ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-j7j5-752x-wr4v
Downloads Resources over HTTP in xd-testing
Affected versions of `xd-testing` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `xd-testing`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10653'}
2021-01-08T18:36:52Z
2019-02-18T23:45:21Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10653', 'https://nodesecurity.io/advisories/257', 'https://www.npmjs.com/advisories/257', 'https://github.com/advisories/GHSA-j7j5-752x-wr4v'}
null
GHSA
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
{'CVE-2016-1000338'}
2022-04-27T13:26:49Z
2018-10-17T16:23:26Z
HIGH
7.5
{'CWE-347'}
{'https://usn.ubuntu.com/3727-1/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000338', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-cx7r-634m-2q2h
Cross-Site Scripting in harp
# Withdrawn This advisory has been withdrawn per request from the maintainer. Given harp is a static webserver, a XSS type of vulnerability is not appropriate. ### Original advisory description All versions of `harp` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `harp` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-06-01T22:21:33Z
2020-09-02T18:20:21Z
MODERATE
0
null
{'https://hackerone.com/reports/453795', 'https://www.npmjs.com/advisories/806', 'https://github.com/advisories/GHSA-cx7r-634m-2q2h'}
null
GHSA
GHSA-vwxp-9qmf-w299
Cross-site Scripting in LiveHelperChat
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
{'CVE-2022-0394'}
2022-02-03T19:18:03Z
2022-02-01T00:49:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-vwxp-9qmf-w299', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
null
GHSA
GHSA-grpf-gg7v-5g5h
SQL Injection in Apache SkyWalking
Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.
{'CVE-2020-13921'}
2021-05-07T15:53:31Z
2021-05-07T15:53:31Z
CRITICAL
9.8
{'CWE-89'}
{'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://github.com/advisories/GHSA-grpf-gg7v-5g5h', 'https://github.com/apache/skywalking/pull/4970', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E'}
null
GHSA
GHSA-rf3h-xgv5-2q39
Division by zero in TFLite's implementation of `DepthwiseConv`
### Impact The implementation of the `DepthwiseConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288): ```cc int num_input_channels = SizeOfDimension(input, 3); TF_LITE_ENSURE_EQ(context, num_filter_channels % num_input_channels, 0); ``` An attacker can craft a model such that `input`'s fourth dimension would be 0. ### Patches We have patched the issue in GitHub commit [cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0](https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29602'}
2021-05-21T14:28:12Z
2021-05-21T14:28:12Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39', 'https://github.com/advisories/GHSA-rf3h-xgv5-2q39', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29602', 'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'}
null
GHSA
GHSA-rfq3-w54c-f9q5
OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses
### Impact [fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters 1. Registering a client with allowed redirect URL `http://127.0.0.1/callback` 2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback?bar=foo` 3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback?bar=foo` with a potentially successful OAuth2 response. as well as the host parameter (as long as the host is a loopback interface): 1. Registering a client with allowed redirect URL `https://example.com/callback` 2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback` 3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback` with a potentially successful OAuth2 response. These bugs are only applicable in scenarios where the attacker has control over the loopback interface (`localhost`, `127.0.0.1`, `[::1]`) where the browser performing the OAuth2 flow is running.
{'CVE-2020-15233'}
2022-04-19T19:02:35Z
2021-05-24T17:00:12Z
MODERATE
5.5
{'CWE-20', 'CWE-601'}
{'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5', 'https://github.com/ory/fosite/pull/400', 'https://github.com/advisories/GHSA-rfq3-w54c-f9q5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}
null
GHSA
GHSA-rfjc-xrmf-5vvw
Privilege escalation by backend users assigned to the default "Publisher" system role
### Impact Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. ### Patches Issue has been patched in Build 470 (v1.0.470) & v1.1.1. ### Workarounds Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1. ### References Reported by [Hoan Hoang](https://github.com/hoanhp) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1098" alt="Screen Shot 2020-10-10 at 1 37 25 PM" src="https://user-images.githubusercontent.com/7253840/95663611-e6326c80-0afd-11eb-8a1e-8b767a7202fb.png">
{'CVE-2020-15248'}
2022-04-19T19:02:37Z
2020-11-23T19:47:27Z
LOW
4
{'CWE-863', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15248', 'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'}
null
GHSA
GHSA-f246-xrrj-g8j6
Cross-site Scripting in markdown-it-highlightjs
This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss);
{'CVE-2020-7773'}
2022-02-10T20:19:58Z
2022-02-10T20:19:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52', 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14', 'https://github.com/advisories/GHSA-f246-xrrj-g8j6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461'}
null
GHSA
GHSA-x9p2-fxq6-2m5f
Reverse Tabnapping in swagger-ui
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. ## Recommendation Upgrade to version 3.18.0 or later.
null
2021-08-16T23:44:48Z
2019-06-20T14:33:07Z
MODERATE
4.3
{'CWE-1022'}
{'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://www.npmjs.com/advisories/975', 'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://github.com/advisories/GHSA-x9p2-fxq6-2m5f'}
null
GHSA
GHSA-rqjq-mrgx-85hp
Allocation of Resources Without Limits or Throttling in Hashicorp Consul
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.
{'CVE-2020-13250'}
2021-07-29T18:19:35Z
2021-05-18T18:21:35Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8023', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13250', 'https://github.com/advisories/GHSA-rqjq-mrgx-85hp'}
null
GHSA
GHSA-xwqr-xmgg-j69q
Integer overflow in solana_rbpf
From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via "addr = (sym.st_value + refd_pa) as u64";
{'CVE-2021-46102'}
2022-02-08T19:45:11Z
2022-01-28T22:59:28Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/advisories/GHSA-xwqr-xmgg-j69q', 'https://github.com/solana-labs/rbpf/pull/236', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46102', 'https://github.com/solana-labs/rbpf/blob/c14764850f0b83b58aa013248eaf6d65836c1218/src/elf.rs#L609-L630', 'https://blocksecteam.medium.com/new-integer-overflow-bug-discovered-in-solana-rbpf-7729717159ee', 'https://github.com/solana-labs/rbpf/releases/tag/v0.2.17', 'https://github.com/solana-labs/rbpf/pull/200'}
null
GHSA
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-25T14:50:17Z
2021-08-25T14:50:17Z
MODERATE
6.5
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728', 'https://github.com/advisories/GHSA-xp5q-77mh-6hm2'}
null
GHSA
GHSA-jrfj-98qg-qjgv
Denial of service in sidekiq
In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
{'CVE-2022-23837'}
2022-03-11T20:13:54Z
2022-01-27T14:42:37Z
HIGH
7.5
{'CWE-400', 'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23837', 'https://github.com/advisories/GHSA-jrfj-98qg-qjgv', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md'}
null
GHSA
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-26T01:14:30Z
2022-02-19T00:01:35Z
HIGH
7.6
{'CWE-93'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/advisories/GHSA-3wwj-wh2w-g4xp'}
null
GHSA
GHSA-4952-p58q-6crx
JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form>
### Impact Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. ### Patches Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21. ### References [OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. Credit: Guillaume Jeanne from Google
{'CVE-2021-32797'}
2022-04-08T21:47:11Z
2021-08-23T19:40:22Z
HIGH
7.4
{'CWE-87', 'CWE-79', 'CWE-75'}
{'https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32797', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed', 'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/advisories/GHSA-4952-p58q-6crx'}
null
GHSA
GHSA-934x-72xh-5hrg
OS command injection in aws-lambda
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName".
