ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-7x7c-qm48-pq9c | Cross-site Scripting in karma | karma prior to version 6.3.14 contains a cross-site scripting vulnerability. | {'CVE-2022-0437'} | 2022-02-11T19:59:48Z | 2022-02-06T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a', 'https://github.com/advisories/GHSA-7x7c-qm48-pq9c', 'https://github.com/karma-runner/karma/releases/tag/v6.3.14', 'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885'} | null |
GHSA | GHSA-gf88-j2mg-cc82 | Crash caused by integer conversion to unsigned | ### Impact
An attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments:
```python
import tensorflow as tf
from tensorflow.python.ops import gen_boosted_trees_ops
import numpy as np
v= tf.Variable([0.0, 0.0, 0.0, 0.0, 0.0])
gen_boosted_trees_ops.boosted_trees_create_quantile_stream_resource(
quantile_stream_resource_handle = v.handle,
epsilon = [74.82224],
num_streams = [-49],
max_elements = np.int32(586))
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantile_ops.cc#L96) does not validate that `num_streams` only contains non-negative numbers. In turn, [this results in using this value to allocate memory](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantiles/quantile_stream_resource.h#L31-L40):
```cc
class BoostedTreesQuantileStreamResource : public ResourceBase {
public:
BoostedTreesQuantileStreamResource(const float epsilon,
const int64 max_elements,
const int64 num_streams)
: are_buckets_ready_(false),
epsilon_(epsilon),
num_streams_(num_streams),
max_elements_(max_elements) {
streams_.reserve(num_streams_);
...
}
}
```
However, `reserve` receives an unsigned integer so there is an implicit conversion from a negative value to a large positive unsigned. This results in a crash from the standard library.
### Patches
We have patched the issue in GitHub commit [8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992](https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37661'} | 2021-08-25T14:42:28Z | 2021-08-25T14:42:28Z | MODERATE | 5.5 | {'CWE-681'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82', 'https://github.com/advisories/GHSA-gf88-j2mg-cc82', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37661', 'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'} | null |
GHSA | GHSA-82rr-mq4r-p4r3 | SQL injection in francoisjacquet/rosariosis | An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php. | {'CVE-2021-44567'} | 2022-03-04T21:39:01Z | 2022-02-25T00:01:08Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://gitlab.com/francoisjacquet/rosariosis/-/issues/308', 'https://github.com/advisories/GHSA-82rr-mq4r-p4r3', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/519af055a4fdc1362657d75bca76f9c95a081eaa', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567'} | null |
GHSA | GHSA-q948-x8rf-888m | os_str_bytes relies on undefined behavior of `char::from_u32_unchecked` | An issue was discovered in the os_str_bytes crate before 2.0.0 for Rust. It has false expectations about char::from_u32_unchecked behavior. | {'CVE-2020-35865'} | 2021-08-25T20:47:55Z | 2021-08-25T20:47:55Z | HIGH | 7.5 | {'CWE-704'} | {'https://github.com/advisories/GHSA-q948-x8rf-888m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35865', 'https://github.com/dylni/os_str_bytes/pull/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0012.html'} | null |
GHSA | GHSA-8hj4-w233-g35q | Downloads Resources over HTTP in react-native-baidu-voice-synthesizer | Affected versions of `react-native-baidu-voice-synthesizer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `react-native-baidu-voice-synthesizer`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10697'} | 2021-01-08T19:09:28Z | 2018-07-31T22:47:16Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/302', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10697', 'https://www.npmjs.com/advisories/302', 'https://github.com/advisories/GHSA-8hj4-w233-g35q'} | null |
GHSA | GHSA-chqj-j4fh-rw7m | Cross-Site Scripting in dompurify | Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations:
```DOMPurify.sanitize(input, {
FORBID_TAGS: ['svg', 'math']
});``` | {'CVE-2019-16728'} | 2021-01-08T21:22:25Z | 2020-08-28T21:25:11Z | CRITICAL | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16728', 'https://www.npmjs.com/advisories/1205', 'https://research.securitum.com/dompurify-bypass-using-mxss/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/advisories/GHSA-chqj-j4fh-rw7m'} | null |
GHSA | GHSA-q77q-vx4q-xx6q | Cross-site Scripting in org.owasp.esapi:esapi | ### Impact
There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details.
### Patches
Patched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.
### Workarounds
Manually edit your **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression as per remediation instructions in the reference below.
### References
[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)
### For more information
If you have any questions or comments about this advisory:
* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders".
* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
| {'CVE-2022-24891'} | 2022-05-08T18:41:54Z | 2022-04-27T21:09:46Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf', 'https://github.com/advisories/GHSA-q77q-vx4q-xx6q', 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'} | null |
GHSA | GHSA-c3x7-gjmx-r2ff | Open Redirect in serve-static | Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory.
## Proof of Concept
A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e`
Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect.
## Recommendation
Version 1.7.x: Update to version 1.7.2 or later.
Version 1.6.x: Update to version 1.6.5 or later. | {'CVE-2015-1164'} | 2021-09-23T20:59:31Z | 2020-08-31T22:57:02Z | LOW | 3.1 | {'CWE-601'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1181917', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1164', 'https://www.npmjs.com/advisories/35', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99936', 'https://github.com/advisories/GHSA-c3x7-gjmx-r2ff', 'https://github.com/expressjs/serve-static/issues/26', 'http://www.securityfocus.com/bid/72064', 'https://snyk.io/vuln/npm:serve-static:20150113', 'http://nodesecurity.io/advisories/serve-static-open-redirect'} | null |
GHSA | GHSA-r56q-vv3c-6g9c | Improper sanitization of delegated role names | ### Impact
The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system.
AWS would like to thank https://github.com/jku for reporting this issue.
### Patches
A fix is available in version 0.12.0.
### Workarounds
No workarounds to this issue are known.
### References
https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
| {'CVE-2021-41150'} | 2021-10-20T15:38:21Z | 2021-10-19T20:16:26Z | HIGH | 8.2 | {'CWE-22'} | {'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/awslabs/tough/security/advisories/GHSA-r56q-vv3c-6g9c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150', 'https://github.com/advisories/GHSA-r56q-vv3c-6g9c', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'} | null |
GHSA | GHSA-g27j-74fp-xfpr | Insecure default value for CORS configuration | ### Impact
The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed.
### Patches
The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0
### Workarounds
Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [directus/directus](https://github.com/directus/directus)
* Email us at [security@directus.io](mailto:security@directus.io)
| {'CVE-2022-26969'} | 2022-04-06T18:48:15Z | 2022-04-05T18:31:22Z | HIGH | 8.3 | null | {'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr', 'https://github.com/directus/directus/pull/12022', 'https://github.com/advisories/GHSA-g27j-74fp-xfpr'} | null |
GHSA | GHSA-f366-4rvv-95x2 | Buffer overflow in deprecated USB HALs and stack overflow in USB enumeration | ### Impact
1) If an application is making use of the deprecated kit protocol HALs as the communication channel to the target device an attacker can masquerade as a device and return malformed packets of arbitrary length which the protocol stack will write to the stack. HALs intended for production use are unaffected (I2C, SWI, & SPI) as well as the hidapi HAL (hal_all_platforms_kit_hidapi.c).
2) The hidapi HAL can be made to overrun the application stack by attaching more than 10 (real or virtual) devices likely resulting in an application crash as this does not allow arbitrary data to be written to the stack.
### Patches
USB kit enumeration has been patched in v3.2.3 for the hidapi HAL (hal_all_platforms_kit_hidapi.c).
### Removal of deprecated HALs
Deprecated usb kit HALs have been removed in v3.2.3.
