ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-j7j5-752x-wr4v | Downloads Resources over HTTP in xd-testing | Affected versions of `xd-testing` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `xd-testing`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10653'} | 2021-01-08T18:36:52Z | 2019-02-18T23:45:21Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10653', 'https://nodesecurity.io/advisories/257', 'https://www.npmjs.com/advisories/257', 'https://github.com/advisories/GHSA-j7j5-752x-wr4v'} | null |
GHSA | GHSA-4vhj-98r6-424h | In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate | In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. | {'CVE-2016-1000338'} | 2022-04-27T13:26:49Z | 2018-10-17T16:23:26Z | HIGH | 7.5 | {'CWE-347'} | {'https://usn.ubuntu.com/3727-1/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000338', 'https://access.redhat.com/errata/RHSA-2018:2927'} | null |
GHSA | GHSA-cx7r-634m-2q2h | Cross-Site Scripting in harp | # Withdrawn
This advisory has been withdrawn per request from the maintainer. Given harp is a static webserver, a XSS type of vulnerability is not appropriate.
### Original advisory description
All versions of `harp` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `harp` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-06-01T22:21:33Z | 2020-09-02T18:20:21Z | MODERATE | 0 | null | {'https://hackerone.com/reports/453795', 'https://www.npmjs.com/advisories/806', 'https://github.com/advisories/GHSA-cx7r-634m-2q2h'} | null |
GHSA | GHSA-vwxp-9qmf-w299 | Cross-site Scripting in LiveHelperChat | LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93. | {'CVE-2022-0394'} | 2022-02-03T19:18:03Z | 2022-02-01T00:49:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-vwxp-9qmf-w299', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} | null |
GHSA | GHSA-grpf-gg7v-5g5h | SQL Injection in Apache SkyWalking | Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases. | {'CVE-2020-13921'} | 2021-05-07T15:53:31Z | 2021-05-07T15:53:31Z | CRITICAL | 9.8 | {'CWE-89'} | {'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://github.com/advisories/GHSA-grpf-gg7v-5g5h', 'https://github.com/apache/skywalking/pull/4970', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E'} | null |
GHSA | GHSA-rf3h-xgv5-2q39 | Division by zero in TFLite's implementation of `DepthwiseConv` | ### Impact
The implementation of the `DepthwiseConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288):
```cc
int num_input_channels = SizeOfDimension(input, 3);
TF_LITE_ENSURE_EQ(context, num_filter_channels % num_input_channels, 0);
```
An attacker can craft a model such that `input`'s fourth dimension would be 0.
### Patches
We have patched the issue in GitHub commit [cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0](https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29602'} | 2021-05-21T14:28:12Z | 2021-05-21T14:28:12Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39', 'https://github.com/advisories/GHSA-rf3h-xgv5-2q39', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29602', 'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'} | null |
GHSA | GHSA-rfq3-w54c-f9q5 | OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses | ### Impact
[fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters
1. Registering a client with allowed redirect URL `http://127.0.0.1/callback`
2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback?bar=foo`
3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback?bar=foo` with a potentially successful OAuth2 response.
as well as the host parameter (as long as the host is a loopback interface):
1. Registering a client with allowed redirect URL `https://example.com/callback`
2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback`
3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback` with a potentially successful OAuth2 response.
These bugs are only applicable in scenarios where the attacker has control over the loopback interface (`localhost`, `127.0.0.1`, `[::1]`) where the browser performing the OAuth2 flow is running. | {'CVE-2020-15233'} | 2022-04-19T19:02:35Z | 2021-05-24T17:00:12Z | MODERATE | 5.5 | {'CWE-20', 'CWE-601'} | {'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5', 'https://github.com/ory/fosite/pull/400', 'https://github.com/advisories/GHSA-rfq3-w54c-f9q5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'} | null |
GHSA | GHSA-rfjc-xrmf-5vvw | Privilege escalation by backend users assigned to the default "Publisher" system role | ### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0.470) & v1.1.1.
### Workarounds
Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
### References
Reported by [Hoan Hoang](https://github.com/hoanhp)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1098" alt="Screen Shot 2020-10-10 at 1 37 25 PM" src="https://user-images.githubusercontent.com/7253840/95663611-e6326c80-0afd-11eb-8a1e-8b767a7202fb.png"> | {'CVE-2020-15248'} | 2022-04-19T19:02:37Z | 2020-11-23T19:47:27Z | LOW | 4 | {'CWE-863', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15248', 'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'} | null |
GHSA | GHSA-f246-xrrj-g8j6 | Cross-site Scripting in markdown-it-highlightjs | This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss); | {'CVE-2020-7773'} | 2022-02-10T20:19:58Z | 2022-02-10T20:19:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52', 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14', 'https://github.com/advisories/GHSA-f246-xrrj-g8j6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461'} | null |
GHSA | GHSA-x9p2-fxq6-2m5f | Reverse Tabnapping in swagger-ui | Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks.
## Recommendation
Upgrade to version 3.18.0 or later. | null | 2021-08-16T23:44:48Z | 2019-06-20T14:33:07Z | MODERATE | 4.3 | {'CWE-1022'} | {'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://www.npmjs.com/advisories/975', 'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://github.com/advisories/GHSA-x9p2-fxq6-2m5f'} | null |
GHSA | GHSA-rqjq-mrgx-85hp | Allocation of Resources Without Limits or Throttling in Hashicorp Consul | HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4. | {'CVE-2020-13250'} | 2021-07-29T18:19:35Z | 2021-05-18T18:21:35Z | HIGH | 7.5 | {'CWE-770'} | {'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8023', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13250', 'https://github.com/advisories/GHSA-rqjq-mrgx-85hp'} | null |
GHSA | GHSA-xwqr-xmgg-j69q | Integer overflow in solana_rbpf | From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via "addr = (sym.st_value + refd_pa) as u64"; | {'CVE-2021-46102'} | 2022-02-08T19:45:11Z | 2022-01-28T22:59:28Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/advisories/GHSA-xwqr-xmgg-j69q', 'https://github.com/solana-labs/rbpf/pull/236', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46102', 'https://github.com/solana-labs/rbpf/blob/c14764850f0b83b58aa013248eaf6d65836c1218/src/elf.rs#L609-L630', 'https://blocksecteam.medium.com/new-integer-overflow-bug-discovered-in-solana-rbpf-7729717159ee', 'https://github.com/solana-labs/rbpf/releases/tag/v0.2.17', 'https://github.com/solana-labs/rbpf/pull/200'} | null |
GHSA | GHSA-xp5q-77mh-6hm2 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3728'} | 2021-08-25T14:50:17Z | 2021-08-25T14:50:17Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728', 'https://github.com/advisories/GHSA-xp5q-77mh-6hm2'} | null |
GHSA | GHSA-jrfj-98qg-qjgv | Denial of service in sidekiq | In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users. | {'CVE-2022-23837'} | 2022-03-11T20:13:54Z | 2022-01-27T14:42:37Z | HIGH | 7.5 | {'CWE-400', 'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23837', 'https://github.com/advisories/GHSA-jrfj-98qg-qjgv', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md'} | null |
GHSA | GHSA-3wwj-wh2w-g4xp | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0666'} | 2022-02-26T01:14:30Z | 2022-02-19T00:01:35Z | HIGH | 7.6 | {'CWE-93'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/advisories/GHSA-3wwj-wh2w-g4xp'} | null |
GHSA | GHSA-4952-p58q-6crx | JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form> | ### Impact
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
### Patches
Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21.
