijar/definitions/issues/14'} | null |
GHSA | GHSA-9vwf-54m9-gc4f | snipe-it is vulnerable to Improper Access Control | snipe-it is vulnerable to Improper Access Control | {'CVE-2021-4089'} | 2021-12-16T14:32:39Z | 2021-12-16T14:32:39Z | MODERATE | 4.3 | {'CWE-863', 'CWE-284'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://github.com/advisories/GHSA-9vwf-54m9-gc4f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'} | null |
GHSA | GHSA-8w9j-6wg6-qv4f | Malicious Package in axioss | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:13:24Z | 2020-09-03T19:41:17Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-8w9j-6wg6-qv4f', 'https://www.npmjs.com/advisories/1124'} | null |
GHSA | GHSA-rphc-h572-2x9f | Cross-site Scripting in showdoc/showdoc | ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround. | {'CVE-2022-0960'} | 2022-03-24T22:38:55Z | 2022-03-15T00:00:55Z | CRITICAL | 9 | {'CWE-434', 'CWE-79'} | {'https://github.com/advisories/GHSA-rphc-h572-2x9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e', 'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} | null |
GHSA | GHSA-m273-wwfv-h6jp | Directory Traversal in fancy-server | Versions 0.1.4 and earlier of fancy-server are vulnerable to a directory traversal attack.
Standard attack vectors such as `../` will allow an attacker to read files outside of the served directory.
## Recommendation
Upgrade to version 0.1.4 or greater. | {'CVE-2014-10066'} | 2021-01-07T23:38:47Z | 2020-08-31T22:44:33Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/9', 'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10066', 'https://www.npmjs.com/advisories/9', 'https://github.com/advisories/GHSA-m273-wwfv-h6jp'} | null |
GHSA | GHSA-wwgq-9jhf-qgw6 | Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys | ### Impact
Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
* Sending a test email.
* Generating a node auto-deployment token.
At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system.
### Patches
This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`.
### Workarounds
Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
| {'CVE-2021-41273'} | 2022-04-19T19:03:15Z | 2021-11-18T15:46:57Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'} | null |
GHSA | GHSA-58r4-h6v8-jcvm | Regression in JWT Signature Validation | ### Overview
Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using `omniauth-auth0`.
- You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow.
### How to fix that?
Upgrade to version `2.4.1`.
### Will this update impact my users?
The fix provided in this version will not affect your users. | {'CVE-2020-15240'} | 2021-11-19T14:41:31Z | 2020-11-03T02:31:38Z | HIGH | 7.4 | {'CWE-287', 'CWE-347'} | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://rubygems.org/gems/omniauth-auth0', 'https://github.com/advisories/GHSA-58r4-h6v8-jcvm'} | null |
GHSA | GHSA-5hp8-35wj-m525 | Uncontrolled recursion in ammonia | An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization. | {'CVE-2019-15542'} | 2021-08-25T20:44:03Z | 2021-08-25T20:44:03Z | HIGH | 7.5 | {'CWE-674'} | {'https://github.com/advisories/GHSA-5hp8-35wj-m525', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15542', 'https://github.com/rust-ammonia/ammonia/blob/master/CHANGELOG.md#210', 'https://rustsec.org/advisories/RUSTSEC-2019-0001.html'} | null |
GHSA | GHSA-7r28-3m3f-r2pr | Regular Expression Denial of Service (ReDoS) | The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time. | {'CVE-2021-28092'} | 2021-05-14T17:09:26Z | 2021-03-19T21:25:50Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-7r28-3m3f-r2pr', 'https://github.com/sindresorhus/is-svg/releases', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'https://www.npmjs.com/package/is-svg'} | null |
GHSA | GHSA-jxjr-5h69-qw3w | Moderate severity vulnerability that affects nokogiri | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors. | {'CVE-2015-7499'} | 2021-06-10T22:54:33Z | 2018-09-17T21:57:38Z | MODERATE | 0 | {'CWE-119'} | {'https://support.apple.com/HT206167', 'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da', 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206168', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925', 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://www.securityfocus.com/bid/79509', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://security.gentoo.org/glsa/201701-37', 'https://support.apple.com/HT206166', 'http://www.securitytracker.com/id/1034243', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html', 'http://xmlsoft.org/news.html', 'http://www.debian.org/security/2015/dsa-3430'} | null |
GHSA | GHSA-563h-49v8-g7x4 | Malicious Package in ks-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-10-01T16:10:31Z | 2020-09-03T23:17:01Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1297', 'https://github.com/advisories/GHSA-563h-49v8-g7x4'} | null |
GHSA | GHSA-9hqj-38j2-5jgm | Command Injection in ascii-art | Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command.