{'CVE-2019-10777'}
2021-08-19T17:15:08Z
2020-02-14T23:09:45Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/awspilot/cli-lambda-deploy', 'https://github.com/advisories/GHSA-934x-72xh-5hrg', 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10777'}
null
GHSA
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:45Z
2022-02-27T00:00:15Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0723', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://github.com/advisories/GHSA-4p92-fv6v-fhfj'}
null
GHSA
GHSA-m7jv-hq7h-mq7c
Infinite Loop in Apache Tomcat
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
{'CVE-2020-13935'}
2022-04-22T17:30:34Z
2022-02-08T22:05:17Z
HIGH
7.5
{'CWE-835'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-m7jv-hq7h-mq7c', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://usn.ubuntu.com/4596-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935', 'https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'https://usn.ubuntu.com/4448-1/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-hjgm-f7vx-m5g7
Deserialization of Untrusted Data in Apache Heron
It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data).
{'CVE-2020-1964'}
2022-01-06T19:44:49Z
2022-01-06T19:44:49Z
HIGH
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r16dd39f4180e4443ef4ca774a3a5a3d7ac69f91812c183ed2a99e959%40%3Cdev.heron.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1964', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://github.com/advisories/GHSA-hjgm-f7vx-m5g7', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E'}
null
GHSA
GHSA-jcpv-g9rr-qxrc
Regular Expression Denial of Service in hawk
Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's. ## Recommendation Update to hawk version 4.1.1 or later.
{'CVE-2016-2515'}
2021-09-14T19:39:20Z
2018-07-31T22:52:00Z
HIGH
7.5
null
{'http://www.openwall.com/lists/oss-security/2016/02/20/2', 'https://www.npmjs.com/advisories/77', 'https://nodesecurity.io/advisories/77', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa', 'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://github.com/hueniverse/hawk/issues/168', 'http://www.openwall.com/lists/oss-security/2016/02/20/1'}
null
GHSA
GHSA-x825-rjww-2245
Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user
It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised.
{'CVE-2017-9799'}
2022-04-27T14:25:42Z
2018-10-17T18:30:01Z
HIGH
8.8
null
{'http://www.securityfocus.com/bid/100235', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9799', 'https://github.com/advisories/GHSA-x825-rjww-2245', 'https://lists.apache.org/thread.html/b9125bf507ed6f2ca6e85ba1a4b44e232aa70eeddfba2a9d8a954127@%3Cdev.storm.apache.org%3E', 'http://www.securitytracker.com/id/1039116'}
null
GHSA
GHSA-ch68-7cf4-35vr
Limited ability to spoof SAML authentication with missing audience verification in Fleet
### Impact This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same Identity Provider (IdP) configured with Fleet. 2. A user with an account in Fleet could reuse a SAML response intended for another SP to log into Fleet. This is only a concern if the user is blocked from Fleet in the IdP, but continues to have an account in Fleet. If the user is blocked from the IdP entirely, this cannot be exploited. ### Patches Fleet 4.9.1 resolves this issue. ### Workarounds and good practices * Reduce the length of sessions on your IdP to reduce the window for malicious re-use. * Limit the amount of SAML Service Providers/Applications used by user accounts with access to Fleet. * When removing access to Fleet in the IdP, delete the Fleet user from Fleet as well. ### For more information If you have any questions or comments about this advisory: * Join us in the #fleet channel of [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw). * Email us at [security@fleetdm.com](mailto:security@fleetdm.com).
{'CVE-2022-23600'}
2022-04-19T19:03:21Z
2022-02-07T21:57:38Z
MODERATE
5.3
{'CWE-287', 'CWE-284'}
{'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23600', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr', 'https://github.com/advisories/GHSA-ch68-7cf4-35vr'}
null
GHSA
GHSA-p6vg-p826-qp3v
URL Redirection to Untrusted Site ('Open Redirect') in fastify-static
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`. The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. ### Patches The issue has been patched in `fastify-static@4.2.4` ### Workarounds If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. ### References + Bug founder: drstrnegth + [hackerone Report](https://hackerone.com/reports/1354255) ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-static](https://github.com/fastify/fastify-static) * Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
{'CVE-2021-22963'}
2021-10-21T15:01:19Z
2021-10-05T20:24:49Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-p6vg-p826-qp3v', 'https://hackerone.com/reports/1354255', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'}
null
GHSA
GHSA-3fx5-fwvr-xrjg
Regular Expression Denial of Service in ms
Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of Concept ```javascript var ms = require('ms'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } ms(genstr(process.argv[2], "5") + " minutea"); ``` ### Results Showing increase in execution time based on the input string. ``` $ time node ms.js 10000 real 0m0.758s user 0m0.724s sys 0m0.031s $ time node ms.js 20000 real 0m2.580s user 0m2.494s sys 0m0.047s $ time node ms.js 30000 real 0m5.747s user 0m5.483s sys 0m0.080s $ time node ms.js 80000 real 0m41.022s user 0m38.894s sys 0m0.529s ```
{'CVE-2015-8315'}
2021-09-22T20:19:54Z
2017-10-24T18:33:36Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/advisories/46', 'http://www.securityfocus.com/bid/96389', 'https://github.com/advisories/GHSA-3fx5-fwvr-xrjg', 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&amp;utm_medium=RSS', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'}
null
GHSA
GHSA-xqxm-2rpm-3889
Comment reply notifications sent to incorrect users
### Impact When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they have left a comment or reply somewhere on the site. ### Patches A patched version has been released as Wagtail 2.15.2 (for the current LTS), which restores the intended behaviour - to send notifications for new replies to the participants in the active thread only (editing permissions are not considered). ### Workarounds New comments can be disabled by setting `WAGTAILADMIN_COMMENTS_ENABLED = False` in the Django settings file. ### Acknowledgements Many thanks to Ihor Marhitych for identifying this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2022-21683'}
2022-04-19T19:03:19Z
2022-01-21T23:43:50Z
LOW
3.5
{'CWE-200'}
{'https://github.com/wagtail/wagtail/releases/tag/v2.15.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21683', 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889', 'https://github.com/advisories/GHSA-xqxm-2rpm-3889'}
null
GHSA
GHSA-6rv4-4qv6-88g2
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25913'}
2021-04-12T17:39:19Z
2021-04-12T17:39:19Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913', 'https://github.com/advisories/GHSA-6rv4-4qv6-88g2', 'https://www.npmjs.com/package/set-or-get'}
null
GHSA
GHSA-cqv6-7fwc-8m3c
Directory Traversal in xtalk
Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL. ## Proof of Concept ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:localhost ``` ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
{'CVE-2017-16091'}
2021-01-07T23:32:05Z
2020-09-01T16:44:59Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/339', 'https://nodesecurity.io/advisories/339', 'https://github.com/advisories/GHSA-cqv6-7fwc-8m3c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091'}
null
GHSA
GHSA-84g3-cv89-m9gm
Prototype pollution vulnerability in 'patchmerge'
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25916'}
2021-10-13T15:33:20Z
2021-10-13T15:33:20Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916', 'https://github.com/advisories/GHSA-84g3-cv89-m9gm'}
null
GHSA
GHSA-c265-37vj-cwcc
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{'CVE-2020-14062'}
2021-10-21T21:08:02Z
2020-06-18T14:44:48Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-c265-37vj-cwcc', 'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-25pr-6pr6-68v7
Path traversal in atlasboard
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.