### References
[OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.
Credit: Guillaume Jeanne from Google
| {'CVE-2021-32797'} | 2022-04-08T21:47:11Z | 2021-08-23T19:40:22Z | HIGH | 7.4 | {'CWE-87', 'CWE-79', 'CWE-75'} | {'https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32797', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed', 'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/advisories/GHSA-4952-p58q-6crx'} | null |
GHSA | GHSA-934x-72xh-5hrg | OS command injection in aws-lambda | In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName". | {'CVE-2019-10777'} | 2021-08-19T17:15:08Z | 2020-02-14T23:09:45Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/awspilot/cli-lambda-deploy', 'https://github.com/advisories/GHSA-934x-72xh-5hrg', 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10777'} | null |
GHSA | GHSA-4p92-fv6v-fhfj | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0723'} | 2022-03-09T20:43:45Z | 2022-02-27T00:00:15Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0723', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://github.com/advisories/GHSA-4p92-fv6v-fhfj'} | null |
GHSA | GHSA-m7jv-hq7h-mq7c | Infinite Loop in Apache Tomcat | The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. | {'CVE-2020-13935'} | 2022-04-22T17:30:34Z | 2022-02-08T22:05:17Z | HIGH | 7.5 | {'CWE-835'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-m7jv-hq7h-mq7c', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://usn.ubuntu.com/4596-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935', 'https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'https://usn.ubuntu.com/4448-1/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-hjgm-f7vx-m5g7 | Deserialization of Untrusted Data in Apache Heron | It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data). | {'CVE-2020-1964'} | 2022-01-06T19:44:49Z | 2022-01-06T19:44:49Z | HIGH | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r16dd39f4180e4443ef4ca774a3a5a3d7ac69f91812c183ed2a99e959%40%3Cdev.heron.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1964', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://github.com/advisories/GHSA-hjgm-f7vx-m5g7', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E'} | null |
GHSA | GHSA-jcpv-g9rr-qxrc | Regular Expression Denial of Service in hawk | Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's.
## Recommendation
Update to hawk version 4.1.1 or later. | {'CVE-2016-2515'} | 2021-09-14T19:39:20Z | 2018-07-31T22:52:00Z | HIGH | 7.5 | null | {'http://www.openwall.com/lists/oss-security/2016/02/20/2', 'https://www.npmjs.com/advisories/77', 'https://nodesecurity.io/advisories/77', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa', 'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://github.com/hueniverse/hawk/issues/168', 'http://www.openwall.com/lists/oss-security/2016/02/20/1'} | null |
GHSA | GHSA-x825-rjww-2245 | Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user | It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised. | {'CVE-2017-9799'} | 2022-04-27T14:25:42Z | 2018-10-17T18:30:01Z | HIGH | 8.8 | null | {'http://www.securityfocus.com/bid/100235', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9799', 'https://github.com/advisories/GHSA-x825-rjww-2245', 'https://lists.apache.org/thread.html/b9125bf507ed6f2ca6e85ba1a4b44e232aa70eeddfba2a9d8a954127@%3Cdev.storm.apache.org%3E', 'http://www.securitytracker.com/id/1039116'} | null |
GHSA | GHSA-ch68-7cf4-35vr | Limited ability to spoof SAML authentication with missing audience verification in Fleet | ### Impact
This impacts deployments using SAML SSO in two specific cases:
1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same Identity Provider (IdP) configured with Fleet.
2. A user with an account in Fleet could reuse a SAML response intended for another SP to log into Fleet. This is only a concern if the user is blocked from Fleet in the IdP, but continues to have an account in Fleet. If the user is blocked from the IdP entirely, this cannot be exploited.
### Patches
Fleet 4.9.1 resolves this issue.
### Workarounds and good practices
* Reduce the length of sessions on your IdP to reduce the window for malicious re-use.
* Limit the amount of SAML Service Providers/Applications used by user accounts with access to Fleet.
* When removing access to Fleet in the IdP, delete the Fleet user from Fleet as well.
### For more information
If you have any questions or comments about this advisory:
* Join us in the #fleet channel of [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw).
* Email us at [security@fleetdm.com](mailto:security@fleetdm.com). | {'CVE-2022-23600'} | 2022-04-19T19:03:21Z | 2022-02-07T21:57:38Z | MODERATE | 5.3 | {'CWE-287', 'CWE-284'} | {'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23600', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr', 'https://github.com/advisories/GHSA-ch68-7cf4-35vr'} | null |
GHSA | GHSA-p6vg-p826-qp3v | URL Redirection to Untrusted Site ('Open Redirect') in fastify-static | ### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`.
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.2.4`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1354255)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
| {'CVE-2021-22963'} | 2021-10-21T15:01:19Z | 2021-10-05T20:24:49Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-p6vg-p826-qp3v', 'https://hackerone.com/reports/1354255', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'} | null |
GHSA | GHSA-3fx5-fwvr-xrjg | Regular Expression Denial of Service in ms | Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Proof of Concept
```javascript
var ms = require('ms');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
ms(genstr(process.argv[2], "5") + " minutea");
```
### Results
Showing increase in execution time based on the input string.
```
$ time node ms.js 10000
real 0m0.758s
user 0m0.724s
sys 0m0.031s
$ time node ms.js 20000
real 0m2.580s
user 0m2.494s
sys 0m0.047s
$ time node ms.js 30000
real 0m5.747s
user 0m5.483s
sys 0m0.080s
$ time node ms.js 80000
real 0m41.022s
user 0m38.894s
sys 0m0.529s
```
| {'CVE-2015-8315'} | 2021-09-22T20:19:54Z | 2017-10-24T18:33:36Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.npmjs.com/advisories/46', 'http://www.securityfocus.com/bid/96389', 'https://github.com/advisories/GHSA-3fx5-fwvr-xrjg', 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'} | null |
GHSA | GHSA-xqxm-2rpm-3889 | Comment reply notifications sent to incorrect users | ### Impact
When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they have left a comment or reply somewhere on the site.
### Patches
A patched version has been released as Wagtail 2.15.2 (for the current LTS), which restores the intended behaviour - to send notifications for new replies to the participants in the active thread only (editing permissions are not considered).
### Workarounds
New comments can be disabled by setting `WAGTAILADMIN_COMMENTS_ENABLED = False` in the Django settings file.