Example Proof of concept:
`ascii-art preview 'doom"; touch /tmp/malicious; echo "'`
Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`.
## Recommendation
Update to version 1.4.4 or later. | null | 2021-09-24T20:59:44Z | 2020-09-01T21:19:23Z | LOW | 0 | {'CWE-77'} | {'https://hackerone.com/reports/390631', 'https://github.com/advisories/GHSA-9hqj-38j2-5jgm', 'https://www.npmjs.com/advisories/727', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json'} | null |
GHSA | GHSA-4x6x-782q-jfc4 | Command Injection in node-wifi | Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-28T13:47:35Z | 2020-09-03T02:38:47Z | CRITICAL | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-4x6x-782q-jfc4', 'https://www.npmjs.com/advisories/952'} | null |
GHSA | GHSA-56p8-3fh9-4cvq | XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos) | ### Impact
The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21348'} | 2022-04-19T19:02:48Z | 2021-03-22T23:29:09Z | MODERATE | 5.3 | {'CWE-400', 'CWE-502'} | {'https://x-stream.github.io/CVE-2021-21348.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348', 'https://github.com/advisories/GHSA-56p8-3fh9-4cvq', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-8727-m6gj-mc37 | Possible Strong Parameters Bypass in ActionPack | There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 4.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Applications that use this return value may be
inadvertently use untrusted user input.
Impacted code will look something like this:
```
def update
# Attacker has included the parameter: `{ is_admin: true }`
User.update(clean_up_params)
end
def clean_up_params
params.each { |k, v| SomeModel.check(v) if k == :name }
end
```
Note the mistaken use of `each` in the `clean_up_params` method in the above
example.
Workarounds
-----------
Do not use the return values of `each`, `each_value`, or `each_pair` in your
application. | {'CVE-2020-8164'} | 2021-01-08T21:29:25Z | 2020-05-26T15:09:16Z | MODERATE | 0 | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164', 'https://github.com/advisories/GHSA-8727-m6gj-mc37', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml', 'https://www.debian.org/security/2020/dsa-4766', 'https://hackerone.com/reports/292797', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html', 'https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY', 'https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY'} | null |
GHSA | GHSA-pp7m-6j83-m7r6 | Cross-site Scripting in video.js | This affects the package video.js before 7.14.3.
The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
| {'CVE-2021-23414'} | 2021-08-31T21:01:29Z | 2021-08-10T16:09:36Z | MODERATE | 6.5 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://github.com/advisories/GHSA-pp7m-6j83-m7r6'} | null |
GHSA | GHSA-cvm9-fjm9-3572 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36181'} | 2022-04-22T17:28:13Z | 2021-12-09T19:16:10Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/advisories/GHSA-cvm9-fjm9-3572', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
GHSA | GHSA-vfr4-x8j2-3rf9 | Division by zero in TFLite's implementation of `TransposeConv` | ### Impact
The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222):
```cc
int height_col = (height + pad_t + pad_b - filter_h) / stride_h + 1;
int width_col = (width + pad_l + pad_r - filter_w) / stride_w + 1;
```
An attacker can craft a model such that `stride_{h,w}` values are 0. Code calling this function must validate these arguments.
### Patches
We have patched the issue in GitHub commit [801c1c6be5324219689c98e1bd3e0ca365ee834d](https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29588'} | 2021-05-21T14:26:48Z | 2021-05-21T14:26:48Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-vfr4-x8j2-3rf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29588', 'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9'} | null |
GHSA | GHSA-pjxv-w3qj-j8m3 | Directory Traversal in elFinder.AspNet | This affects the package elFinder.AspNet before 1.1.1.