{'CVE-2021-39109'}
2021-09-02T17:17:25Z
2021-09-02T17:17:25Z
HIGH
0
{'CWE-22'}
{'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path', 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c', 'https://github.com/advisories/GHSA-25pr-6pr6-68v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'}
null
GHSA
GHSA-45w3-v3g4-54pm
Potential segfault in SPIFFE authenticator
### Impact Several vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235). In our case, the issue with the dependency was flagged by our nightly CI build running [`cargo-audit`](https://github.com/parallaxsecond/parsec/issues/544). The vulnerability leads to a segfault in specific circumstances - namely, when one of a number of functions in the `time` crate is called while any other thread is setting an environment variable. Given that in the case of the Parsec service this affects the SPIFFE authenticator, Parsec service users can encounter the issue only when the JWT SVID authenticator is enabled and being used. We have not undergone any manual tracing to understand if the vulnerable methods are called anywhere in our stack, however it seems reasonable to expect that if that were to be the case, the issue would lie in JWT validation (i.e. when handling the dates found within a Json Web Token). JWT validation could thus fail, bringing down the thread in which the request happens. The rest of the threads continue to work. Since the threadpool implementation that we use [continues replenishing the pool](https://docs.rs/threadpool/latest/threadpool/) when one thread panics, the impact on the service should be minimal. ### Patches No current patches exist as the problems lie in a number of dependencies that are not under our control (see more details [here](https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688)). The issue tracking the required change in the `rust-spiffe` crate (through which the vulnerable dependencies are imported in Parsec) can be seen [here](https://github.com/maxlambrecht/rust-spiffe/issues/17). Once updates happen in our dependency chain that allow us to update beyond the vulnerable versions of `time` and `chrono`, a new version of the Parsec service will be tagged and released with the appropriate notifications. ### Workarounds The only complete workaround is to use a different type of authenticator with the Parsec service. ### References As quoted in the initial paragraph, you can find out more information: * in the `chrono` repo issue [here](https://github.com/chronotope/chrono/issues/602) * in the `time` repo issue [here](https://github.com/time-rs/time/issues/293) * in the official CVE report [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235) * in our tracking issue [here](https://github.com/parallaxsecond/parsec/issues/544) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Parsec service repo](https://github.com/parallaxsecond/parsec) * Email us at [cncf-parsec-maintainers@lists.cncf.io](mailto:cncf-parsec-maintainers@lists.cncf.io)
null
2022-02-11T21:06:55Z
2022-02-11T19:11:36Z
LOW
0
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26235', 'https://github.com/chronotope/chrono/issues/602', 'https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688', 'https://github.com/parallaxsecond/parsec/security/advisories/GHSA-45w3-v3g4-54pm', 'https://github.com/parallaxsecond/parsec/issues/544', 'https://github.com/advisories/GHSA-45w3-v3g4-54pm', 'https://github.com/time-rs/time/issues/293'}
null
GHSA
GHSA-hgg3-g7gr-66r7
High severity vulnerability that affects pycryptodome
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
{'CVE-2018-15560'}
2021-09-14T17:17:14Z
2018-08-27T19:52:28Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/Legrandin/pycryptodome/issues/198', 'https://github.com/advisories/GHSA-hgg3-g7gr-66r7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15560', 'https://whitehatck01.blogspot.com/2018/08/integer-overflow-vulnerability-in.html'}
null
GHSA
GHSA-g397-v4w5-4m79
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-21223'}
2022-04-12T15:42:03Z
2022-04-02T00:00:13Z
HIGH
8.1
{'CWE-88', 'CWE-74'}
{'https://github.com/CocoaPods/cocoapods-downloader/pull/127', 'https://github.com/advisories/GHSA-g397-v4w5-4m79', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'}
null
GHSA
GHSA-jh5w-6964-x5cf
Downloads Resources over HTTP in chromedriver
Affected versions of `chromedriver` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one. ## Recommendation Update to version 2.26.1 or later.
{'CVE-2016-10579'}
2021-01-08T18:34:55Z
2019-02-18T23:58:05Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-jh5w-6964-x5cf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10579', 'https://nodesecurity.io/advisories/160', 'https://www.npmjs.com/advisories/160'}
null
GHSA
GHSA-rjx9-2936-9ffx
Improper Input Validation in Apache Sanselan
Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
{'CVE-2018-17201'}
2021-08-03T22:54:51Z
2019-05-14T04:01:06Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17201', 'https://github.com/advisories/GHSA-rjx9-2936-9ffx', 'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E'}
null
GHSA
GHSA-7v94-64hj-m82h
FPE in `ParallelConcat`
### Impact The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.ParallelConcat(values=[['tf']],shape=0) return y test() ``` ### Patches We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41207'}
2021-11-10T19:02:57Z
2021-11-10T19:02:57Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41207', 'https://github.com/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
null
GHSA
GHSA-3gw4-m5w7-v89c
Uncontrolled Resource Consumption in Indy Node
# Summary Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. # Discovery On May 18, Evernym's monitoring of Sovrin StagingNet showed a report of StagingNet losing sufficient consensus to validate write transactions. The problem resolved itself within a few minutes. On May 20th we saw the alert multiple times, and we began analyzing the logs of our steward node. On May 21st we continued to see the alerts with increasing frequency. It appears that someone is unknowingly sending a malformed transaction, and retrying when the transaction fails. The cause of the errors appear to be the TAA acceptance. # Proposed actions * Reproduce problem in integration tests and create a fix * Do a hotfix release branching from last stable (current master have some things merged that are too risky) * Upgrade BuilderNet, StagingNet and MainNet as soon as possible * Improve testing strategy on Indy Node to reduce probability of such bugs # Notes * The journalctl logs also show an out-of-memory problem on the Australia node. We need to evaluate if this should be raised as a separate issue.