### Acknowledgements
Many thanks to Ihor Marhitych for identifying this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
| {'CVE-2022-21683'} | 2022-04-19T19:03:19Z | 2022-01-21T23:43:50Z | LOW | 3.5 | {'CWE-200'} | {'https://github.com/wagtail/wagtail/releases/tag/v2.15.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21683', 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/advisories/GHSA-xqxm-2rpm-3889'} | null |
GHSA | GHSA-6rv4-4qv6-88g2 | Prototype Pollution in set-or-get | Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25913'} | 2021-04-12T17:39:19Z | 2021-04-12T17:39:19Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913', 'https://github.com/advisories/GHSA-6rv4-4qv6-88g2', 'https://www.npmjs.com/package/set-or-get'} | null |
GHSA | GHSA-cqv6-7fwc-8m3c | Directory Traversal in xtalk | Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL.
## Proof of Concept
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
```
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package. | {'CVE-2017-16091'} | 2021-01-07T23:32:05Z | 2020-09-01T16:44:59Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/339', 'https://nodesecurity.io/advisories/339', 'https://github.com/advisories/GHSA-cqv6-7fwc-8m3c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091'} | null |
GHSA | GHSA-84g3-cv89-m9gm | Prototype pollution vulnerability in 'patchmerge' | Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25916'} | 2021-10-13T15:33:20Z | 2021-10-13T15:33:20Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916', 'https://github.com/advisories/GHSA-84g3-cv89-m9gm'} | null |
GHSA | GHSA-c265-37vj-cwcc | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). | {'CVE-2020-14062'} | 2021-10-21T21:08:02Z | 2020-06-18T14:44:48Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-c265-37vj-cwcc', 'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-25pr-6pr6-68v7 | Path traversal in atlasboard | The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability. | {'CVE-2021-39109'} | 2021-09-02T17:17:25Z | 2021-09-02T17:17:25Z | HIGH | 0 | {'CWE-22'} | {'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path', 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c', 'https://github.com/advisories/GHSA-25pr-6pr6-68v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'} | null |
GHSA | GHSA-45w3-v3g4-54pm | Potential segfault in SPIFFE authenticator | ### Impact
Several vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235). In our case, the issue with the dependency was flagged by our nightly CI build running [`cargo-audit`](https://github.com/parallaxsecond/parsec/issues/544).
The vulnerability leads to a segfault in specific circumstances - namely, when one of a number of functions in the `time` crate is called while any other thread is setting an environment variable. Given that in the case of the Parsec service this affects the SPIFFE authenticator, Parsec service users can encounter the issue only when the JWT SVID authenticator is enabled and being used. We have not undergone any manual tracing to understand if the vulnerable methods are called anywhere in our stack, however it seems reasonable to expect that if that were to be the case, the issue would lie in JWT validation (i.e. when handling the dates found within a Json Web Token). JWT validation could thus fail, bringing down the thread in which the request happens. The rest of the threads continue to work. Since the threadpool implementation that we use [continues replenishing the pool](https://docs.rs/threadpool/latest/threadpool/) when one thread panics, the impact on the service should be minimal.
### Patches
No current patches exist as the problems lie in a number of dependencies that are not under our control (see more details [here](https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688)).
The issue tracking the required change in the `rust-spiffe` crate (through which the vulnerable dependencies are imported in Parsec) can be seen [here](https://github.com/maxlambrecht/rust-spiffe/issues/17). Once updates happen in our dependency chain that allow us to update beyond the vulnerable versions of `time` and `chrono`, a new version of the Parsec service will be tagged and released with the appropriate notifications.
### Workarounds
The only complete workaround is to use a different type of authenticator with the Parsec service.
### References
As quoted in the initial paragraph, you can find out more information:
* in the `chrono` repo issue [here](https://github.com/chronotope/chrono/issues/602)
* in the `time` repo issue [here](https://github.com/time-rs/time/issues/293)
* in the official CVE report [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235)
* in our tracking issue [here](https://github.com/parallaxsecond/parsec/issues/544)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Parsec service repo](https://github.com/parallaxsecond/parsec)
* Email us at [cncf-parsec-maintainers@lists.cncf.io](mailto:cncf-parsec-maintainers@lists.cncf.io)
| null | 2022-02-11T21:06:55Z | 2022-02-11T19:11:36Z | LOW | 0 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26235', 'https://github.com/chronotope/chrono/issues/602', 'https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688', 'https://github.com/parallaxsecond/parsec/security/advisories/GHSA-45w3-v3g4-54pm', 'https://github.com/parallaxsecond/parsec/issues/544', 'https://github.com/advisories/GHSA-45w3-v3g4-54pm', 'https://github.com/time-rs/time/issues/293'} | null |
GHSA | GHSA-hgg3-g7gr-66r7 | High severity vulnerability that affects pycryptodome | PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes. | {'CVE-2018-15560'} | 2021-09-14T17:17:14Z | 2018-08-27T19:52:28Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/Legrandin/pycryptodome/issues/198', 'https://github.com/advisories/GHSA-hgg3-g7gr-66r7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15560', 'https://whitehatck01.blogspot.com/2018/08/integer-overflow-vulnerability-in.html'} | null |
GHSA | GHSA-g397-v4w5-4m79 | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection. | {'CVE-2022-21223'} | 2022-04-12T15:42:03Z | 2022-04-02T00:00:13Z | HIGH | 8.1 | {'CWE-88', 'CWE-74'} | {'https://github.com/CocoaPods/cocoapods-downloader/pull/127', 'https://github.com/advisories/GHSA-g397-v4w5-4m79', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'} | null |
GHSA | GHSA-jh5w-6964-x5cf | Downloads Resources over HTTP in chromedriver | Affected versions of `chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one.
## Recommendation
Update to version 2.26.1 or later. | {'CVE-2016-10579'} | 2021-01-08T18:34:55Z | 2019-02-18T23:58:05Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-jh5w-6964-x5cf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10579', 'https://nodesecurity.io/advisories/160', 'https://www.npmjs.com/advisories/160'} | null |
GHSA | GHSA-rjx9-2936-9ffx | Improper Input Validation in Apache Sanselan | Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging. | {'CVE-2018-17201'} | 2021-08-03T22:54:51Z | 2019-05-14T04:01:06Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17201', 'https://github.com/advisories/GHSA-rjx9-2936-9ffx', 'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E'} | null |
GHSA | GHSA-7v94-64hj-m82h | FPE in `ParallelConcat` | ### Impact
The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.ParallelConcat(values=[['tf']],shape=0)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41207'} | 2021-11-10T19:02:57Z | 2021-11-10T19:02:57Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41207', 'https://github.com/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | null |
GHSA | GHSA-3gw4-m5w7-v89c | Uncontrolled Resource Consumption in Indy Node | # Summary
Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network.
# Discovery
On May 18, Evernym's monitoring of Sovrin StagingNet showed a report of StagingNet losing sufficient consensus to validate write transactions. The problem resolved itself within a few minutes. On May 20th we saw the alert multiple times, and we began analyzing the logs of our steward node. On May 21st we continued to see the alerts with increasing frequency.