### Workarounds
This vulnerability is limited to users of the kit protocol which is used with Microchip kits and kit firmware to bridge communication from USB-HID to I2C or SWI. It is not expected that kits would be used in an production environment. This is an optional component for users as well so they can always compile the library without the usb support option.
### Special python packaging notes
The python package for cryptoauthlib uses date codes for identifying versions. The patched version for python packages is 20200912
### References
Please see [Microchip PSIRT](https://www.microchip.com/design-centers/embedded-security/how-to-report-potential-product-security-vulnerabilities) for Microchip's security policy and reporting procedures
### Credits
Special thanks to Ruben Santamarta of [IOActive](https://blogs.ioactive.com/) for reporting | null | 2021-10-04T21:23:53Z | 2020-10-02T16:33:19Z | LOW | 0 | {'CWE-120'} | {'https://github.com/advisories/GHSA-f366-4rvv-95x2', 'https://github.com/MicrochipTech/cryptoauthlib/security/advisories/GHSA-f366-4rvv-95x2'} | null |
GHSA | GHSA-ff2r-xpwq-6whj | Use of Uninitialized Resource in gfx-auxil | An issue was discovered in the gfx-auxil crate through 2021-01-07 for Rust. gfx_auxil::read_spirv may read from uninitialized memory locations. | {'CVE-2021-45689'} | 2022-01-07T17:18:43Z | 2022-01-06T22:12:14Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0091.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/gfx-auxil/RUSTSEC-2021-0091.md', 'https://github.com/advisories/GHSA-ff2r-xpwq-6whj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45689'} | null |
GHSA | GHSA-pfjj-m3jj-9jc9 | Undefined behavior in `SparseTensorSliceDataset` | ### Impact
The [implementation of `SparseTensorSliceDataset`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292) has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseTensorSliceDataset(
indices=[[]],
values=[],
dense_shape=[1,1])
```
The 3 input arguments represent a sparse tensor. However, there are some preconditions that these arguments must satisfy but these are not validated in the implementation.
### Patches
We have patched the issue in GitHub commit [965b97e4a9650495cda5a8c210ef6684b4b9eceb](https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia. | {'CVE-2022-21736'} | 2022-02-11T16:24:04Z | 2022-02-09T23:43:27Z | HIGH | 7.6 | {'CWE-476'} | {'https://github.com/advisories/GHSA-pfjj-m3jj-9jc9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21736', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292', 'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9'} | null |
GHSA | GHSA-c2m4-w5hm-vqjw | Hijacked Environment Variables in crossenv | The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16074'} | 2021-01-08T19:01:02Z | 2018-08-29T23:05:46Z | MODERATE | 0 | {'CWE-506'} | {'https://www.npmjs.com/advisories/513', 'https://nodesecurity.io/advisories/513', 'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074'} | null |
GHSA | GHSA-7vph-p634-vrqf | Command Injection in RaspAP 2.6.6 | includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection. | {'CVE-2021-38556'} | 2021-09-03T20:35:53Z | 2021-09-02T17:11:00Z | HIGH | 8.8 | {'CWE-77'} | {'https://github.com/RaspAP/raspap-webgui', 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php', 'https://github.com/advisories/GHSA-7vph-p634-vrqf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38556', 'https://zerosecuritypenetrationtesting.com/?page_id=306'} | null |
GHSA | GHSA-c722-pv5w-cfg2 | Malicious Package in github-jquery-widgets | Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-11T21:20:14Z | 2020-09-11T21:20:14Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-c722-pv5w-cfg2', 'https://www.npmjs.com/advisories/933'} | null |
GHSA | GHSA-93p5-8fqw-wjx3 | Authentication bypass by capture-replay in github.com/cosmos/ethermint | Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application. | {'CVE-2021-25834'} | 2022-04-12T22:56:36Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-287', 'CWE-294'} | {'https://github.com/cosmos/ethermint/issues/686', 'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/advisories/GHSA-93p5-8fqw-wjx3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'} | null |
GHSA | GHSA-ph3v-2hq5-5qfq | Code injection in RazorEngine | In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | {'CVE-2021-46703'} | 2022-04-19T19:03:27Z | 2022-03-07T00:00:41Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-ph3v-2hq5-5qfq', 'https://github.com/Antaris/RazorEngine/issues/585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'} | null |
GHSA | GHSA-qhmp-h54x-38qr | CWE-730 Regex injection with IFTTT Plugin | ### Impact
Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service.
### Patches
Update to Apprise v0.9.5.1
```bash
# Install Apprise v0.9.5.1 from PyPI
pip install apprise==0.9.5.1
```
The patch to the problem was performed [here](https://github.com/caronc/apprise/pull/436/files).
### Workarounds
Alternatively, if upgrading is not an option, you can safely remove the following file:
- `apprise/plugins/NotifyIFTTT.py`
The above will eliminate the ability to use IFTTT, but everything else will work smoothly.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Apprise](https://github.com/caronc/apprise/issues)
* Email me at [lead2gold@gmail.com](mailto:lead2gold@gmail.com)
### Additional Credit
Github would not allow me to additionally credit **Rasmus Petersen**, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited
## Additional Notes:
- Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)
| {'CVE-2021-39229'} | 2022-04-19T19:03:09Z | 2021-09-20T20:57:02Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831', 'https://github.com/advisories/GHSA-qhmp-h54x-38qr', 'https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr', 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39229', 'https://github.com/caronc/apprise/releases/tag/v0.9.5.1', 'https://github.com/caronc/apprise/pull/436'} | null |
GHSA | GHSA-cjg2-2fjg-fph4 | Integer underflow in Frontier | ### Impact
A bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. It is recommended that you apply the patch as soon as possible.
If you do not use MODEXP precompile in your runtime, then you are not impacted.
### Patches
Patches are applied in PR #549.
### Workarounds
None.
### References
Patch PR: #549
### Credits
Thanks to SR-Labs for discovering the security vulnerability, and thanks to PureStake team for the patches.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Frontier repo](https://github.com/paritytech/frontier)
| {'CVE-2022-21685'} | 2022-01-15T00:03:46Z | 2022-01-14T21:03:36Z | MODERATE | 0 | {'CWE-191'} | {'https://github.com/paritytech/frontier/pull/549', 'https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4', 'https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664', 'https://github.com/advisories/GHSA-cjg2-2fjg-fph4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21685'} | null |
GHSA | GHSA-qm28-7hqv-wg5j | OS Command Injection in ng-packagr | The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option. | {'CVE-2020-7735'} | 2021-10-05T16:28:06Z | 2021-05-07T16:47:32Z | MODERATE | 6.6 | {'CWE-78'} | {'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735', 'https://github.com/advisories/GHSA-qm28-7hqv-wg5j', 'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427'} | null |
GHSA | GHSA-352p-rhvq-7g78 | Null pointer deference in av-data | An issue was discovered in the av-data crate before 0.3.0 for Rust. A raw pointer is dereferenced, leading to a read of an arbitrary memory address, sometimes causing a segfault. | {'CVE-2021-25904'} | 2021-08-25T20:52:55Z | 2021-08-25T20:52:55Z | HIGH | 7.5 | {'CWE-476'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0007.html', 'https://github.com/advisories/GHSA-352p-rhvq-7g78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25904', 'https://github.com/rust-av/rust-av/issues/136'} | null |
GHSA | GHSA-p5hj-xxfr-pwc3 | Code Injection in microweber | Code Injection in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0282'} | 2022-01-27T18:32:44Z | 2022-01-21T18:02:39Z | HIGH | 7.5 | {'CWE-94'} | {'https://github.com/advisories/GHSA-p5hj-xxfr-pwc3', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282'} | null |
GHSA | GHSA-r496-7hgp-53wf | Vulnerability in dump function leads to arbitrary code execution via filePath parameters | aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | {'CVE-2020-36377'} | 2022-05-05T13:47:47Z | 2021-11-02T15:42:24Z | CRITICAL | 9.8 | {'CWE-77', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36377', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/advisories/GHSA-r496-7hgp-53wf'} | null |
GHSA | GHSA-2r4h-2ghh-5hpx | Directory Traversal in weather.swlyons | Affected versions of `weather.swlyons` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16110'} | 2021-01-14T15:50:49Z | 2020-09-01T17:18:33Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-2r4h-2ghh-5hpx', 'https://www.npmjs.com/advisories/379', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16110', 'https://nodesecurity.io/advisories/379', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons'} | null |
GHSA | GHSA-3qp6-m7hp-jrwf | Cross-site Scripting in Apache Pluto | The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks. | {'CVE-2021-36739'} | 2022-01-08T00:46:21Z | 2022-01-08T00:46:21Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-3qp6-m7hp-jrwf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36739', 'https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p'} | null |
GHSA | GHSA-jv64-2m3x-6v4q | Cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS | A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects". | {'CVE-2021-41948'} | 2022-05-04T18:10:43Z | 2022-04-30T00:00:36Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/intelliants/subrion-plugin-contact_us/issues/8', 'https://github.com/advisories/GHSA-jv64-2m3x-6v4q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'} | null |
GHSA | GHSA-vwjj-2852-3765 | Cross-Site Scripting in forms | Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting.