{'CVE-2020-11090'}
2022-04-19T19:02:28Z
2020-06-11T00:04:15Z
HIGH
7.5
{'CWE-400'}
{'https://pypi.org/project/indy-node/1.12.3/', 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-3gw4-m5w7-v89c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11090', 'https://github.com/advisories/GHSA-3gw4-m5w7-v89c', 'https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123'}
null
GHSA
GHSA-pgcr-7wm4-mcv6
Sensitive Data Exposure in pem
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system. ## Recommendation Update to version 1.13.2 or later.
null
2021-08-04T21:28:02Z
2019-06-04T15:42:45Z
CRITICAL
7.5
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://github.com/advisories/GHSA-pgcr-7wm4-mcv6', 'https://github.com/Dexus/pem/pull/217', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://www.npmjs.com/advisories/723'}
null
GHSA
GHSA-7vxr-6cxg-j3x8
OS Command Injection in ftpd
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
{'CVE-2013-2512'}
2021-10-12T22:33:59Z
2021-10-12T22:33:59Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-2512', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/advisories/GHSA-7vxr-6cxg-j3x8', 'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}
null
GHSA
GHSA-v2wc-pfq2-5cm6
Possible XSS attack in Wagtail
### Impact A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. ### Patches Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch). ### Workarounds Site owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project's `urls.py` configuration: from django.views.generic.base import RedirectView urlpatterns = [ url(r'^admin/pages/(\d+)/revisions/compare/', RedirectView.as_view(url='/admin/')), # ... ] ### Acknowledgements Many thanks to Vlad Gerasimenko for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2020-11001'}
2022-04-19T19:02:25Z
2020-04-14T23:09:29Z
MODERATE
5.8
{'CWE-80'}
{'https://github.com/advisories/GHSA-v2wc-pfq2-5cm6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11001', 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6', 'https://github.com/wagtail/wagtail/releases/tag/v2.8.1'}
null
GHSA
GHSA-hwvm-vfw8-93mw
Vulnerable dependency in XTDB connector
### Impact The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component. ### Patches The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE. ### Workarounds We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-13956
null
2021-12-16T18:53:32Z
2021-12-16T18:53:32Z
MODERATE
5.3
null
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}
null
GHSA
GHSA-xf46-8vvp-4hxx
Missing authentication for critical function
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{'CVE-2021-20262'}
2021-03-25T23:21:56Z
2021-03-12T21:33:42Z
MODERATE
0
{'CWE-306'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1933639', 'https://github.com/advisories/GHSA-xf46-8vvp-4hxx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20262'}
null
GHSA
GHSA-828x-qc2p-wprq
Undefined behavior in `MaxPool3DGradGrad`
### Impact The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors: ```python import tensorflow as tf orig_input = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) orig_output = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) grad = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) ksize = [1, 1, 1, 1, 1] strides = [1, 1, 1, 1, 1] padding = "SAME" tf.raw_ops.MaxPool3DGradGrad( orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, strides=strides, padding=padding) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/72fe792967e7fd25234342068806707bbc116618/tensorflow/core/kernels/pooling_ops_3d.cc#L679-L703) fails to validate that the 3 tensor inputs are not empty. If any of them is empty, then accessing the elements in the tensor results in dereferencing a null pointer. ### Patches We have patched the issue in GitHub commit [a3d9f9be9ac2296615644061b40cefcee341dcc4](https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29574'}
2021-05-21T14:26:10Z
2021-05-21T14:26:10Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq', 'https://github.com/advisories/GHSA-828x-qc2p-wprq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29574'}
null
GHSA
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449 This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters. ### Patches 4d37b79ff7f9d9452e988387f97919a9a1c4954e ### Workarounds This can be easily addressed by removing the offending lines from ops.txt manually. ### For more information If you have any questions or comments about this advisory: * Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-04-19T19:03:17Z
2021-12-16T18:53:57Z
LOW
3.3
null
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188'}
null
GHSA
GHSA-37vc-gwvp-6cgv
Malicious Package in bitcoijns-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:40:01Z
2020-09-04T15:42:49Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-37vc-gwvp-6cgv', 'https://www.npmjs.com/advisories/1362'}
null
GHSA
GHSA-76p6-gpvf-6wmv
Directory Traversal in hftp
Affected versions of `hftp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16039'}
2021-01-08T19:17:53Z
2018-07-24T15:50:28Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-76p6-gpvf-6wmv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp', 'https://nodesecurity.io/advisories/384', 'https://www.npmjs.com/advisories/384', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16039'}
null
GHSA
GHSA-5gm3-px64-rw72
Uncontrolled Resource Consumption in Pillow
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.
{'CVE-2019-19911'}
2021-08-23T15:06:45Z
2020-04-01T16:36:44Z
HIGH
7.5
{'CWE-190'}
{'https://usn.ubuntu.com/4272-1/', 'https://www.debian.org/security/2020/dsa-4631', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/advisories/GHSA-5gm3-px64-rw72', 'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}
null
GHSA
GHSA-j5rj-g695-342r
Moderate severity vulnerability that affects fat_free_crm
FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, 0.14.2.
{'CVE-2018-1000842'}
2021-09-14T18:25:50Z
2018-12-20T22:01:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa', 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/asteinhauser/fat_free_crm/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://github.com/advisories/GHSA-j5rj-g695-342r'}
null
GHSA
GHSA-w4r4-65mg-45x2
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.
{'CVE-2018-11770'}
2021-09-20T22:36:30Z
2018-11-09T17:41:46Z
MODERATE
4.2
{'CWE-287'}
{'http://www.securityfocus.com/bid/105097', 'https://spark.apache.org/security.html#CVE-2018-11770', 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E', 'https://github.com/advisories/GHSA-w4r4-65mg-45x2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770'}
null
GHSA
GHSA-pr8j-3v7m-j4vv
Directory Traversal in myprolyz
Affected versions of `myprolyz` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16156'}
2021-01-14T15:49:38Z
2020-09-01T17:21:45Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/386', 'https://github.com/advisories/GHSA-pr8j-3v7m-j4vv', 'https://www.npmjs.com/advisories/386', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16156', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz'}
null
GHSA
GHSA-9236-8w7q-rmrv
archivy is vulnerable to Cross-Site Request Forgery (CSRF)
archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch.