It appears that someone is unknowingly sending a malformed transaction, and retrying when the transaction fails. The cause of the errors appear to be the TAA acceptance.
# Proposed actions
* Reproduce problem in integration tests and create a fix
* Do a hotfix release branching from last stable (current master have some things merged that are too risky)
* Upgrade BuilderNet, StagingNet and MainNet as soon as possible
* Improve testing strategy on Indy Node to reduce probability of such bugs
# Notes
* The journalctl logs also show an out-of-memory problem on the Australia node. We need to evaluate if this should be raised as a separate issue. | {'CVE-2020-11090'} | 2022-04-19T19:02:28Z | 2020-06-11T00:04:15Z | HIGH | 7.5 | {'CWE-400'} | {'https://pypi.org/project/indy-node/1.12.3/', 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-3gw4-m5w7-v89c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11090', 'https://github.com/advisories/GHSA-3gw4-m5w7-v89c', 'https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123'} | null |
GHSA | GHSA-pgcr-7wm4-mcv6 | Sensitive Data Exposure in pem | Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used.
The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system.
## Recommendation
Update to version 1.13.2 or later. | null | 2021-08-04T21:28:02Z | 2019-06-04T15:42:45Z | CRITICAL | 7.5 | {'CWE-200'} | {'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://github.com/advisories/GHSA-pgcr-7wm4-mcv6', 'https://github.com/Dexus/pem/pull/217', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://www.npmjs.com/advisories/723'} | null |
GHSA | GHSA-7vxr-6cxg-j3x8 | OS Command Injection in ftpd | The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic. | {'CVE-2013-2512'} | 2021-10-12T22:33:59Z | 2021-10-12T22:33:59Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-2512', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/advisories/GHSA-7vxr-6cxg-j3x8', 'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'} | null |
GHSA | GHSA-v2wc-pfq2-5cm6 | Possible XSS attack in Wagtail | ### Impact
A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch).
### Workarounds
Site owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project's `urls.py` configuration:
from django.views.generic.base import RedirectView
urlpatterns = [
url(r'^admin/pages/(\d+)/revisions/compare/', RedirectView.as_view(url='/admin/')),
# ...
]
### Acknowledgements
Many thanks to Vlad Gerasimenko for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | {'CVE-2020-11001'} | 2022-04-19T19:02:25Z | 2020-04-14T23:09:29Z | MODERATE | 5.8 | {'CWE-80'} | {'https://github.com/advisories/GHSA-v2wc-pfq2-5cm6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11001', 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/wagtail/wagtail/releases/tag/v2.8.1'} | null |
GHSA | GHSA-hwvm-vfw8-93mw | Vulnerable dependency in XTDB connector | ### Impact
The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component.
### Patches
The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE.
### Workarounds
We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-13956 | null | 2021-12-16T18:53:32Z | 2021-12-16T18:53:32Z | MODERATE | 5.3 | null | {'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'} | null |
GHSA | GHSA-xf46-8vvp-4hxx | Missing authentication for critical function | A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | {'CVE-2021-20262'} | 2021-03-25T23:21:56Z | 2021-03-12T21:33:42Z | MODERATE | 0 | {'CWE-306'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1933639', 'https://github.com/advisories/GHSA-xf46-8vvp-4hxx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20262'} | null |
GHSA | GHSA-828x-qc2p-wprq | Undefined behavior in `MaxPool3DGradGrad` | ### Impact
The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors:
```python
import tensorflow as tf
orig_input = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
orig_output = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
grad = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
ksize = [1, 1, 1, 1, 1]
strides = [1, 1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.MaxPool3DGradGrad(
orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize,
strides=strides, padding=padding)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/72fe792967e7fd25234342068806707bbc116618/tensorflow/core/kernels/pooling_ops_3d.cc#L679-L703) fails to validate that the 3 tensor inputs are not empty. If any of them is empty, then accessing the elements in the tensor results in dereferencing a null pointer.
### Patches
We have patched the issue in GitHub commit [a3d9f9be9ac2296615644061b40cefcee341dcc4](https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29574'} | 2021-05-21T14:26:10Z | 2021-05-21T14:26:10Z | LOW | 2.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq', 'https://github.com/advisories/GHSA-828x-qc2p-wprq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29574'} | null |
GHSA | GHSA-j5qg-w9jg-3wg3 | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449
This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters.
### Patches
4d37b79ff7f9d9452e988387f97919a9a1c4954e
### Workarounds
This can be easily addressed by removing the offending lines from ops.txt manually.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP)
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-04-19T19:03:17Z | 2021-12-16T18:53:57Z | LOW | 3.3 | null | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188'} | null |
GHSA | GHSA-37vc-gwvp-6cgv | Malicious Package in bitcoijns-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:40:01Z | 2020-09-04T15:42:49Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-37vc-gwvp-6cgv', 'https://www.npmjs.com/advisories/1362'} | null |
GHSA | GHSA-76p6-gpvf-6wmv | Directory Traversal in hftp | Affected versions of `hftp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16039'} | 2021-01-08T19:17:53Z | 2018-07-24T15:50:28Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-76p6-gpvf-6wmv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp', 'https://nodesecurity.io/advisories/384', 'https://www.npmjs.com/advisories/384', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16039'} | null |
GHSA | GHSA-5gm3-px64-rw72 | Uncontrolled Resource Consumption in Pillow | There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer. | {'CVE-2019-19911'} | 2021-08-23T15:06:45Z | 2020-04-01T16:36:44Z | HIGH | 7.5 | {'CWE-190'} | {'https://usn.ubuntu.com/4272-1/', 'https://www.debian.org/security/2020/dsa-4631', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/advisories/GHSA-5gm3-px64-rw72', 'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'} | null |
GHSA | GHSA-j5rj-g695-342r | Moderate severity vulnerability that affects fat_free_crm | FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, 0.14.2. | {'CVE-2018-1000842'} | 2021-09-14T18:25:50Z | 2018-12-20T22:01:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa', 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/asteinhauser/fat_free_crm/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://github.com/advisories/GHSA-j5rj-g695-342r'} | null |
GHSA | GHSA-w4r4-65mg-45x2 | Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'. | {'CVE-2018-11770'} | 2021-09-20T22:36:30Z | 2018-11-09T17:41:46Z | MODERATE | 4.2 | {'CWE-287'} | {'http://www.securityfocus.com/bid/105097', 'https://spark.apache.org/security.html#CVE-2018-11770', 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E', 'https://github.com/advisories/GHSA-w4r4-65mg-45x2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'} | null |
GHSA | GHSA-pr8j-3v7m-j4vv | Directory Traversal in myprolyz | Affected versions of `myprolyz` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16156'} | 2021-01-14T15:49:38Z | 2020-09-01T17:21:45Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/386', 'https://github.com/advisories/GHSA-pr8j-3v7m-j4vv', 'https://www.npmjs.com/advisories/386', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16156', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz'} | null |
GHSA | GHSA-9236-8w7q-rmrv | archivy is vulnerable to Cross-Site Request Forgery (CSRF) | archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch. | {'CVE-2021-4162'} | 2022-01-06T21:59:50Z | 2022-01-06T21:59:50Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-9236-8w7q-rmrv', 'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d', 'https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'} | null |
GHSA | GHSA-5pxj-mhwj-x5gv | Prototype Pollution in asciitable.js | The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function. | {'CVE-2020-7771'} | 2021-04-13T15:24:59Z | 2021-04-13T15:24:59Z | CRITICAL | 9.8 | {'CWE-400'} | {'https://github.com/advisories/GHSA-5pxj-mhwj-x5gv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771', 'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799', 'https://github.com/victornpb/asciitable.js/pull/1'} | null |
GHSA | GHSA-26vr-8j45-3r4w | Uncontrolled Resource Consumption in Jetty | ### Impact
When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage.