The user-controlled file name is not properly sanitized before it is used to create a file system path.
| {'CVE-2021-23415'} | 2021-08-31T21:00:59Z | 2021-08-09T20:42:13Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://github.com/advisories/GHSA-pjxv-w3qj-j8m3'} | null |
GHSA | GHSA-8m49-2xj8-67v9 | Data Loss/Denial of Service in SWHKD | SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository. | {'CVE-2022-27816'} | 2022-04-28T18:02:04Z | 2022-03-31T00:00:24Z | HIGH | 7.1 | {'CWE-59'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-27816', 'https://github.com/advisories/GHSA-8m49-2xj8-67v9', 'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'} | null |
GHSA | GHSA-fcqf-h4h4-695m | Moderate severity vulnerability that affects actionpack | CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header. | {'CVE-2011-3186'} | 2021-09-10T17:32:18Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-94'} | {'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/advisories/GHSA-fcqf-h4h4-695m', 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'} | null |
GHSA | GHSA-89qr-369f-5m5x | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36182'} | 2022-04-22T18:16:55Z | 2021-12-09T19:15:46Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/advisories/GHSA-89qr-369f-5m5x', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
GHSA | GHSA-q9q6-f556-gpm7 | Improper Verification of Cryptographic Signature in starkbank-ecdsa | The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | {'CVE-2021-43571'} | 2021-11-15T14:44:14Z | 2021-11-10T20:58:42Z | CRITICAL | 9.8 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43571', 'https://github.com/advisories/GHSA-q9q6-f556-gpm7', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3'} | null |
GHSA | GHSA-cfhg-9x44-78h2 | Command Injection in ps | Versions of `ps` before 1.0.0 are vulnerable to command injection.
Proof of concept:
```
var ps = require('ps');
ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection
if (err) {throw err;}
if (proc) {
console.log(proc); // Process name, something like "node" or "bash"
} else {
console.log('No such process');
}
});
// Result: The file success.txt will exist on the filesystem if the touch command was executed
```
## Recommendation
Update to version 1.0.0 or later. | {'CVE-2018-16460'} | 2021-01-08T21:19:23Z | 2018-09-17T20:43:59Z | MODERATE | 0 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-16460', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json', 'https://github.com/advisories/GHSA-cfhg-9x44-78h2', 'https://hackerone.com/reports/390848', 'https://www.npmjs.com/advisories/728'} | null |
GHSA | GHSA-w9p3-5cr8-m3jj | Deserialization of Untrusted Data in Log4j 1.x | JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | {'CVE-2022-23302'} | 2022-04-22T15:35:26Z | 2022-01-21T23:27:14Z | HIGH | 8.8 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://logging.apache.org/log4j/1.2/index.html', 'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w', 'https://github.com/advisories/GHSA-w9p3-5cr8-m3jj', 'https://security.netapp.com/advisory/ntap-20220217-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302', 'http://www.openwall.com/lists/oss-security/2022/01/18/3'} | null |
GHSA | GHSA-m744-2jj8-vpfv | Command injection in git-parse | The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. | {'CVE-2021-26543'} | 2022-02-10T23:51:27Z | 2022-02-10T23:51:16Z | HIGH | 8.8 | {'CWE-74'} | {'https://www.npmjs.com/package/git-parse', 'https://github.com/advisories/GHSA-m744-2jj8-vpfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26543'} | null |
GHSA | GHSA-ph62-8768-r87v | Arbitrary file delete in ectouch/ectouch | ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter. | {'CVE-2022-25098'} | 2022-03-04T14:47:36Z | 2022-02-25T00:01:04Z | CRITICAL | 9.1 | null | {'https://github.com/dota-st/Vulnerability/blob/master/ECTouchV2.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25098', 'https://github.com/advisories/GHSA-ph62-8768-r87v'} | null |
GHSA | GHSA-gvj8-4cj4-h776 | Object state limitation has no effect | Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible. | null | 2022-04-29T15:40:52Z | 2022-04-29T15:40:48Z | CRITICAL | 0 | {'CWE-281'} | {'https://github.com/advisories/GHSA-gvj8-4cj4-h776', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'} | null |