## Recommendation
Update to version 1.3.0 or later. | {'CVE-2017-16015'} | 2021-01-08T01:57:11Z | 2018-11-09T17:46:27Z | MODERATE | 0 | {'CWE-80'} | {'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d', 'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://nodesecurity.io/advisories/158', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://www.npmjs.com/advisories/158'} | null |
GHSA | GHSA-7vwg-39h8-8qp8 | /user/sessions endpoint allows detecting valid accounts | This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc | null | 2021-03-11T17:42:01Z | 2021-03-11T17:42:01Z | HIGH | 0 | {'CWE-203'} | {'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933', 'https://github.com/advisories/GHSA-7vwg-39h8-8qp8', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'} | null |
GHSA | GHSA-v633-x5vv-hqwc | Cross-Site Scripting in serve-index | Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application.
## Recommendation
Update to version 1.6.3 or later. | {'CVE-2015-8856'} | 2021-09-20T15:12:26Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/expressjs/serve-index/issues/28', 'https://nodesecurity.io/advisories/34', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856', 'https://github.com/advisories/GHSA-v633-x5vv-hqwc', 'https://www.npmjs.com/advisories/34', 'http://www.securityfocus.com/bid/96392', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'} | null |
GHSA | GHSA-53mj-mc38-q894 | Remote Memory Exposure in openwhisk | Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure.
When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded).
Proof of concept:
```js
var openwhisk = require('openwhisk');
var options = {
apihost: '127.0.0.1:1433',
api_key: USERSUPPLIEDINPUT // number
};
var ow = openwhisk(options);
ow.actions.invoke({actionName: 'sample'}).then(result => console.log(result))
```
## Recommendation
Update to version 3.3.1 or later. | null | 2021-09-24T14:29:03Z | 2020-09-01T19:40:41Z | MODERATE | 0 | null | {'https://github.com/openwhisk/openwhisk-client-js/pull/34', 'https://www.npmjs.com/advisories/600', 'https://github.com/advisories/GHSA-53mj-mc38-q894'} | null |
GHSA | GHSA-g4rw-8m5q-6453 | Out of bounds access in rgb | A safety violation was discovered in the rgb crate before 0.8.20 for Rust, leading to (for example) dereferencing of arbitrary pointers or disclosure of uninitialized memory. This occurs because structs can be treated as bytes for read and write operations. | {'CVE-2020-25016'} | 2021-08-25T20:45:12Z | 2021-08-25T20:45:12Z | CRITICAL | 9.1 | {'CWE-119', 'CWE-843'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0029.html', 'https://github.com/advisories/GHSA-g4rw-8m5q-6453', 'https://github.com/kornelski/rust-rgb/issues/35', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25016'} | null |
GHSA | GHSA-gpqq-952q-5327 | XSS in the `of` option of the `.position()` util in jquery-ui | ### Impact
Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code:
```js
$( "#element" ).position( {
my: "left top",
at: "right bottom",
of: "<img onerror='window.globalOf=true' src='/404' />",
collision: "none"
} );
```
will call the `doEvilThing()` function.
### Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector.
### Workarounds
A workaround is to not accept the value of the `of` option from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue. | {'CVE-2021-41184'} | 2022-04-22T15:40:38Z | 2021-10-26T14:55:12Z | MODERATE | 6.5 | {'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-core-2022-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184', 'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://github.com/advisories/GHSA-gpqq-952q-5327', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'} | null |
GHSA | GHSA-ff6g-gm92-rf32 | Malicious Package in coinstirng | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:58:20Z | 2020-09-03T19:42:06Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-ff6g-gm92-rf32', 'https://www.npmjs.com/advisories/1383'} | null |
GHSA | GHSA-w3j4-76qw-wwjm | Older releases of better_errors open to Cross-Site Request Forgery attack | ### Impact
better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks.
_As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._
### Patches
Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".
### Workarounds
There are no known workarounds to mitigate the risk of using older releases of better_errors.
### References
- Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/)
### For more information
If you have any questions or comments about this advisory, please
- Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507)
- Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
| {'CVE-2021-39197'} | 2022-04-19T19:03:07Z | 2021-09-07T23:08:24Z | MODERATE | 6.3 | {'CWE-352'} | {'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197', 'https://github.com/BetterErrors/better_errors/discussions/507', 'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/better_errors/pull/474'} | null |
GHSA | GHSA-6jm6-cmcp-fqjq | Nomad Spread Job Stanza May Trigger Panic in Servers | Nomad and Nomad Enterprise allows operators with job-submit capabilities to use the spread stanza in a way such that it can cause panic in Nomad servers. This vulnerability, CVE-2022-24684, was fixed in Nomad 1.0.18, 1.1.12, and 1.2.6. | {'CVE-2022-24684'} | 2022-04-05T21:09:26Z | 2022-02-16T00:01:42Z | MODERATE | 6.5 | {'CWE-400'} | {'https://security.netapp.com/advisory/ntap-20220318-0008/', 'https://github.com/advisories/GHSA-6jm6-cmcp-fqjq', 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/35562', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24684'} | null |
GHSA | GHSA-xq5j-gw7f-jgj8 | CSRF Vulnerability in rails-ujs | There is an vulnerability in rails-ujs that allows attackers to send
CSRF tokens to wrong domains.
Versions Affected: rails <= 6.0.3
Not affected: Applications which don't use rails-ujs.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or
the action attribute of a form tag that will trigger a POST action, the attacker can set the
href or action to a cross-origin URL, and the CSRF token will be sent.
Workarounds
-----------
To work around this problem, change code that allows users to control the href attribute of an anchor
tag or the action attribute of a form tag to filter the user parameters.