{'CVE-2021-4162'}
2022-01-06T21:59:50Z
2022-01-06T21:59:50Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-9236-8w7q-rmrv', 'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d', 'https://huntr.dev/bounties/e204a768-2129-4b6f-abad-e436309c7c32', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'}
null
GHSA
GHSA-5pxj-mhwj-x5gv
Prototype Pollution in asciitable.js
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
{'CVE-2020-7771'}
2021-04-13T15:24:59Z
2021-04-13T15:24:59Z
CRITICAL
9.8
{'CWE-400'}
{'https://github.com/advisories/GHSA-5pxj-mhwj-x5gv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771', 'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799', 'https://github.com/victornpb/asciitable.js/pull/1'}
null
GHSA
GHSA-26vr-8j45-3r4w
Uncontrolled Resource Consumption in Jetty
### Impact When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. ### Workarounds The problem can be worked around by compiling the following class: ```java package org.eclipse.jetty.server.ssl.fix6072; import java.nio.ByteBuffer; import javax.net.ssl.SSLEngine; import javax.net.ssl.SSLEngineResult; import javax.net.ssl.SSLException; import javax.net.ssl.SSLHandshakeException; import org.eclipse.jetty.io.EndPoint; import org.eclipse.jetty.io.ssl.SslConnection; import org.eclipse.jetty.server.Connector; import org.eclipse.jetty.server.SslConnectionFactory; import org.eclipse.jetty.util.BufferUtil; import org.eclipse.jetty.util.annotation.Name; import org.eclipse.jetty.util.ssl.SslContextFactory; public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory { public SpaceCheckingSslConnectionFactory(@Name("sslContextFactory") SslContextFactory factory, @Name("next") String nextProtocol) { super(factory, nextProtocol); } @Override protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine) { return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption()) { @Override protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException { SSLEngineResult results = super.unwrap(sslEngine, input, output); if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW || results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) && BufferUtil.space(input) == 0) { BufferUtil.clear(input); throw new SSLHandshakeException("Encrypted buffer max length exceeded"); } return results; } }; } } ``` This class can be deployed by: + The resulting class file should be put into a jar file (eg sslfix6072.jar) + The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib + Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules` + Edit the `${jetty.base}/modules/ssl.mod` file to have the following section: ``` [lib] lib/sslfix6072.jar ``` + Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc` + Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example: ```xml <Call name="addIfAbsentConnectionFactory"> <Arg> <New class="org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory"> <Arg name="next">http/1.1</Arg> <Arg name="sslContextFactory"><Ref refid="sslContextFactory"/></Arg> </New> </Arg> </Call> ``` + Restart Jetty
{'CVE-2021-28165'}
2022-04-22T16:50:36Z
2021-04-06T17:31:30Z
HIGH
7.5
{'CWE-551', 'CWE-400'}
{'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165', 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w', 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E', 'https://github.com/advisories/GHSA-26vr-8j45-3r4w', 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/04/20/3', 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E'}
null
GHSA
GHSA-j38c-25fj-mr84
Stored XSS in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI.
{'CVE-2020-9485'}
2021-09-22T21:23:37Z
2020-07-27T16:57:34Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-j38c-25fj-mr84', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9485'}
null
GHSA
GHSA-344f-f5vg-2jfj
Potential remote code execution in Apache Tomcat
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
{'CVE-2020-9484'}
2022-02-08T22:05:48Z
2020-05-21T18:52:29Z
HIGH
7
{'CWE-502'}
{'https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://usn.ubuntu.com/4596-1/', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.gentoo.org/glsa/202006-21', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Jun/6', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-344f-f5vg-2jfj', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html', 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/01/2', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200528-0005/', 'https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'https://usn.ubuntu.com/4448-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/', 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9484', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-6g88-vr3v-76mf
Eval injection in Supybot/Limnoria
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
{'CVE-2019-19010'}
2021-08-18T22:35:12Z
2019-11-20T01:31:31Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/ProgVal/Limnoria/wiki/math-eval-vulnerability', 'https://github.com/advisories/GHSA-6g88-vr3v-76mf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRNOUHFEN75QAIKT4Y3HDN3TT5LSIWN2/', 'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54CQM2TEXRADLE77VOMCPHL5PBHR3ZWJ/'}
null
GHSA
GHSA-rffr-c932-cpxv
Cross-site Request Forgery (CSRF) in Cloud Native Computing Foundation Harbor
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform.
{'CVE-2019-19025'}
2021-05-18T18:27:50Z
2021-05-18T18:27:50Z
MODERATE
7.6
{'CWE-352'}
{'https://github.com/advisories/GHSA-rffr-c932-cpxv', 'https://github.com/goharbor/harbor/security/advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19025', 'https://github.com/goharbor/harbor/security/advisories/GHSA-gcqm-v682-ccw6', 'https://tanzu.vmware.com/security/cve-2019-19025'}
null
GHSA
GHSA-2q6w-rxf3-4wc9
Malicious Package in codify
Version 0.3.1 of `codify` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.3.1 of this module is found installed you will want to replace it with a version before or after 0.3.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:54:23Z
2020-09-01T19:49:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/620', 'https://github.com/advisories/GHSA-2q6w-rxf3-4wc9', 'https://github.com/bozuko/codify', 'https://snyk.io/vuln/SNYK-JS-CODIFY-451005'}
null
GHSA
GHSA-v9v4-7jp6-8c73
Moderate severity vulnerability that affects rails
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
{'CVE-2011-2197'}
2021-09-20T21:18:53Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications', 'http://openwall.com/lists/oss-security/2011/06/13/9', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html', 'http://openwall.com/lists/oss-security/2011/06/09/2', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html', 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-v9v4-7jp6-8c73', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197', 'http://secunia.com/advisories/44789'}
null
GHSA
GHSA-37g7-8vjj-pjpj
Hash flooding
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
{'CVE-2020-14326'}
2022-03-21T21:47:08Z
2022-03-18T17:58:59Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14326', 'https://github.com/advisories/GHSA-37g7-8vjj-pjpj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1855826', 'https://github.com/resteasy/Resteasy/pull/2471'}
null
GHSA
GHSA-2hjr-fg6c-v2h6
Unauthorized access to Class instance in Jinjava
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
{'CVE-2020-12668'}
2022-02-09T00:33:56Z
2022-02-09T00:33:56Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-2hjr-fg6c-v2h6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12668', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'}
null
GHSA
GHSA-cxm3-v4mv-6mh8
Cross-site Scripting in vditor
vditor does not filter user input
{'CVE-2021-4103'}
2022-01-28T22:04:11Z
2022-01-28T22:04:11Z
MODERATE
0
{'CWE-79'}
{'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103', 'https://github.com/Vanessa219/vditor/issues/1133', 'https://github.com/advisories/GHSA-cxm3-v4mv-6mh8', 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}
null
GHSA
GHSA-hhwc-8g49-j8jx
Incorrect Permission Assignment for Critical Resource in ruby_parser-legacy
The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file.