GHSA | GHSA-q6cw-2553-7837 | Moderate severity vulnerability that affects newrelic_rpm | Ruby agent 3.2.0 through 3.5.2 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data. | {'CVE-2013-0284'} | 2021-06-10T21:12:51Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-q6cw-2553-7837', 'http://seclists.org/oss-sec/2013/q1/304', 'https://newrelic.com/docs/ruby/ruby-agent-security-notification', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'} | null |
GHSA | GHSA-48p3-xfvw-g59c | Incorrect Access Control in ImpressCMS | ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token). | {'CVE-2021-26598'} | 2022-04-05T21:19:07Z | 2022-03-29T00:01:16Z | MODERATE | 5.3 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26598', 'https://hackerone.com/reports/1081137', 'https://github.com/advisories/GHSA-48p3-xfvw-g59c', 'https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html', 'http://seclists.org/fulldisclosure/2022/Mar/45', 'http://karmainsecurity.com/KIS-2022-03', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://github.com/ImpressCMS/impresscms/pull/967'} | null |
GHSA | GHSA-c8hq-x4mm-p6q6 | Memory handling issues in xcb | An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur. | {'CVE-2020-36205'} | 2021-08-25T20:50:54Z | 2021-08-25T20:50:54Z | MODERATE | 5.5 | {'CWE-415', 'CWE-416'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0097.html', 'https://github.com/advisories/GHSA-c8hq-x4mm-p6q6', 'https://github.com/rtbo/rust-xcb/issues/93', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36205'} | null |
GHSA | GHSA-4fgq-gq9g-3rw7 | Improper Verification of Cryptographic Signature in keycloak | It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information. | {'CVE-2019-10201'} | 2021-04-01T20:57:58Z | 2019-09-23T18:32:16Z | MODERATE | 8.1 | {'CWE-347'} | {'https://github.com/advisories/GHSA-4fgq-gq9g-3rw7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10201', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'} | null |
GHSA | GHSA-6xvq-2gj8-4276 | Cross site scripting in valine | valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15. | {'CVE-2020-28847'} | 2022-04-15T03:05:57Z | 2022-04-06T00:01:29Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28847', 'https://github.com/xCss/Valine/issues/348', 'https://github.com/advisories/GHSA-6xvq-2gj8-4276', 'https://github.com/xCss/Valine/releases/tag/v1.4.15'} | null |
GHSA | GHSA-rf54-44jr-q5vf | Improper Input Validation in url-js | The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is. | {'CVE-2022-25839'} | 2022-03-28T22:33:08Z | 2022-03-12T00:00:26Z | MODERATE | 5.3 | {'CWE-20'} | {'https://snyk.io/vuln/SNYK-JS-URLJS-2414030', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/advisories/GHSA-rf54-44jr-q5vf'} | null |
GHSA | GHSA-r8pr-83cc-ccv7 | Umbraco Persistent Password Reset Poison | The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats. | {'CVE-2022-22691'} | 2022-01-27T18:26:23Z | 2022-01-21T23:34:27Z | HIGH | 7.4 | {'CWE-640', 'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22691', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://github.com/advisories/GHSA-r8pr-83cc-ccv7'} | null |
GHSA | GHSA-758m-v56v-grj4 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. | {'CVE-2020-10969'} | 2021-10-21T21:11:05Z | 2020-04-23T21:36:03Z | HIGH | 8.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-758m-v56v-grj4', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/FasterXML/jackson-databind/issues/2642'} | null |
GHSA | GHSA-gpfh-jvf9-7wg5 | Use after free / memory leak in `CollectiveReduceV2` | ### Impact
The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free:
```python
import tensorflow as tf
tf.raw_ops.CollectiveReduceV2(
input=[],
group_size=[-10, -10, -10],
group_key=[-10, -10],
instance_key=[-10],
ordering_token=[],
merge_op='Mul',
final_op='Div')
```
This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed:
```cc
auto done_with_cleanup = [col_params, done = std::move(done)]() {
done();
col_params->Unref();
};
OP_REQUIRES_OK_ASYNC(c,
FillCollectiveParams(col_params, REDUCTION_COLLECTIVE,
/*group_size*/ c->input(1),
/*group_key*/ c->input(2),
/*instance_key*/ c->input(3)),
done);
```
Here, `done` is already moved from by the time `OP_REQUIRES_OK_ASYNC` macro needs to invoke it in case of errors. In this case, we get an undefined behavior, which can manifest via crashes, `std::bad_alloc` throws or just memory leaks.