For example, code like this:
link_to params
to code like this:
link_to filtered_params
def filtered_params
# Filter just the parameters that you trust
end | {'CVE-2020-8167'} | 2021-10-22T13:57:54Z | 2020-07-07T16:34:10Z | MODERATE | 6.5 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8167', 'https://github.com/advisories/GHSA-xq5j-gw7f-jgj8', 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0', 'https://www.debian.org/security/2020/dsa-4766', 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml', 'https://hackerone.com/reports/189878'} | null |
GHSA | GHSA-7ghq-fvr3-pj2x | Incomplete validation in `MaxPoolGrad` | ### Impact
An attacker can trigger a denial of service via a segmentation fault in `tf.raw_ops.MaxPoolGrad` caused by missing validation:
```python
import tensorflow as tf
tf.raw_ops.MaxPoolGrad(
orig_input = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
orig_output = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
grad = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
ksize = [1, 16, 16, 1],
strides = [1, 16, 18, 1],
padding = "EXPLICIT",
explicit_paddings = [0, 0, 14, 3, 15, 5, 0, 0])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/maxpooling_op.cc) misses some validation for the `orig_input` and `orig_output` tensors.
The fixes for [CVE-2021-29579](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md) were incomplete.
### Patches
We have patched the issue in GitHub commit [136b51f10903e044308cf77117c0ed9871350475](https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security. | {'CVE-2021-37674'} | 2021-08-25T14:41:33Z | 2021-08-25T14:41:33Z | MODERATE | 5.5 | {'CWE-20'} | {'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475', 'https://github.com/advisories/GHSA-7ghq-fvr3-pj2x', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37674', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x'} | null |
GHSA | GHSA-jwfh-j623-m97h | Use of Uninitialized Resource in messagepack-rs | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations. | {'CVE-2021-45691'} | 2022-01-07T17:12:55Z | 2022-01-06T22:12:35Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://github.com/advisories/GHSA-jwfh-j623-m97h', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45691'} | null |
GHSA | GHSA-gfhx-jjwq-63gv | Cross-site Scripting in Apereo CAS | Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. | {'CVE-2021-42567'} | 2021-12-10T20:24:11Z | 2021-12-10T20:24:11Z | MODERATE | 0 | {'CWE-79'} | {'https://apereo.github.io/2021/10/18/restvuln/', 'https://github.com/apereo/cas/releases', 'https://github.com/advisories/GHSA-gfhx-jjwq-63gv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42567'} | null |
GHSA | GHSA-xfxf-qw26-hr33 | Arbitrary command execution in roar-pidusage | This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | {'CVE-2021-23380'} | 2021-05-06T15:55:43Z | 2021-05-06T15:55:43Z | MODERATE | 5.6 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23380', 'https://github.com/advisories/GHSA-xfxf-qw26-hr33', 'https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528', 'https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103'} | null |
GHSA | GHSA-h3c2-x77c-7pvr | High severity vulnerability that affects git-dummy-commit | A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter. | {'CVE-2018-3785'} | 2021-01-08T18:43:49Z | 2018-08-21T17:03:33Z | HIGH | 0 | {'CWE-78'} | {'https://hackerone.com/reports/341710', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3785', 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'} | null |
GHSA | GHSA-79mg-4w23-4fqc | Unauthenticated SQL Injection in Cachet | ### Impact
In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session.
### Patches
The original repository of [https://github.com/CachetHQ/Cachet](https://github.com/CachetHQ/Cachet) is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
Update to version 2.5 or later in the [https://github.com/fiveai/Cachet fork](https://github.com/fiveai/Cachet) to fix this vulnerability. | {'CVE-2021-39165'} | 2022-04-19T19:03:05Z | 2021-08-30T16:12:58Z | HIGH | 8.1 | {'CWE-89', 'CWE-287'} | {'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6', 'https://github.com/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc'} | null |
GHSA | GHSA-6rrw-4fm9-rghv | Use of Hard-coded Cryptographic Key in Netmaker | Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key. | {'CVE-2022-0664'} | 2022-02-26T01:51:36Z | 2022-02-19T00:01:36Z | HIGH | 8.8 | {'CWE-321'} | {'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf', 'https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664', 'https://github.com/advisories/GHSA-6rrw-4fm9-rghv'} | null |
GHSA | GHSA-mm33-5vfq-3mm3 | XSS Vulnerability in Action Pack | There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been
assigned the CVE identifier CVE-2022-22577.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
CSP headers were only sent along with responses that Rails considered as
"HTML" responses. This left API requests without CSP headers, which could
possibly expose users to XSS attacks.
## Releases
The FIXED releases are available at the normal locations.
## Workarounds
Set a CSP for your API responses manually. | {'CVE-2022-22577'} | 2022-04-27T23:00:14Z | 2022-04-27T22:28:59Z | HIGH | 0 | {'CWE-79'} | {'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI', 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577', 'https://github.com/rails/rails/pull/44635', 'https://github.com/advisories/GHSA-mm33-5vfq-3mm3'} | null |
GHSA | GHSA-9722-rr68-rfpg | Upload whitelisted files to any directory in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1241" alt="Screen Shot 2020-03-31 at 12 21 10 PM" src="https://user-images.githubusercontent.com/7253840/78061230-255f5400-734a-11ea-92b4-1120f6960505.png"> | {'CVE-2020-5297'} | 2022-04-19T19:02:26Z | 2020-06-03T21:58:27Z | LOW | 3.4 | {'CWE-73'} | {'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5297', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/advisories/GHSA-9722-rr68-rfpg', 'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8'} | null |
GHSA | GHSA-rrp4-2xx3-mv29 | Command injection in gh-ost | Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter.
This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-ost` to the attack's malicious MySQL server.
### Impact
This issue may lead to arbitrary local file read.
### Patches
Fixed in 1.1.3+.
### Workarounds
None
### References
- https://advisory.dw1.io/51
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github/gh-ost](http://github.com/github/gh-ost) | {'CVE-2022-21687'} | 2022-04-19T19:03:19Z | 2022-02-01T00:47:33Z | MODERATE | 6.8 | {'CWE-74', 'CWE-20'} | {'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f', 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21687', 'https://github.com/advisories/GHSA-rrp4-2xx3-mv29'} | null |
GHSA | GHSA-qmm9-x5gr-4gfm | Open Redirect in hekto | Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename.
## Recommendation
Update to version 0.2.4 or later. | {'CVE-2018-3743'} | 2021-01-08T01:58:33Z | 2018-07-18T21:20:12Z | LOW | 0 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3743', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://www.npmjs.com/advisories/669', 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://hackerone.com/reports/320693'} | null |
GHSA | GHSA-5r76-cjf4-c9qx | Moderate severity vulnerability that affects mayan-edms | An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafted cabinet label. | {'CVE-2018-16406'} | 2021-09-01T22:20:48Z | 2018-09-06T03:24:57Z | MODERATE | 6.1 | {'CWE-79'} | {'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst', 'https://github.com/advisories/GHSA-5r76-cjf4-c9qx', 'https://gitlab.com/mayan-edms/mayan-edms/issues/495', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16406', 'https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32'} | null |
GHSA | GHSA-2pqj-h3vj-pqgw | Cross-Site Scripting in jquery | Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution.