{'CVE-2019-18409'}
2021-08-18T22:02:53Z
2019-10-25T19:41:34Z
HIGH
7.8
{'CWE-732'}
{'https://github.com/zenspider/ruby_parser-legacy/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18409', 'https://github.com/advisories/GHSA-hhwc-8g49-j8jx'}
null
GHSA
GHSA-g67g-hvc3-xmvf
Inconsistent input sanitisation leads to XSS vectors
### Background A variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields. ### Impact OMERO.web before 5.11.0 and OMERO.figure before 4.4.1. ### Patches Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher.
{'CVE-2021-41132'}
2022-03-22T21:24:34Z
2021-10-14T21:19:23Z
CRITICAL
9.8
{'CWE-116', 'CWE-79'}
{'https://www.openmicroscopy.org/security/advisories/2021-SV3/', 'https://github.com/advisories/GHSA-g67g-hvc3-xmvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132', 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424', 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'}
null
GHSA
GHSA-g9wg-wq4f-2x5w
Cross-Site Scripting in console-feed
Versions of `console-feed` prior to 2.8.10 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape the rendered output. If an application uses `console-feed` and a malicious JavaScript payload was passed to a `console.log('%_', payload)` call, the package would render HTML containing the malicious payload. ## Recommendation Upgrade to version 2.8.10 or later.
null
2021-09-29T16:24:08Z
2020-09-03T19:00:10Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1088', 'https://github.com/advisories/GHSA-g9wg-wq4f-2x5w'}
null
GHSA
GHSA-m6q5-wv4x-fv6h
Cross-site Scripting in Drupal Core
Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
{'CVE-2020-13668'}
2022-02-26T00:26:28Z
2022-02-12T00:00:47Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13668', 'https://www.drupal.org/sa-core-2020-009', 'https://github.com/advisories/GHSA-m6q5-wv4x-fv6h'}
null
GHSA
GHSA-vwr2-wj63-86gr
Path Traversal in simplehttpserver
All versions of `simplehttpserver` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL. ## Recommendation No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available.
{'CVE-2018-16478'}
2021-09-16T21:00:56Z
2018-12-06T15:49:10Z
MODERATE
0
{'CWE-12', 'CWE-22'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478', 'https://hackerone.com/reports/403703', 'https://github.com/advisories/GHSA-vwr2-wj63-86gr', 'https://www.npmjs.com/advisories/744'}
null
GHSA
GHSA-vqp6-j452-j6wp
Open Redirect in CPython that affects users of OpenStack Nova
A vulnerability was found in CPython which is used by openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
{'CVE-2021-3654'}
2022-03-11T23:28:29Z
2022-03-04T00:00:22Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-vqp6-j452-j6wp', 'https://opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66', 'https://opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251eb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1961439', 'https://www.openwall.com/lists/oss-security/2021/07/29/2', 'https://security.openstack.org/ossa/OSSA-2021-002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3654', 'https://bugs.python.org/issue32084', 'https://bugs.launchpad.net/nova/+bug/1927677'}
null
GHSA
GHSA-ffm7-7r8g-77xm
Exposure of Sensitive Information to an Unauthorized Actor in Apache CXF
Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory’ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.
{'CVE-2020-1954'}
2022-02-11T21:12:50Z
2022-02-10T22:38:50Z
MODERATE
5.3
{'CWE-200'}
{'https://security.netapp.com/advisory/ntap-20220210-0001/', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-ffm7-7r8g-77xm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1954', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
GHSA
GHSA-fg2v-w576-w4v3
Out of bounds read in json-smart
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request.
{'CVE-2021-31684'}
2022-03-25T21:15:50Z
2022-02-10T22:46:22Z
HIGH
7.5
{'CWE-787', 'CWE-125'}
{'https://github.com/netplex/json-smart-v2/issues/67', 'https://github.com/netplex/json-smart-v2/pull/68', 'https://github.com/netplex/json-smart-v1/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31684', 'https://github.com/netplex/json-smart-v1/pull/11', 'https://github.com/advisories/GHSA-fg2v-w576-w4v3', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address this vulnerability.
{'CVE-2021-41236'}
2022-01-06T19:49:02Z
2022-01-06T18:34:35Z
MODERATE
6.9
{'CWE-79'}
{'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}
null
GHSA
GHSA-86pv-95mj-7w5f
Stored XSS vulnerability on Bounce Management Callback
### Impact Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the details page of an affected lead is opened by a Mautic user. An attacker with access to the bounce management callback function (identified with the Mailjet webhook, but it is assumed this will work uniformly across all kinds of webhooks) can inject arbitrary JavaScript Code into the "error" and "error_related_to" parameters of the POST request (POST /mailer/<product / webhook>/callback). It is noted that there is no authentication needed to access this function. The JavaScript Code is stored permanently in the web application and executed every time an authenticated user views the details page of a single contact / lead in Mautic. This means, arbitrary code can be executed to, e.g., steal or tamper with information. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2021-27910'}
2021-09-01T18:40:48Z
2021-09-01T18:40:48Z
HIGH
8.2
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27910', 'https://github.com/advisories/GHSA-86pv-95mj-7w5f', 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'}
null
GHSA
GHSA-7mv4-4xpg-xq44
FormField with square brackets in field name skips validation
FileField with array notation skips validation The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload. PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileField, it will be coerced into allowing multiple files by using this notation. This is not a supported feature, though nothing is done to prevent this. In this scenario, validation such as limiting allowed extensions is not applied, and the FileField->saveInto() behaviour is not triggered. If custom controller logic is used to process the file uploads, it might implicitly rely on validation to be provided by the Form system, which is not the case.
{'CVE-2020-26138'}
2022-03-26T00:32:23Z
2022-03-26T00:14:34Z
MODERATE
5.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26138', 'https://github.com/advisories/GHSA-7mv4-4xpg-xq44', 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'}
null
GHSA
GHSA-w29m-fjp4-qhmq
Unsafe Identifiers in Opencast
### Impact Opencast allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. ### Patches This issue is fixed in Opencast 7.6 and 8.1. ### Workarounds There is no workaround for this. ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5230'}
2021-01-14T17:45:48Z
2020-01-30T21:21:50Z
MODERATE
7.7
{'CWE-99'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5230', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317', 'https://github.com/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq'}
null
GHSA
GHSA-jpj4-5xwp-cv23
Remote code execution in DolphinScheduler
In DolphinScheduler 1.2.0 and 1.2.1, with mysql connectorj a remote code execution vulnerability exists when choosing mysql as database.