### Workarounds
The problem can be worked around by compiling the following class:
```java
package org.eclipse.jetty.server.ssl.fix6072;
import java.nio.ByteBuffer;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLEngineResult;
import javax.net.ssl.SSLException;
import javax.net.ssl.SSLHandshakeException;
import org.eclipse.jetty.io.EndPoint;
import org.eclipse.jetty.io.ssl.SslConnection;
import org.eclipse.jetty.server.Connector;
import org.eclipse.jetty.server.SslConnectionFactory;
import org.eclipse.jetty.util.BufferUtil;
import org.eclipse.jetty.util.annotation.Name;
import org.eclipse.jetty.util.ssl.SslContextFactory;
public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory
{
public SpaceCheckingSslConnectionFactory(@Name("sslContextFactory") SslContextFactory factory, @Name("next") String nextProtocol)
{
super(factory, nextProtocol);
}
@Override
protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine)
{
return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption())
{
@Override
protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException
{
SSLEngineResult results = super.unwrap(sslEngine, input, output);
if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW ||
results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) &&
BufferUtil.space(input) == 0)
{
BufferUtil.clear(input);
throw new SSLHandshakeException("Encrypted buffer max length exceeded");
}
return results;
}
};
}
}
```
This class can be deployed by:
+ The resulting class file should be put into a jar file (eg sslfix6072.jar)
+ The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib
+ Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules`
+ Edit the `${jetty.base}/modules/ssl.mod` file to have the following section:
```
[lib]
lib/sslfix6072.jar
```
+ Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc`
+ Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example:
```xml
<Call name="addIfAbsentConnectionFactory">
<Arg>
<New class="org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory">
<Arg name="next">http/1.1</Arg>
<Arg name="sslContextFactory"><Ref refid="sslContextFactory"/></Arg>
</New>
</Arg>
</Call>
```
+ Restart Jetty | {'CVE-2021-28165'} | 2022-04-22T16:50:36Z | 2021-04-06T17:31:30Z | HIGH | 7.5 | {'CWE-551', 'CWE-400'} | {'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165', 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w', 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E', 'https://github.com/advisories/GHSA-26vr-8j45-3r4w', 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/04/20/3', 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E'} | null |
GHSA | GHSA-j38c-25fj-mr84 | Stored XSS in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI. | {'CVE-2020-9485'} | 2021-09-22T21:23:37Z | 2020-07-27T16:57:34Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-j38c-25fj-mr84', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9485'} | null |
GHSA | GHSA-344f-f5vg-2jfj | Potential remote code execution in Apache Tomcat | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. | {'CVE-2020-9484'} | 2022-02-08T22:05:48Z | 2020-05-21T18:52:29Z | HIGH | 7 | {'CWE-502'} | {'https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://usn.ubuntu.com/4596-1/', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.gentoo.org/glsa/202006-21', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Jun/6', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-344f-f5vg-2jfj', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html', 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/01/2', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200528-0005/', 'https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'https://usn.ubuntu.com/4448-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/', 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9484', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-6g88-vr3v-76mf | Eval injection in Supybot/Limnoria | Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands. | {'CVE-2019-19010'} | 2021-08-18T22:35:12Z | 2019-11-20T01:31:31Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/ProgVal/Limnoria/wiki/math-eval-vulnerability', 'https://github.com/advisories/GHSA-6g88-vr3v-76mf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRNOUHFEN75QAIKT4Y3HDN3TT5LSIWN2/', 'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54CQM2TEXRADLE77VOMCPHL5PBHR3ZWJ/'} | null |
GHSA | GHSA-rffr-c932-cpxv | Cross-site Request Forgery (CSRF) in Cloud Native Computing Foundation Harbor | Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform. | {'CVE-2019-19025'} | 2021-05-18T18:27:50Z | 2021-05-18T18:27:50Z | MODERATE | 7.6 | {'CWE-352'} | {'https://github.com/advisories/GHSA-rffr-c932-cpxv', 'https://github.com/goharbor/harbor/security/advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19025', 'https://github.com/goharbor/harbor/security/advisories/GHSA-gcqm-v682-ccw6', 'https://tanzu.vmware.com/security/cve-2019-19025'} | null |
GHSA | GHSA-2q6w-rxf3-4wc9 | Malicious Package in codify | Version 0.3.1 of `codify` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.3.1 of this module is found installed you will want to replace it with a version before or after 0.3.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2021-09-24T16:54:23Z | 2020-09-01T19:49:18Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/620', 'https://github.com/advisories/GHSA-2q6w-rxf3-4wc9', 'https://github.com/bozuko/codify', 'https://snyk.io/vuln/SNYK-JS-CODIFY-451005'} | null |
GHSA | GHSA-v9v4-7jp6-8c73 | Moderate severity vulnerability that affects rails | The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. | {'CVE-2011-2197'} | 2021-09-20T21:18:53Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications', 'http://openwall.com/lists/oss-security/2011/06/13/9', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html', 'http://openwall.com/lists/oss-security/2011/06/09/2', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html', 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-v9v4-7jp6-8c73', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197', 'http://secunia.com/advisories/44789'} | null |
GHSA | GHSA-37g7-8vjj-pjpj | Hash flooding | A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. | {'CVE-2020-14326'} | 2022-03-21T21:47:08Z | 2022-03-18T17:58:59Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-14326', 'https://github.com/advisories/GHSA-37g7-8vjj-pjpj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1855826', 'https://github.com/resteasy/Resteasy/pull/2471'} | null |
GHSA | GHSA-2hjr-fg6c-v2h6 | Unauthorized access to Class instance in Jinjava | Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure. | {'CVE-2020-12668'} | 2022-02-09T00:33:56Z | 2022-02-09T00:33:56Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-2hjr-fg6c-v2h6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12668', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'} | null |
GHSA | GHSA-cxm3-v4mv-6mh8 | Cross-site Scripting in vditor | vditor does not filter user input | {'CVE-2021-4103'} | 2022-01-28T22:04:11Z | 2022-01-28T22:04:11Z | MODERATE | 0 | {'CWE-79'} | {'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103', 'https://github.com/Vanessa219/vditor/issues/1133', 'https://github.com/advisories/GHSA-cxm3-v4mv-6mh8', 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'} | null |
GHSA | GHSA-hhwc-8g49-j8jx | Incorrect Permission Assignment for Critical Resource in ruby_parser-legacy | The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file. | {'CVE-2019-18409'} | 2021-08-18T22:02:53Z | 2019-10-25T19:41:34Z | HIGH | 7.8 | {'CWE-732'} | {'https://github.com/zenspider/ruby_parser-legacy/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18409', 'https://github.com/advisories/GHSA-hhwc-8g49-j8jx'} | null |
GHSA | GHSA-g67g-hvc3-xmvf | Inconsistent input sanitisation leads to XSS vectors | ### Background
A variety of templates do not perform proper sanitization through HTML escaping.
Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields.
### Impact
OMERO.web before 5.11.0 and OMERO.figure before 4.4.1.
### Patches
Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher. | {'CVE-2021-41132'} | 2022-03-22T21:24:34Z | 2021-10-14T21:19:23Z | CRITICAL | 9.8 | {'CWE-116', 'CWE-79'} | {'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/advisories/GHSA-g67g-hvc3-xmvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'} | null |
GHSA | GHSA-g9wg-wq4f-2x5w | Cross-Site Scripting in console-feed | Versions of `console-feed` prior to 2.8.10 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape the rendered output. If an application uses `console-feed` and a malicious JavaScript payload was passed to a `console.log('%_', payload)` call, the package would render HTML containing the malicious payload.
## Recommendation
Upgrade to version 2.8.10 or later. | null | 2021-09-29T16:24:08Z | 2020-09-03T19:00:10Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1088', 'https://github.com/advisories/GHSA-g9wg-wq4f-2x5w'} | null |
GHSA | GHSA-m6q5-wv4x-fv6h | Cross-site Scripting in Drupal Core | Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. | {'CVE-2020-13668'} | 2022-02-26T00:26:28Z | 2022-02-12T00:00:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13668', 'https://www.drupal.org/sa-core-2020-009', 'https://github.com/advisories/GHSA-m6q5-wv4x-fv6h'} | null |
GHSA | GHSA-vwr2-wj63-86gr | Path Traversal in simplehttpserver | All versions of `simplehttpserver` are vulnerable to Path Traversal.
This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
## Recommendation
No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available. | {'CVE-2018-16478'} | 2021-09-16T21:00:56Z | 2018-12-06T15:49:10Z | MODERATE | 0 | {'CWE-12', 'CWE-22'} | {'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478', 'https://hackerone.com/reports/403703', 'https://github.com/advisories/GHSA-vwr2-wj63-86gr', 'https://www.npmjs.com/advisories/744'} | null |
GHSA | GHSA-vqp6-j452-j6wp | Open Redirect in CPython that affects users of OpenStack Nova | A vulnerability was found in CPython which is used by openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. | {'CVE-2021-3654'} | 2022-03-11T23:28:29Z | 2022-03-04T00:00:22Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-vqp6-j452-j6wp', 'https://opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66', 'https://opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251eb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1961439', 'https://www.openwall.com/lists/oss-security/2021/07/29/2', 'https://security.openstack.org/ossa/OSSA-2021-002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3654', 'https://bugs.python.org/issue32084', 'https://bugs.launchpad.net/nova/+bug/1927677'} | null |
GHSA | GHSA-ffm7-7r8g-77xm | Exposure of Sensitive Information to an Unauthorized Actor in Apache CXF | Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory’ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX. | {'CVE-2020-1954'} | 2022-02-11T21:12:50Z | 2022-02-10T22:38:50Z | MODERATE | 5.3 | {'CWE-200'} | {'https://security.netapp.com/advisory/ntap-20220210-0001/', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-ffm7-7r8g-77xm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1954', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
GHSA | GHSA-fg2v-w576-w4v3 | Out of bounds read in json-smart | A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request. | {'CVE-2021-31684'} | 2022-03-25T21:15:50Z | 2022-02-10T22:46:22Z | HIGH | 7.5 | {'CWE-787', 'CWE-125'} | {'https://github.com/netplex/json-smart-v2/issues/67', 'https://github.com/netplex/json-smart-v2/pull/68', 'https://github.com/netplex/json-smart-v1/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31684', 'https://github.com/netplex/json-smart-v1/pull/11', 'https://github.com/advisories/GHSA-fg2v-w576-w4v3', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-qv7g-j98v-8pp7 | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address this vulnerability. | {'CVE-2021-41236'} | 2022-01-06T19:49:02Z | 2022-01-06T18:34:35Z | MODERATE | 6.9 | {'CWE-79'} | {'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'} | null |
GHSA | GHSA-86pv-95mj-7w5f | Stored XSS vulnerability on Bounce Management Callback | ### Impact
Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the details page of an affected lead is opened by a Mautic user.
An attacker with access to the bounce management callback function (identified with the Mailjet webhook, but it is assumed this will work uniformly across all kinds of webhooks) can inject arbitrary JavaScript Code into the "error" and "error_related_to" parameters of the POST request (POST /mailer/<product / webhook>/callback). It is noted that there is no authentication needed to access this function.
The JavaScript Code is stored permanently in the web application and executed every time an authenticated user views the details page of a single contact / lead in Mautic. This means, arbitrary code can be executed to, e.g., steal or tamper with information.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
| {'CVE-2021-27910'} | 2021-09-01T18:40:48Z | 2021-09-01T18:40:48Z | HIGH | 8.2 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27910', 'https://github.com/advisories/GHSA-86pv-95mj-7w5f', 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'} | null |
GHSA | GHSA-7mv4-4xpg-xq44 | FormField with square brackets in field name skips validation | FileField with array notation skips validation
The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload.
PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileField, it will be coerced into allowing multiple files by using this notation. This is not a supported feature, though nothing is done to prevent this.
In this scenario, validation such as limiting allowed extensions is not applied, and the FileField->saveInto() behaviour is not triggered. If custom controller logic is used to process the file uploads, it might implicitly rely on validation to be provided by the Form system, which is not the case. | {'CVE-2020-26138'} | 2022-03-26T00:32:23Z | 2022-03-26T00:14:34Z | MODERATE | 5.3 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26138', 'https://github.com/advisories/GHSA-7mv4-4xpg-xq44', 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'} | null |
GHSA | GHSA-w29m-fjp4-qhmq | Unsafe Identifiers in Opencast | ### Impact
Opencast allows almost arbitrary identifiers for media packages and
elements to be used. This can be problematic for operation and security
since such identifiers are sometimes used for file system operations
which may lead to an attacker being able to escape working directories and
write files to other locations.
In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior,
the latter trying to mitigate some of the file system problems, can
cause errors due to identifier mismatch since an identifier may
unintentionally change.
### Patches
This issue is fixed in Opencast 7.6 and 8.1.