## Proof of Concept
```
$("#log").html(
$("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html()
);
```
## Recommendation
Update to version 1.9.0 or later. | {'CVE-2012-6708'} | 2021-09-15T15:21:02Z | 2020-09-01T16:41:46Z | HIGH | 0 | {'CWE-64', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2012-6708', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011', 'https://bugs.jquery.com/ticket/6429', 'https://snyk.io/vuln/npm:jquery:20120206', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://bugs.jquery.com/ticket/12531', 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'http://www.securityfocus.com/bid/102792', 'https://bugs.jquery.com/ticket/9521', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://www.npmjs.com/advisories/329', 'https://github.com/advisories/GHSA-2pqj-h3vj-pqgw', 'https://bugs.jquery.com/ticket/11290'} | null |
GHSA | GHSA-5wmg-j84w-4jj4 | Arbitrary File Write via Archive Extraction in mholt/archiver | mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002207'} | 2022-04-12T22:36:10Z | 2022-02-15T01:57:18Z | MODERATE | 5.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207', 'https://snyk.io/research/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARCHIVER-50071', 'https://github.com/mholt/archiver/pull/65', 'https://github.com/advisories/GHSA-5wmg-j84w-4jj4', 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3', 'https://github.com/snyk/zip-slip-vulnerability'} | null |
GHSA | GHSA-r92x-f52r-x54g | regular expression denial of service (ReDoS) | date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2. | {'CVE-2020-26289'} | 2021-01-07T22:33:13Z | 2020-12-24T20:49:02Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g', 'https://www.npmjs.com/package/date-and-time', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://github.com/advisories/GHSA-r92x-f52r-x54g', 'https://www.npmjs.com/advisories/1592'} | null |
GHSA | GHSA-cggj-fvv3-cqwv | FasterXML jackson-databind allows unauthenticated remote code execution | FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath. | {'CVE-2018-7489'} | 2022-04-26T18:57:07Z | 2018-10-16T17:45:18Z | CRITICAL | 9.8 | {'CWE-184', 'CWE-502'} | {'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2018:2938', 'https://access.redhat.com/errata/RHSA-2018:2090', 'http://www.securityfocus.com/bid/103203', 'https://access.redhat.com/errata/RHSA-2018:2089', 'http://www.securitytracker.com/id/1041890', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://security.netapp.com/advisory/ntap-20180328-0001/', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securitytracker.com/id/1040693', 'https://github.com/advisories/GHSA-cggj-fvv3-cqwv', 'https://www.debian.org/security/2018/dsa-4190', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7489', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/1931', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1786', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2088', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'} | null |
GHSA | GHSA-jp9g-5x75-ccp8 | Malicious Package in colro-name | Version 9.0.0 of `colro-name` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:48:25Z | 2020-09-02T21:34:30Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/902', 'https://github.com/advisories/GHSA-jp9g-5x75-ccp8'} | null |
GHSA | GHSA-m2w9-rm58-mhm9 | Downloads Resources over HTTP in node-thulac | Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10640'} | 2021-01-08T18:32:05Z | 2019-02-18T23:47:06Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-m2w9-rm58-mhm9', 'https://nodesecurity.io/advisories/236', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10640', 'https://www.npmjs.com/advisories/236'} | null |
GHSA | GHSA-vj62-g63v-f8mf | Validity check missing in Frontier | ### Impact
In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block.
The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors.
### Patches
The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba.
### References
Patch PR: https://github.com/paritytech/frontier/pull/495
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues)
### Special thanks
Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability. | {'CVE-2021-41138'} | 2021-10-14T20:03:54Z | 2021-10-13T18:53:38Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/paritytech/frontier/pull/497', 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v-f8mf', 'https://github.com/paritytech/frontier/pull/495', 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41138', 'https://github.com/advisories/GHSA-vj62-g63v-f8mf'} | null |
GHSA | GHSA-x3r5-q6mj-m485 | Improper sanitization of target names | ### Impact
The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system.
AWS would like to thank https://github.com/jku for reporting this issue.
### Patches
A fix is available in version 0.12.0.
### Workarounds
No workarounds to this issue are known.
| {'CVE-2021-41149'} | 2021-10-20T15:39:06Z | 2021-10-19T20:16:15Z | HIGH | 8.2 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41149', 'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485', 'https://github.com/advisories/GHSA-x3r5-q6mj-m485', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'} | null |
GHSA | GHSA-j756-f273-xhp4 | Import token permissions checking not enforced | (This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>)
## Problem Description
The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the
relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission.
The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token.
As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the
importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token.
The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs.
The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library.
## Affected versions
#### JWT library
* all versions prior to 2.0.1
* fixed after nats-io/jwt#149 landed (2021-03-14)
#### NATS Server
* Version 2 prior to 2.2.0
+ 2.0.0 through and including 2.1.9 are vulnerable
* fixed with nats-io/nats-server@423b79440c (2021-03-14)
## Impact
In deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects.
Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse.
## Workaround
Deny access to clients to update their account JWT in the account server.
## Solution
Upgrade the JWT dependency in any application using it.
Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though).
Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at <https://gist.github.com/philpennock/09d49524ad98043ff11d8a40c2bb0d5a>. | null | 2021-05-21T16:22:20Z | 2021-05-21T16:22:20Z | CRITICAL | 7.5 | {'CWE-863'} | {'https://github.com/advisories/GHSA-j756-f273-xhp4', 'https://github.com/nats-io/nats-server/security/advisories/GHSA-j756-f273-xhp4'} | null |
GHSA | GHSA-j68r-23hj-xf9c | Hijacked Environment Variables in node-openssl | The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16064'} | 2021-01-08T20:56:55Z | 2018-10-10T17:28:14Z | MODERATE | 0 | {'CWE-506'} | {'https://nodesecurity.io/advisories/503', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064', 'https://www.npmjs.com/advisories/503', 'https://github.com/advisories/GHSA-j68r-23hj-xf9c'} | null |
GHSA | GHSA-8xjq-8fcg-g5hw | Out-of-bounds Write in Pillow | An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size. | {'CVE-2021-25290'} | 2021-12-06T21:37:00Z | 2021-03-29T16:35:36Z | HIGH | 7.5 | {'CWE-787'} | {'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-8xjq-8fcg-g5hw', 'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25290'} | null |
GHSA | GHSA-xgc3-m89p-vr3x | Heap buffer overflow in `Conv2DBackpropFilter` | ### Impact
An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`:
```python
import tensorflow as tf
input_tensor = tf.constant([386.078431372549, 386.07843139643234],
shape=[1, 1, 1, 2], dtype=tf.float32)
filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32)
out_backprop = tf.constant([386.078431372549], shape=[1, 1, 1, 1],
dtype=tf.float32)
tf.raw_ops.Conv2DBackpropFilter(
input=input_tensor,
filter_sizes=filter_sizes,
out_backprop=out_backprop,
strides=[1, 66, 49, 1],
use_cudnn_on_gpu=True,
padding='VALID',
explicit_paddings=[],
data_format='NHWC',
dilations=[1, 1, 1, 1]
)
```
Alternatively, passing empty tensors also results in similar behavior:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 1, 1, 5], dtype=tf.float32)
filter_sizes = tf.constant([3, 8, 1, 1], shape=[4], dtype=tf.int32)
out_backprop = tf.constant([], shape=[0, 1, 1, 1], dtype=tf.float32)
tf.raw_ops.Conv2DBackpropFilter(
input=input_tensor,
filter_sizes=filter_sizes,
out_backprop=out_backprop,
strides=[1, 66, 49, 1],
use_cudnn_on_gpu=True,
padding='VALID',
explicit_paddings=[],
data_format='NHWC',
dilations=[1, 1, 1, 1]
)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor.