### Patches
We have patched the issue in GitHub commit [ca38dab9d3ee66c5de06f11af9a4b1200da5ef75](https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
| {'CVE-2021-41220'} | 2021-11-10T18:51:21Z | 2021-11-10T18:51:21Z | HIGH | 7.8 | {'CWE-416'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5', 'https://github.com/advisories/GHSA-gpfh-jvf9-7wg5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220', 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'} | null |
GHSA | GHSA-c597-f74m-jgc2 | Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak | A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack. | {'CVE-2020-1758'} | 2022-02-09T00:56:26Z | 2022-02-09T00:56:26Z | MODERATE | 5.9 | {'CWE-297', 'CWE-295'} | {'https://github.com/advisories/GHSA-c597-f74m-jgc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1758', 'https://issues.redhat.com/browse/KEYCLOAK-13285'} | null |
GHSA | GHSA-4x37-5rh2-hp8c | Hijacked Environment Variables in node-opencv | The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16067'} | 2021-01-08T19:52:18Z | 2018-08-29T23:50:59Z | MODERATE | 0 | {'CWE-506'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16067', 'https://nodesecurity.io/advisories/506', 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c', 'https://www.npmjs.com/advisories/506'} | null |
GHSA | GHSA-g2qx-6ghw-67hm | Denial of Service in Gitea | An issue was discovered in Gitea in which an attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another. | {'CVE-2020-13246'} | 2022-02-15T00:33:30Z | 2022-02-15T00:33:30Z | HIGH | 7.5 | {'CWE-667'} | {'https://www.youtube.com/watch?v=DmVgADSVS88', 'https://github.com/go-gitea/gitea/pull/11438', 'https://github.com/go-gitea/gitea/issues/10549', 'https://github.com/advisories/GHSA-g2qx-6ghw-67hm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13246'} | null |
GHSA | GHSA-29gr-w57f-rpfw | Moderate severity vulnerability that affects actionpack | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence. | {'CVE-2014-7818'} | 2021-08-30T16:19:19Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-22'} | {'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://github.com/advisories/GHSA-29gr-w57f-rpfw', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://puppet.com/security/cve/cve-2014-7829'} | null |
GHSA | GHSA-5c66-v29h-xjh8 | XSS Cross Site Scripting | ### Impact
It is possible to persistently inject scripts in XWiki.
For unregistred users:
- By filling simple text fields
For registered users:
- By filling their personal information
- (if they have edit rights) By filling the values of static lists using App Within Minutes
That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities.
That can also lead to the attacker taking over an account.
If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account.
### Patches
It has been patched on XWiki 12.8 and 12.6.3.
### Workarounds
There is no easy workaround except upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-17374
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at our [security mailing list](mailto:security@xwiki.org) | {'CVE-2021-29459'} | 2021-04-22T16:11:55Z | 2021-04-22T16:11:55Z | CRITICAL | 9.6 | {'CWE-79'} | {'https://github.com/advisories/GHSA-5c66-v29h-xjh8', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'} | null |
GHSA | GHSA-wc7v-77jr-5c3m | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3944'} | 2021-12-03T20:38:37Z | 2021-12-03T20:38:37Z | LOW | 3.1 | {'CWE-352'} | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/advisories/GHSA-wc7v-77jr-5c3m', 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.