### Workarounds
There is no workaround for this.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5230'} | 2021-01-14T17:45:48Z | 2020-01-30T21:21:50Z | MODERATE | 7.7 | {'CWE-99'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5230', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317', 'https://github.com/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq'} | null |
GHSA | GHSA-jpj4-5xwp-cv23 | Remote code execution in DolphinScheduler | In DolphinScheduler 1.2.0 and 1.2.1, with mysql connectorj a remote code execution vulnerability exists when choosing mysql as database. | {'CVE-2020-11974'} | 2022-02-09T22:44:54Z | 2022-02-09T22:44:54Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11974', 'https://lists.apache.org/thread.html/rcbe4c248ef0c566e99fd19388a6c92aeef88167286546b675e9b1769%40%3Cdev.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r9fbe24539a873032b3e41243d44a730d6a2aae26335ac1e3271ea47d@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r33452d7b99a293bcf8f3e4bd664943847e2602e03a9e45d09d3f508a@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/ra81adacbfdd6f166f9cf155340674ffd4179386b8b75068639547c11@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://github.com/advisories/GHSA-jpj4-5xwp-cv23'} | null |
GHSA | GHSA-2v6x-frw8-7r7f | Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics | A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels, thus inadvertently exposing the secret content in metrics. | {'CVE-2019-17110'} | 2021-05-18T15:38:54Z | 2021-05-18T15:38:54Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110', 'https://github.com/advisories/GHSA-2v6x-frw8-7r7f', 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'} | null |
GHSA | GHSA-3w5h-x4rh-hc28 | Exposure of sensitive information in Apache Ozone | In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration. | {'CVE-2021-39231'} | 2021-11-23T18:18:25Z | 2021-11-23T18:18:25Z | CRITICAL | 9.1 | {'CWE-668'} | {'http://www.openwall.com/lists/oss-security/2021/11/19/2', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39231', 'https://github.com/advisories/GHSA-3w5h-x4rh-hc28'} | null |
GHSA | GHSA-q8q8-93cv-v6h8 | Lookup function information discolosure in helm | The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2.
### Impact
`lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as part of the process to render templates.
The documented behavior of `helm template` states that it does not attach to a remote cluster. However, as the recently added `lookup` template function circumvents this restriction and connects to the cluster even during `helm template` and `helm install|update|delete|rollback --dry-run`. The user is not notified of this behavior.
Running `helm template` should not make calls to a cluster. This is different from `install`, which is presumed to have access to a cluster in order to load resources into Kubernetes. Helm 2 is unaffected by this vulnerability.
A malicious chart author could inject a `lookup` into a chart that, when rendered through `helm template`, performs unannounced lookups against the cluster a user's `KUBECONFIG` file points to. This information can then be disclosed via the output of `helm template`.
### Patches
This issue has been fixed in Helm 3.2.0
### Workarounds
Due to another bug (also fixed in Helm 3.2.0), the command `helm lint` will fail with an error if the `lookup` function is used in a chart. Therefore, run `helm lint` on an untrusted chart before running `helm template`.
Alternately, setting the `KUBECONFIG` environment variable to point to an empty Kubernetes configuration file will prevent unintended network connections.
Finally, a chart may be manually analyzed for the presence of a `lookup` function in any file in the `templates/` directory.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)
* For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io) | {'CVE-2020-11013'} | 2021-05-27T18:44:56Z | 2021-05-27T18:44:56Z | HIGH | 8.5 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11013', 'https://github.com/helm/helm/releases/tag/v3.2.0', 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8', 'https://github.com/advisories/GHSA-q8q8-93cv-v6h8', 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008', 'https://github.com/helm/helm/pull/7969'} | null |
GHSA | GHSA-xr38-w74q-r8jv | Permissions not properly checked in Invenio-Drafts-Resources | ### Impact
Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public.
### Details
The service's ``publish()`` method contains the following permission check:
```python
def publish(..):
self.require_permission(identity, "publish")
```
However, the record should have been passed into the permission check so that the need generators have access to e.g. the record owner.
```python
def publish(..):
self.require_permission(identity, "publish", record=record)
```
The bug is activated in Invenio-RDM-Records which has a need generator called ``RecordOwners()``, which when no record is passed in defaults to allow any authenticated user:
```python
class RecordOwners(Generator):
def needs(self, record=None, **kwargs):
if record is None:
return [authenticated_user]
# ...
```
### Patches
The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6+, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
You can verify the version installed of Invenio-Drafts-Resources via PIP:
```console
cd ~/src/my-site
pipenv run pip freeze | grep invenio-drafts-resources
```
### References
- [Security policy](https://invenio.readthedocs.io/en/latest/community/security-policy.html)
### For more information
If you have any questions or comments about this advisory:
* Chat with us on Discord: https://discord.gg/8qatqBC
| {'CVE-2021-43781'} | 2022-04-19T19:03:16Z | 2021-12-06T23:57:59Z | MODERATE | 6.4 | {'CWE-862'} | {'https://github.com/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781', 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'} | null |
GHSA | GHSA-4j82-5ccr-4r8v | `CHECK`-failures in `TensorByteSize` in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures.
```cc
int64_t TensorByteSize(const TensorProto& t) {
// num_elements returns -1 if shape is not fully defined.
int64_t num_elems = TensorShape(t.tensor_shape()).num_elements();
return num_elems < 0 ? -1 : num_elems * DataTypeSize(t.dtype());
}
```
`TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what this function needs to be able to return `-1`.
### Patches
We have patched the issue in GitHub commit [c2426bba00a01de6913738df8fa78e0215fcce02](https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23582'} | 2022-02-11T20:38:32Z | 2022-02-10T00:34:01Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50', 'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02', 'https://github.com/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23582'} | null |
GHSA | GHSA-8mrf-64fw-2x75 | Command injection in fs-path | fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods. | {'CVE-2020-8298'} | 2021-03-25T21:06:41Z | 2021-03-25T21:06:41Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7', 'https://hackerone.com/reports/324491', 'https://github.com/pillys/fs-path/pull/6', 'https://github.com/advisories/GHSA-8mrf-64fw-2x75', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'} | null |
GHSA | GHSA-v9mf-jgq3-c28h | Data Amplification in Play Framework | An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON. | {'CVE-2020-28923'} | 2022-02-09T22:54:21Z | 2022-02-09T22:54:21Z | LOW | 2.7 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28923', 'https://github.com/advisories/GHSA-v9mf-jgq3-c28h', 'https://www.playframework.com/security/vulnerability/CVE-2020-28923-ImproperRemovalofSensitiveInformationBeforeStorageorTransfer', 'https://www.playframework.com/security/vulnerability'} | null |
GHSA | GHSA-fpgg-r39h-3x5x | Malicious Package in cxt | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:00:44Z | 2020-09-03T17:06:22Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1392', 'https://github.com/advisories/GHSA-fpgg-r39h-3x5x'} | null |
GHSA | GHSA-2958-5r4r-wvv6 | Directory Traversal in caolilinode | Affected versions of `caolilinode` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16159'} | 2021-01-14T15:47:42Z | 2020-09-01T17:27:05Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode', 'https://www.npmjs.com/advisories/394', 'https://nodesecurity.io/advisories/394', 'https://github.com/advisories/GHSA-2958-5r4r-wvv6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16159'} | null |
GHSA | GHSA-wp47-9r3h-xfgq | Server-Side Request Forgery in Apache Traffic Control | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. | {'CVE-2022-23206'} | 2022-02-15T00:18:47Z | 2022-02-07T00:00:23Z | HIGH | 7.5 | {'CWE-918'} | {'https://lists.apache.org/thread/lsrd2mqj29vrvwsh8g0d560vvz8n126f', 'https://github.com/advisories/GHSA-wp47-9r3h-xfgq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23206'} | null |
GHSA | GHSA-h353-hc43-95vc | Script injection without script or programming rights through Gadget titles | ### Impact
A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard.