### Patches
We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29540'} | 2021-05-21T14:23:09Z | 2021-05-21T14:23:09Z | LOW | 2.5 | {'CWE-787', 'CWE-120'} | {'https://github.com/advisories/GHSA-xgc3-m89p-vr3x', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29540'} | null |
GHSA | GHSA-cj6j-32rg-45r2 | Cross-site Scripting in JSPWiki | A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | {'CVE-2019-10077'} | 2021-08-04T19:54:09Z | 2019-06-06T15:29:25Z | MODERATE | 6.1 | {'CWE-79'} | {'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10077', 'https://github.com/advisories/GHSA-cj6j-32rg-45r2'} | null |
GHSA | GHSA-3c45-wgjp-7v9r | A single version of twisted does not respect the trustedRoot setting | Python Twisted 14.0 trustRoot is not respected in HTTP client | {'CVE-2014-7143'} | 2021-08-19T16:07:48Z | 2019-12-17T22:52:34Z | HIGH | 7.5 | {'CWE-295'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-7143', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96135', 'https://github.com/advisories/GHSA-3c45-wgjp-7v9r', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7143', 'http://www.openwall.com/lists/oss-security/2014/09/22/2', 'https://security-tracker.debian.org/tracker/CVE-2014-7143', 'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'} | null |
GHSA | GHSA-pq3x-96c3-xgjg | Moderate severity vulnerability that affects Products.PlonePAS | The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product for Plone, does not properly handle the login form, which allows remote authenticated users to acquire the identity of an arbitrary user via unspecified vectors. | {'CVE-2009-0662'} | 2021-09-16T18:18:34Z | 2018-07-23T19:50:29Z | MODERATE | 0 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2009-0662', 'http://osvdb.org/53975', 'http://plone.org/products/plone/security/advisories/cve-2009-0662', 'https://github.com/advisories/GHSA-pq3x-96c3-xgjg', 'http://secunia.com/advisories/34840', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50061', 'http://www.securityfocus.com/bid/34664'} | null |
GHSA | GHSA-22jr-vc7j-g762 | Potential buffer overflow in psd-tools | ### Impact
An issue was discovered in psd-tools before 1.9.4.
The Cython implementation of RLE decoding did not check for malformed PSD input data
during decoding to the PIL.Image or NumPy format, leading to a Buffer Overflow.
### Patches
Users of psd-tools version v1.8.37 to v1.9.3 should upgrade to v1.9.4.
### Workarounds
Without Cython present on installation, buffer overflow does not occur but IndexError will be thrown. However, already installed psd-tools with Cython extention should be upgraded.
### References
https://github.com/psd-tools/psd-tools/pull/198
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [psd-tools](https://github.com/psd-tools/psd-tools/issues) | {'CVE-2020-10571'} | 2022-03-23T18:07:57Z | 2020-03-16T22:46:19Z | CRITICAL | 9.8 | {'CWE-754'} | {'https://github.com/advisories/GHSA-22jr-vc7j-g762', 'https://github.com/psd-tools/psd-tools/releases/tag/v1.9.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10571', 'https://github.com/psd-tools/psd-tools/pull/198', 'https://github.com/psd-tools/psd-tools/security/advisories/GHSA-22jr-vc7j-g762'} | null |
GHSA | GHSA-q62h-jw38-24vh | Uncaught Exception in zip4j | zip4j up to 2.9.1 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library. | {'CVE-2022-24615'} | 2022-04-15T16:56:08Z | 2022-02-25T00:01:04Z | MODERATE | 5.5 | {'CWE-248', 'CWE-755'} | {'https://github.com/advisories/GHSA-q62h-jw38-24vh', 'https://github.com/srikanth-lingala/zip4j/issues/377', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24615', 'https://github.com/srikanth-lingala/zip4j/issues/418'} | null |
GHSA | GHSA-mr4x-c4v9-x729 | Moderate severity vulnerability that affects aiohttp-session | aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value. | {'CVE-2018-1000814'} | 2021-09-15T20:56:20Z | 2018-12-20T22:01:46Z | MODERATE | 6.5 | {'CWE-613'} | {'https://github.com/aio-libs/aiohttp-session/pull/331', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000814', 'https://github.com/advisories/GHSA-mr4x-c4v9-x729', 'https://github.com/aio-libs/aiohttp-session/issues/325'} | null |
GHSA | GHSA-jwhm-9cjm-4493 | Cross-site Scripting in Jenkins Dashboard View Plugin | Jenkins Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. | {'CVE-2021-21649'} | 2021-06-16T17:24:41Z | 2021-06-16T17:24:41Z | MODERATE | 5.4 | {'CWE-79'} | {'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649', 'https://github.com/advisories/GHSA-jwhm-9cjm-4493'} | null |
GHSA | GHSA-4cmx-hrq9-c23p | Improper Authorization in aedes | Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`.
## Recommendation
Update to version 0.35.1 or later. | {'CVE-2018-3778'} | 2021-01-08T19:55:40Z | 2018-08-15T20:03:22Z | MODERATE | 0 | {'CWE-285'} | {'https://www.npmjs.com/advisories/682', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json', 'https://github.com/advisories/GHSA-4cmx-hrq9-c23p', 'https://github.com/mcollina/aedes/issues/211', 'https://github.com/mcollina/aedes/issues/212', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778'} | null |
GHSA | GHSA-77gc-v2xv-rvvh | Out-of-bounds Read in Pillow | An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la. | {'CVE-2021-25287'} | 2022-03-03T21:47:12Z | 2021-06-08T18:49:02Z | CRITICAL | 9.1 | {'CWE-125'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25287', 'https://github.com/advisories/GHSA-77gc-v2xv-rvvh', 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode', 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'} | null |
GHSA | GHSA-xh2p-7p87-fhgh | Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode | TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode.
The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722).
When calculating system's entire collateral, we should also exclude the liquidated trove's surplus collateral, since liquidation closes the trove and makes the surplus collateral claimable by the trove owner. This means, this line of code should look like this:
```
vars.entireSystemColl = vars.entireSystemColl.sub(singleLiquidation.collToSendToSP).sub(singleLiquidation.collSurplus);
```
### Impact
The miscalculated entire collateral is used only to calculate the TCR and check if the system has been able to exit Recovery Mode. The miscalulation only persists temporarily, and within the`batchLiquidateTroves` transaction. Once the transaction completes the TCR and Recovery Mode will be calculated properly again. However, the bug could negatively impact the liquidation throughput and the gas efficiency gains from batching multiple liquidations in a single transaction.
In normal situations, the impact of the collateral surplus of a Trove on the global TCR would be tiny. For instance, we have calculated that liquidating a trove with a collateral representing 1% of the total system collateral (so in the order of at least $10M at current values), would lead to an extra 0.53% in the temporary miscalculation of TCR. So for this bug to be meaningful, in such a scenario, the resulting real TCR must be already be very close to the Recovery Mode boundary anyway - i.e. between 149.47% and 150%. The batch liquidation transaction should also be executed with a particular trove ordering to achieve the TCR distortion. When a different trove order for the liquidation transaction is selected, the bug has no impact. In summary, the bug only has a non-negligible impact in a very narrow, specific set of circumstances.
The potential effects of the bug after it occurs are:
- The next trove in the sequence is not liquidated because the `batchLiquidateTroves` function calculates a premature exit from Recovery Mode. It could be liquidated in a subsequent transaction if the price of Ether doesn’t recover.
- The next trove in the sequence has an ICR below 100% and it’s offset against the Stability Pool instead of redistributed among other troves because the function calculates a premature exit from Recovery Mode. For this to happen, the Ether price must have instantly plummeted by more than 10% (otherwise, the trove would have been already liquidated before).
- The next trove in the sequence is liquidated while its ICR is over the real TCR: the function calculates the TCR as being slightly too high, and thus can liquidate a trove that has ICR less than the calculated TCR, but greater than the true TCR. This is probably the worst outcome - however it is already possible to achieve the same effect, regardless of the bug. A liquidator can craft a `batchLiquidateTroves` transaction whereby they select troves for liquidation such that the TCR increases and makes a given trove liquidateable. To liquidate trove A, they can order troves such that they first liquidate troves which raise the TCR to between A's ICR and 150%. This is intended and expected behavior. As clearly stated in Liquity documentation, to be completely safe and guarantee immunity from liquidation in Recovery Mode, borrowers should keep their ICR above 150%.