{'CVE-2020-11974'}
2022-02-09T22:44:54Z
2022-02-09T22:44:54Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11974', 'https://lists.apache.org/thread.html/rcbe4c248ef0c566e99fd19388a6c92aeef88167286546b675e9b1769%40%3Cdev.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r9fbe24539a873032b3e41243d44a730d6a2aae26335ac1e3271ea47d@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r33452d7b99a293bcf8f3e4bd664943847e2602e03a9e45d09d3f508a@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/ra81adacbfdd6f166f9cf155340674ffd4179386b8b75068639547c11@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://github.com/advisories/GHSA-jpj4-5xwp-cv23'}
null
GHSA
GHSA-2v6x-frw8-7r7f
Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics
A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels, thus inadvertently exposing the secret content in metrics.
{'CVE-2019-17110'}
2021-05-18T15:38:54Z
2021-05-18T15:38:54Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110', 'https://github.com/advisories/GHSA-2v6x-frw8-7r7f', 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}
null
GHSA
GHSA-3w5h-x4rh-hc28
Exposure of sensitive information in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
{'CVE-2021-39231'}
2021-11-23T18:18:25Z
2021-11-23T18:18:25Z
CRITICAL
9.1
{'CWE-668'}
{'http://www.openwall.com/lists/oss-security/2021/11/19/2', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39231', 'https://github.com/advisories/GHSA-3w5h-x4rh-hc28'}
null
GHSA
GHSA-q8q8-93cv-v6h8
Lookup function information discolosure in helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2. ### Impact `lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as part of the process to render templates. The documented behavior of `helm template` states that it does not attach to a remote cluster. However, as the recently added `lookup` template function circumvents this restriction and connects to the cluster even during `helm template` and `helm install|update|delete|rollback --dry-run`. The user is not notified of this behavior. Running `helm template` should not make calls to a cluster. This is different from `install`, which is presumed to have access to a cluster in order to load resources into Kubernetes. Helm 2 is unaffected by this vulnerability. A malicious chart author could inject a `lookup` into a chart that, when rendered through `helm template`, performs unannounced lookups against the cluster a user's `KUBECONFIG` file points to. This information can then be disclosed via the output of `helm template`. ### Patches This issue has been fixed in Helm 3.2.0 ### Workarounds Due to another bug (also fixed in Helm 3.2.0), the command `helm lint` will fail with an error if the `lookup` function is used in a chart. Therefore, run `helm lint` on an untrusted chart before running `helm template`. Alternately, setting the `KUBECONFIG` environment variable to point to an empty Kubernetes configuration file will prevent unintended network connections. Finally, a chart may be manually analyzed for the presence of a `lookup` function in any file in the `templates/` directory. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Helm repository](https://github.com/helm/helm/issues) * For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)
{'CVE-2020-11013'}
2021-05-27T18:44:56Z
2021-05-27T18:44:56Z
HIGH
8.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11013', 'https://github.com/helm/helm/releases/tag/v3.2.0', 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8', 'https://github.com/advisories/GHSA-q8q8-93cv-v6h8', 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008', 'https://github.com/helm/helm/pull/7969'}
null
GHSA
GHSA-xr38-w74q-r8jv
Permissions not properly checked in Invenio-Drafts-Resources
### Impact Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. ### Details The service's ``publish()`` method contains the following permission check: ```python def publish(..): self.require_permission(identity, "publish") ``` However, the record should have been passed into the permission check so that the need generators have access to e.g. the record owner. ```python def publish(..): self.require_permission(identity, "publish", record=record) ``` The bug is activated in Invenio-RDM-Records which has a need generator called ``RecordOwners()``, which when no record is passed in defaults to allow any authenticated user: ```python class RecordOwners(Generator): def needs(self, record=None, **kwargs): if record is None: return [authenticated_user] # ... ``` ### Patches The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6+, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively. You can verify the version installed of Invenio-Drafts-Resources via PIP: ```console cd ~/src/my-site pipenv run pip freeze | grep invenio-drafts-resources ``` ### References - [Security policy](https://invenio.readthedocs.io/en/latest/community/security-policy.html) ### For more information If you have any questions or comments about this advisory: * Chat with us on Discord: https://discord.gg/8qatqBC
{'CVE-2021-43781'}
2022-04-19T19:03:16Z
2021-12-06T23:57:59Z
MODERATE
6.4
{'CWE-862'}
{'https://github.com/advisories/GHSA-xr38-w74q-r8jv', 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781', 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'}
null
GHSA
GHSA-4j82-5ccr-4r8v
`CHECK`-failures in `TensorByteSize` in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures. ```cc int64_t TensorByteSize(const TensorProto& t) { // num_elements returns -1 if shape is not fully defined. int64_t num_elems = TensorShape(t.tensor_shape()).num_elements(); return num_elems < 0 ? -1 : num_elems * DataTypeSize(t.dtype()); } ``` `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what this function needs to be able to return `-1`. ### Patches We have patched the issue in GitHub commit [c2426bba00a01de6913738df8fa78e0215fcce02](https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23582'}
2022-02-11T20:38:32Z
2022-02-10T00:34:01Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50', 'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02', 'https://github.com/advisories/GHSA-4j82-5ccr-4r8v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23582'}
null
GHSA
GHSA-8mrf-64fw-2x75
Command injection in fs-path
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
{'CVE-2020-8298'}
2021-03-25T21:06:41Z
2021-03-25T21:06:41Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7', 'https://hackerone.com/reports/324491', 'https://github.com/pillys/fs-path/pull/6', 'https://github.com/advisories/GHSA-8mrf-64fw-2x75', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'}
null
GHSA
GHSA-v9mf-jgq3-c28h
Data Amplification in Play Framework
An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.