### Patches
The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for this issue, it is recommended to upgrade XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-17794
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki security mailing-list](mailto:security@xwiki.org)
| {'CVE-2021-32621'} | 2021-06-28T18:40:55Z | 2021-05-18T18:36:16Z | HIGH | 8.8 | {'CWE-94'} | {'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://github.com/advisories/GHSA-h353-hc43-95vc', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vc'} | null |
GHSA | GHSA-mhx2-r3jx-g94c | Moderate severity vulnerability that affects org.apache.camel:camel-core | Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query. | {'CVE-2015-0264'} | 2021-09-15T20:20:34Z | 2018-10-16T23:09:15Z | MODERATE | 0 | null | {'https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0264', 'http://securitytracker.com/id/1032442', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'https://github.com/advisories/GHSA-mhx2-r3jx-g94c', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-w285-wf9q-5w69 | In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | {'CVE-2016-1000352'} | 2022-04-27T13:36:22Z | 2018-10-17T16:27:38Z | HIGH | 7.4 | {'CWE-326'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://github.com/advisories/GHSA-w285-wf9q-5w69', 'https://access.redhat.com/errata/RHSA-2018:2927'} | null |
GHSA | GHSA-xfhh-g9f5-x4m4 | Resource exhaustion in socket.io-parser | The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used. | {'CVE-2020-36049'} | 2021-06-30T16:54:43Z | 2021-06-30T16:51:31Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/advisories/GHSA-xfhh-g9f5-x4m4', 'https://www.npmjs.com/package/socket.io-parser', 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2', 'https://github.com/bcaller/kill-engine-io', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049'} | null |
GHSA | GHSA-36m4-6v6m-4vpr | Cross-site Scripting in remarkable | In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL. | {'CVE-2019-12043'} | 2021-08-04T14:53:47Z | 2019-05-29T18:04:55Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/jonschlinkert/remarkable/issues/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12043', 'https://github.com/advisories/GHSA-36m4-6v6m-4vpr'} | null |
GHSA | GHSA-6pmv-7pr9-cgrj | Predictable password in Keycloak | A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace. | {'CVE-2020-1731'} | 2022-01-04T19:48:39Z | 2020-04-15T21:09:27Z | CRITICAL | 9.8 | {'CWE-330', 'CWE-341'} | {'https://github.com/advisories/GHSA-6pmv-7pr9-cgrj', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1731'} | null |
GHSA | GHSA-wgw3-gf4p-62xc | Command Injection in wizard-syncronizer | All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-28T16:57:24Z | 2020-09-11T21:16:59Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/977', 'https://github.com/advisories/GHSA-wgw3-gf4p-62xc'} | null |
GHSA | GHSA-qw9c-8p76-3q2x | Directory Traversal in serve46 | Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16148'} | 2021-01-14T15:39:53Z | 2020-09-01T18:49:11Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/456', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46', 'https://nodesecurity.io/advisories/456', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16148', 'https://github.com/advisories/GHSA-qw9c-8p76-3q2x'} | null |
GHSA | GHSA-8g7p-74h8-hg48 | Denial of Service in https-proxy-agent | Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`.
## Recommendation
Update to version 2.2.0 or later. | {'CVE-2018-3739'} | 2022-04-19T19:03:26Z | 2018-07-27T17:04:52Z | CRITICAL | 9.1 | {'CWE-400', 'CWE-125'} | {'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://www.npmjs.com/advisories/593', 'https://hackerone.com/reports/319532'} | null |
GHSA | GHSA-h8mc-42c3-r72p | Downloads resources over HTTP in hubl-server | Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`.
## Recommendation
No patch is currently available for this vulnerability, and it has not seen any updates since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo | {'CVE-2017-16035'} | 2021-01-08T18:42:17Z | 2018-07-24T15:40:47Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/334', 'https://github.com/advisories/GHSA-h8mc-42c3-r72p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035', 'https://www.npmjs.com/advisories/334'} | null |
GHSA | GHSA-qg24-8xj4-gj2h | Unaligned memory allocation in chunky | An issue was discovered in the chunky crate through 2020-08-25 for Rust. The Chunk API does not honor an alignment requirement. | {'CVE-2020-36433'} | 2021-08-25T20:58:13Z | 2021-08-25T20:58:13Z | HIGH | 7.5 | {'CWE-758'} | {'https://github.com/advisories/GHSA-qg24-8xj4-gj2h', 'https://github.com/aeplay/chunky/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36433', 'https://rustsec.org/advisories/RUSTSEC-2020-0035.html'} | null |
GHSA | GHSA-m5wp-p3gj-7q5g | Missing Authorization in Jenkins dbCharts Plugin | A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials. | {'CVE-2022-25206'} | 2022-02-26T00:36:26Z | 2022-02-16T00:01:16Z | HIGH | 8.8 | {'CWE-862'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25206', 'https://github.com/advisories/GHSA-m5wp-p3gj-7q5g'} | null |
GHSA | GHSA-qxg5-2qff-p49r | Passing in a non-string 'html' argument can lead to unsanitized output | A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.
### Impact
XSS
### Patches
`3.2.0`
### Workarounds
Ensure that the `html` parameter is a string before calling the function.
| {'CVE-2021-32696'} | 2022-04-19T19:02:59Z | 2021-06-18T19:31:35Z | MODERATE | 3.7 | {'CWE-241', 'CWE-79', 'CWE-843'} | {'https://www.npmjs.com/package/striptags', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r', 'https://github.com/advisories/GHSA-qxg5-2qff-p49r', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'} | null |
GHSA | GHSA-c8xp-8mf3-62h9 | OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values | Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate.
### Impact
An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.
### Patches
https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422
https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@cloudflare.com](security@cloudflare.com)
| {'CVE-2021-3761'} | 2022-04-19T19:03:07Z | 2021-09-07T23:02:18Z | HIGH | 7.5 | {'CWE-787', 'CWE-295'} | {'https://github.com/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422', 'https://www.debian.org/security/2022/dsa-5041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.