We don't believe this bug creates a profitable exploit. Theoretically, and only in a very narrow set of circumstances, a liquidator could try to send a batch liquidation during Recovery Mode that lets the system very temporarily return to Normal Mode earlier than it should. In that case - _and only if the Ether price also happens to suddenly plummet by more than 10%_ - stability providers might take the haircut that should be taken by the borrowers (through redistribution).
### Patches
The problem has been patched in the source code but not on mainnet contracts. Liquity protocol is immutable, and this issue is not critical, so it doesn't merit a launch of a new version.
### Bug bounty
A reward of $1,000 (the maximum for its category) was awarded to Xiahong (`gaoxh06`) for reporting this bug.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/liquity/dev)
* Email us at [security@liquity.org](mailto:security@liquity.org)
| null | 2021-08-05T16:56:58Z | 2021-08-05T16:56:58Z | LOW | 3.1 | {'CWE-682'} | {'https://github.com/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722', 'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://www.npmjs.com/package/@liquity/contracts'} | null |
GHSA | GHSA-43gc-mjxg-gvrq | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21350](https://x-stream.github.io/CVE-2021-21350.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21350'} | 2022-04-19T19:02:48Z | 2021-03-22T23:29:28Z | MODERATE | 5.3 | {'CWE-434', 'CWE-502'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-43gc-mjxg-gvrq', 'http://x-stream.github.io/changes.html#1.4.16', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21350', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-21350.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-wg96-3933-j2w5 | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting.
## Proof of Concept:
`<IMG SRC= onmouseover="alert('XSS');">`
produces the following:
`<img src="onmouseover="alert('XSS');"" />`
This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser.
## Recommendation
Update to version 1.2.3 or later. | {'CVE-2017-16017'} | 2021-01-08T01:56:48Z | 2018-11-09T17:45:55Z | MODERATE | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16017', 'https://github.com/punkave/sanitize-html/issues/19', 'https://nodesecurity.io/advisories/155', 'https://github.com/punkave/sanitize-html/pull/20', 'https://github.com/advisories/GHSA-wg96-3933-j2w5', 'https://www.npmjs.com/advisories/155'} | null |
GHSA | GHSA-rp2c-jrgp-cvr8 | Code injection in plupload | This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file. | {'CVE-2021-23562'} | 2021-12-16T15:32:31Z | 2021-12-16T15:32:31Z | MODERATE | 4.2 | {'CWE-434', 'CWE-75'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664', 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226', 'https://github.com/advisories/GHSA-rp2c-jrgp-cvr8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663'} | null |
GHSA | GHSA-75p6-52g3-rqc8 | Privilege escalation vulnerability on Token Exchange feature | A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services. | {'CVE-2022-1245'} | 2022-05-02T19:51:27Z | 2022-04-26T21:21:00Z | MODERATE | 0 | {'CWE-284'} | {'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52', 'https://github.com/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8'} | null |
GHSA | GHSA-j438-45hc-vjhm | CSRF and DNS Rebinding in Oasis | ### Impact
_What kind of vulnerability is it? Who is impacted?_
If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications.
**There is no evidence that suggests that this has been used in the wild.**
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, 2.15.0.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No.
### References
_Are there any links users can visit to find out more?_
No.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fraction/oasis](http://github.com/fraction/oasis)
* Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io) | {'CVE-2020-11003'} | 2022-04-19T19:02:52Z | 2020-04-16T03:14:39Z | MODERATE | 4.8 | {'CWE-352'} | {'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003', 'https://github.com/advisories/GHSA-j438-45hc-vjhm'} | null |
GHSA | GHSA-mg53-xr8m-86hw | Open Redirect in Liferay Portal | The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist. | {'CVE-2020-24554'} | 2021-09-24T16:17:30Z | 2021-05-07T15:54:54Z | HIGH | 7.5 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-24554', 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784956', 'https://github.com/advisories/GHSA-mg53-xr8m-86hw', 'https://portal.liferay.dev/learn/security/known-vulnerabilities'} | null |
GHSA | GHSA-7627-mp87-jf6q | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | {'CVE-2022-24440'} | 2022-04-12T15:43:38Z | 2022-04-02T00:00:13Z | HIGH | 8.1 | {'CWE-88', 'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24440', 'https://github.com/CocoaPods/cocoapods-downloader/pull/124', 'https://github.com/advisories/GHSA-7627-mp87-jf6q', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278', 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'} | null |
GHSA | GHSA-3vg7-jw9m-pc3f | Broken Access Control in Form Framework |
### Problem
Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework.
In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation.
A valid backend user account with access to the form module is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003) | {'CVE-2021-21357'} | 2022-04-19T19:02:50Z | 2021-03-23T01:53:57Z | HIGH | 7.9 | {'CWE-434', 'CWE-20', 'CWE-22'} | {'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357', 'https://github.com/advisories/GHSA-3vg7-jw9m-pc3f', 'https://typo3.org/security/advisory/typo3-core-sa-2021-003', 'https://packagist.org/packages/typo3/cms-form'} | null |
GHSA | GHSA-hv87-47h9-jcvq | Uncontrolled recursion in rust-yaml | An issue was discovered in the yaml-rust crate before 0.4.1 for Rust. There is uncontrolled recursion during deserialization. | {'CVE-2018-20993'} | 2021-08-25T20:43:13Z | 2021-08-25T20:43:13Z | HIGH | 7.5 | {'CWE-674'} | {'https://rustsec.org/advisories/RUSTSEC-2018-0006.html', 'https://github.com/advisories/GHSA-hv87-47h9-jcvq', 'https://github.com/chyh1990/yaml-rust/pull/109', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20993'} | null |
GHSA | GHSA-fjr6-hm39-4cf9 | Double free in basic_dsp_matrix | An issue was discovered in the basic_dsp_matrix crate before 0.9.2 for Rust. When a TransformContent panic occurs, a double drop can be performed. | {'CVE-2021-25906'} | 2021-08-25T20:52:50Z | 2021-08-25T20:52:50Z | HIGH | 7.5 | {'CWE-415'} | {'https://github.com/liebharc/basic_dsp/issues/47', 'https://github.com/advisories/GHSA-fjr6-hm39-4cf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25906', 'https://rustsec.org/advisories/RUSTSEC-2021-0009.html'} | null |
GHSA | GHSA-f8rj-4v7g-p5rj | Directory Traversal in jansenstuffpleasework | Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16176'} | 2021-01-14T15:35:46Z | 2020-09-01T18:53:29Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework', 'https://www.npmjs.com/advisories/464', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16176', 'https://github.com/advisories/GHSA-f8rj-4v7g-p5rj', 'https://nodesecurity.io/advisories/464'} | null |
GHSA | GHSA-378p-hrq3-x4p3 | Cross-site scripting in Shopizer | A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL. | {'CVE-2021-33562'} | 2021-06-08T23:08:20Z | 2021-06-08T23:08:20Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/advisories/GHSA-378p-hrq3-x4p3', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562'} | null |
GHSA | GHSA-hfj4-96f7-6r5g | Cross-Site Scripting in html-janitor | Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS).
This is exploitable if user-controlled data is passed into the modules `clean()` function.
## Recommendation
No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization. | {'CVE-2017-0931'} | 2021-01-08T21:11:13Z | 2018-11-09T17:49:11Z | HIGH | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-0931', 'https://github.com/guardian/html-janitor/issues/34', 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g', 'https://hackerone.com/reports/308155', 'https://www.npmjs.com/advisories/576'} | null |
GHSA | GHSA-g78p-g85h-q6ww | Data races in cache | An issue was discovered in the cache crate through 2020-11-24 for Rust.
Affected versions of this crate unconditionally implement Send/Sync for `Cache<K>`.