{'CVE-2020-28923'}
2022-02-09T22:54:21Z
2022-02-09T22:54:21Z
LOW
2.7
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28923', 'https://github.com/advisories/GHSA-v9mf-jgq3-c28h', 'https://www.playframework.com/security/vulnerability/CVE-2020-28923-ImproperRemovalofSensitiveInformationBeforeStorageorTransfer', 'https://www.playframework.com/security/vulnerability'}
null
GHSA
GHSA-fpgg-r39h-3x5x
Malicious Package in cxt
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:00:44Z
2020-09-03T17:06:22Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1392', 'https://github.com/advisories/GHSA-fpgg-r39h-3x5x'}
null
GHSA
GHSA-2958-5r4r-wvv6
Directory Traversal in caolilinode
Affected versions of `caolilinode` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16159'}
2021-01-14T15:47:42Z
2020-09-01T17:27:05Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode', 'https://www.npmjs.com/advisories/394', 'https://nodesecurity.io/advisories/394', 'https://github.com/advisories/GHSA-2958-5r4r-wvv6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16159'}
null
GHSA
GHSA-wp47-9r3h-xfgq
Server-Side Request Forgery in Apache Traffic Control
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
{'CVE-2022-23206'}
2022-02-15T00:18:47Z
2022-02-07T00:00:23Z
HIGH
7.5
{'CWE-918'}
{'https://lists.apache.org/thread/lsrd2mqj29vrvwsh8g0d560vvz8n126f', 'https://github.com/advisories/GHSA-wp47-9r3h-xfgq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23206'}
null
GHSA
GHSA-h353-hc43-95vc
Script injection without script or programming rights through Gadget titles
### Impact A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. ### Patches The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for this issue, it is recommended to upgrade XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17794 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki security mailing-list](mailto:security@xwiki.org)
{'CVE-2021-32621'}
2021-06-28T18:40:55Z
2021-05-18T18:36:16Z
HIGH
8.8
{'CWE-94'}
{'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://github.com/advisories/GHSA-h353-hc43-95vc', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vc'}
null
GHSA
GHSA-mhx2-r3jx-g94c
Moderate severity vulnerability that affects org.apache.camel:camel-core
Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query.
{'CVE-2015-0264'}
2021-09-15T20:20:34Z
2018-10-16T23:09:15Z
MODERATE
0
null
{'https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0264', 'http://securitytracker.com/id/1032442', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'https://github.com/advisories/GHSA-mhx2-r3jx-g94c', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-w285-wf9q-5w69
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000352'}
2022-04-27T13:36:22Z
2018-10-17T16:27:38Z
HIGH
7.4
{'CWE-326'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://github.com/advisories/GHSA-w285-wf9q-5w69', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-xfhh-g9f5-x4m4
Resource exhaustion in socket.io-parser
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
{'CVE-2020-36049'}
2021-06-30T16:54:43Z
2021-06-30T16:51:31Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/advisories/GHSA-xfhh-g9f5-x4m4', 'https://www.npmjs.com/package/socket.io-parser', 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2', 'https://github.com/bcaller/kill-engine-io', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049'}
null
GHSA
GHSA-36m4-6v6m-4vpr
Cross-site Scripting in remarkable
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.
{'CVE-2019-12043'}
2021-08-04T14:53:47Z
2019-05-29T18:04:55Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jonschlinkert/remarkable/issues/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12043', 'https://github.com/advisories/GHSA-36m4-6v6m-4vpr'}
null
GHSA
GHSA-6pmv-7pr9-cgrj
Predictable password in Keycloak
A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.
{'CVE-2020-1731'}
2022-01-04T19:48:39Z
2020-04-15T21:09:27Z
CRITICAL
9.8
{'CWE-330', 'CWE-341'}
{'https://github.com/advisories/GHSA-6pmv-7pr9-cgrj', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1731'}
null
GHSA
GHSA-wgw3-gf4p-62xc
Command Injection in wizard-syncronizer
All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-28T16:57:24Z
2020-09-11T21:16:59Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/977', 'https://github.com/advisories/GHSA-wgw3-gf4p-62xc'}
null
GHSA
GHSA-qw9c-8p76-3q2x
Directory Traversal in serve46
Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16148'}
2021-01-14T15:39:53Z
2020-09-01T18:49:11Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/456', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46', 'https://nodesecurity.io/advisories/456', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16148', 'https://github.com/advisories/GHSA-qw9c-8p76-3q2x'}
null
GHSA
GHSA-8g7p-74h8-hg48
Denial of Service in https-proxy-agent
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2018-3739'}
2022-04-19T19:03:26Z
2018-07-27T17:04:52Z
CRITICAL
9.1
{'CWE-400', 'CWE-125'}
{'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://www.npmjs.com/advisories/593', 'https://hackerone.com/reports/319532'}
null
GHSA
GHSA-h8mc-42c3-r72p
Downloads resources over HTTP in hubl-server
Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`. ## Recommendation No patch is currently available for this vulnerability, and it has not seen any updates since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
{'CVE-2017-16035'}
2021-01-08T18:42:17Z
2018-07-24T15:40:47Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/334', 'https://github.com/advisories/GHSA-h8mc-42c3-r72p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035', 'https://www.npmjs.com/advisories/334'}
null
GHSA
GHSA-qg24-8xj4-gj2h
Unaligned memory allocation in chunky
An issue was discovered in the chunky crate through 2020-08-25 for Rust. The Chunk API does not honor an alignment requirement.
{'CVE-2020-36433'}
2021-08-25T20:58:13Z
2021-08-25T20:58:13Z
HIGH
7.5
{'CWE-758'}
{'https://github.com/advisories/GHSA-qg24-8xj4-gj2h', 'https://github.com/aeplay/chunky/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36433', 'https://rustsec.org/advisories/RUSTSEC-2020-0035.html'}
null
GHSA
GHSA-m5wp-p3gj-7q5g
Missing Authorization in Jenkins dbCharts Plugin
A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials.
{'CVE-2022-25206'}
2022-02-26T00:36:26Z
2022-02-16T00:01:16Z
HIGH
8.8
{'CWE-862'}
{'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25206', 'https://github.com/advisories/GHSA-m5wp-p3gj-7q5g'}
null
GHSA
GHSA-qxg5-2qff-p49r
Passing in a non-string 'html' argument can lead to unsanitized output
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. ### Impact XSS ### Patches `3.2.0` ### Workarounds Ensure that the `html` parameter is a string before calling the function.
{'CVE-2021-32696'}
2022-04-19T19:02:59Z
2021-06-18T19:31:35Z
MODERATE
3.7
{'CWE-241', 'CWE-79', 'CWE-843'}
{'https://www.npmjs.com/package/striptags', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r', 'https://github.com/advisories/GHSA-qxg5-2qff-p49r', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'}
null
GHSA
GHSA-c8xp-8mf3-62h9
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values
Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues. ### Patches https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@cloudflare.com](security@cloudflare.com)
{'CVE-2021-3761'}
2022-04-19T19:03:07Z
2021-09-07T23:02:18Z
HIGH
7.5
{'CWE-787', 'CWE-295'}
{'https://github.com/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422', 'https://www.debian.org/security/2022/dsa-5041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0'}
null