This allows users to insert `K` that is not Send or not Sync.
This allows users to create data races by using non-Send types like `Arc<Cell<T>>` or `Rc<T>` as `K` in `Cache<K>`. It is also possible to create data races by using types like `Cell<T>` or `RefCell<T>` (types that are `Send` but not `Sync`).
Such data races can lead to memory corruption.
| {'CVE-2020-36448'} | 2021-08-25T20:57:12Z | 2021-08-25T20:57:12Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0128.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36448', 'https://github.com/krl/cache/issues/1', 'https://github.com/advisories/GHSA-g78p-g85h-q6ww'} | null |
GHSA | GHSA-9vp3-7qwq-83r9 | Server-Side Request Forgery in FUXA | A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server. | {'CVE-2021-45851'} | 2022-03-29T21:34:47Z | 2022-03-17T00:00:48Z | HIGH | 7.5 | {'CWE-918'} | {'https://github.com/advisories/GHSA-9vp3-7qwq-83r9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851', 'https://www.youtube.com/watch?v=JE1Kcq3iJpc'} | null |
GHSA | GHSA-333g-rpr4-7hxq | Backdoor / Malicious code | The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x.
Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory.
These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon. | {'CVE-2019-15224'} | 2021-08-17T21:10:34Z | 2019-08-20T14:29:03Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/rest-client/rest-client/issues/713', 'https://github.com/advisories/GHSA-333g-rpr4-7hxq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224', 'https://rubygems.org/gems/rest-client/versions/'} | null |
GHSA | GHSA-r9cj-xj33-4q42 | Malicious Package in buffgr-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:26:57Z | 2020-09-03T22:21:54Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-r9cj-xj33-4q42', 'https://www.npmjs.com/advisories/1260'} | null |
GHSA | GHSA-f248-v4qh-x2r6 | Improper Certificate Validation in blackduck | Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases. | {'CVE-2020-27589'} | 2021-04-20T16:29:41Z | 2021-04-20T16:29:41Z | HIGH | 7.5 | {'CWE-295'} | {'https://github.com/advisories/GHSA-f248-v4qh-x2r6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27589', 'https://github.com/blackducksoftware/hub-rest-api-python', 'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd', 'https://www.optiv.com/explore-optiv-insights/source-zero/certificate-validation-disabled-black-duck-api-wrapper', 'https://community.synopsys.com/s/question/0D52H00005JCZAXSA5/announcement-black-duck-defect-identified', 'https://pypi.org/project/blackduck/'} | null |
GHSA | GHSA-qwvx-c8j7-5g75 | Use of Uninitialized Resource in tectonic_xdv | An issue was discovered in the tectonic_xdv crate before 0.1.12 for Rust. XdvParser::<T>::process may read from uninitialized memory locations. | {'CVE-2021-45703'} | 2022-01-07T17:40:43Z | 2022-01-06T22:09:19Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45703', 'https://rustsec.org/advisories/RUSTSEC-2021-0112.html', 'https://github.com/advisories/GHSA-qwvx-c8j7-5g75', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tectonic_xdv/RUSTSEC-2021-0112.md'} | null |
GHSA | GHSA-2xvj-j3qh-x8c3 | High severity vulnerability that affects private_address_check | private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address. | {'CVE-2018-3759'} | 2021-01-08T20:05:48Z | 2018-07-31T18:13:05Z | HIGH | 0 | {'CWE-362'} | {'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759', 'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'} | null |
GHSA | GHSA-gwpx-q2h9-wxgx | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | {'CVE-2021-3964'} | 2021-12-03T20:43:25Z | 2021-12-03T20:43:25Z | MODERATE | 5.9 | {'CWE-639'} | {'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744', 'https://github.com/advisories/GHSA-gwpx-q2h9-wxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a'} | null |
GHSA | GHSA-4xrw-wvmq-8jmh | OS Command Injection in node-key-sender | node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function. | {'CVE-2020-7627'} | 2022-02-10T23:46:11Z | 2022-02-10T23:46:11Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261', 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,', 'https://github.com/advisories/GHSA-4xrw-wvmq-8jmh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627'} | null |
GHSA | GHSA-g37q-26qx-8v2m | Denial of service in Apache OpenMeetings | Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack. | {'CVE-2020-13951'} | 2022-02-10T20:36:59Z | 2022-02-10T20:36:45Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13951', 'https://lists.apache.org/thread.html/re2aed827cd24ae73cbc320e5808020c8d12c7b687ee861b27d728bbc%40%3Cuser.openmeetings.apache.org%3E', 'https://github.com/advisories/GHSA-g37q-26qx-8v2m', 'http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'} | null |
GHSA | GHSA-35fg-hjcr-j65f | Information exposure in xwiki-platform | ### Impact
It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users.
### Patches
The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1.
### Workarounds
There's no easy workaround other than applying the upgrade.
### References
https://jira.xwiki.org/browse/XWIKI-18787
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki Security Mailing list](mailto:security@xwiki.org)
| {'CVE-2022-23619'} | 2022-02-16T22:23:42Z | 2022-02-09T21:51:19Z | MODERATE | 5.3 | {'CWE-200', 'CWE-640'} | {'https://jira.xwiki.org/browse/XWIKI-18787', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619', 'https://github.com/advisories/GHSA-35fg-hjcr-j65f', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'} | null |
GHSA | GHSA-x2w5-725j-gf2g | Prototype Pollution in convict | An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash.
The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.
The problem is patched in `convict@6.2.2`. Users should upgrade to `convict@6.2.2`. There is no way for users to fix or remediate the vulnerability without upgrading. | {'CVE-2022-22143'} | 2022-05-03T02:25:28Z | 2022-04-20T16:21:03Z | HIGH | 8.4 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143', 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880', 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://github.com/mozilla/node-convict/pull/384', 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2', 'https://github.com/advisories/GHSA-x2w5-725j-gf2g', 'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'} | null |
GHSA | GHSA-hcq6-h8v2-r5wm | Server-Side Request Forgery in node-pdf-generator | This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack. | {'CVE-2020-7740'} | 2021-05-10T18:38:34Z | 2021-05-10T18:38:34Z | HIGH | 8.2 | {'CWE-20', 'CWE-918'} | {'https://github.com/darrenhaken/node-pdf-generator/blob/master/index.js%23L29', 'https://github.com/advisories/GHSA-hcq6-h8v2-r5wm', 'https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7740'} | null |
GHSA | GHSA-fwvp-x5gj-773j | Malicious Package in react-server-native | Version 0.0.7 of `react-server-native` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.7 of this module is found installed you will want to replace it with a version before or after 0.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-01T20:33:10Z | 2020-09-01T20:33:10Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/635', 'https://github.com/advisories/GHSA-fwvp-x5gj-773j'} | null |
GHSA | GHSA-wjxj-f8rg-99wx | Moderate severity vulnerability that affects org.apache.thrift:libthrift | Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete. | {'CVE-2018-1320'} | 2022-04-01T18:13:08Z | 2019-01-17T13:56:40Z | HIGH | 7.5 | {'CWE-20', 'CWE-295'} | {'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://support.f5.com/csp/article/K36361684', 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://github.com/advisories/GHSA-wjxj-f8rg-99wx', 'http://www.openwall.com/lists/oss-security/2019/07/24/3', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html', 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.securityfocus.com/bid/106551', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E', 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E'} | null |
GHSA | GHSA-xj6q-9hx8-mm7f | Directory Traversal in liuyaserver | Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16170'} | 2021-01-14T16:03:47Z | 2020-09-01T17:34:34Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/413', 'https://github.com/advisories/GHSA-xj6q-9hx8-mm7f', 'https://www.npmjs.com/advisories/413', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.