ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-673x-f5wx-fxpw | Cross Site Scripting and RCE in baserCMS | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE).
* Impact: XSS to RCE via Arbitrary file upload.
* Attack vector is: Administrator must be logged in.
* Components are: ThemeFilesController.php, UploaderFilesController.php.
* Tested baserCMS Version : 4.3.6 (Latest)
* Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE)
* Patches : https://basercms.net/security/20200827
Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/) | {'CVE-2020-15159'} | 2022-04-19T19:02:28Z | 2020-08-28T21:45:15Z | LOW | 7.6 | {'CWE-79'} | {'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/advisories/GHSA-673x-f5wx-fxpw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159'} | null |
GHSA | GHSA-hf2m-j98r-4fqw | API token verification can be bypassed in NodeBB | ### Impact
Incorrect logic present in the token verification step unintentionally allowed master token access to the API.
### Patches
The vulnerability has been patch as of v1.18.5.
### Workarounds
Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
| {'CVE-2021-43786'} | 2022-04-19T19:03:13Z | 2021-11-30T22:21:05Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/advisories/GHSA-hf2m-j98r-4fqw'} | null |
GHSA | GHSA-cqqj-4p63-rrmm | HTTP Request Smuggling in Netty | HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold." | {'CVE-2019-20444'} | 2021-08-25T17:26:47Z | 2020-02-21T18:55:24Z | CRITICAL | 9.1 | {'CWE-444'} | {'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://github.com/netty/netty/pull/9871', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/issues/9866', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-cqqj-4p63-rrmm', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0601', 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'} | null |
GHSA | GHSA-v88g-cgmw-v5xw | Prototype Pollution in Ajv | An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) | {'CVE-2020-15366'} | 2022-02-10T23:30:59Z | 2022-02-10T23:30:59Z | MODERATE | 5.6 | {'CWE-915'} | {'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3', 'https://github.com/ajv-validator/ajv/tags', 'https://github.com/advisories/GHSA-v88g-cgmw-v5xw', 'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366'} | null |
GHSA | GHSA-xf27-jqwv-gf3r | Unintended Require in larvitbase-api | Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
## Recommendation
Upgrade to version 0.5.4 or later. | {'CVE-2019-5479'} | 2021-01-08T21:27:21Z | 2019-09-11T23:03:57Z | MODERATE | 0 | {'CWE-98'} | {'https://www.npmjs.com/advisories/1120', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5479', 'https://hackerone.com/reports/566056', 'https://github.com/advisories/GHSA-xf27-jqwv-gf3r'} | null |
GHSA | GHSA-5629-8855-gf4g | Authentication Bypass by CSRF Weakness | ### Impact
The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details.
The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end.
### Patches
For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`.
### Workarounds
Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
### References
- [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions)
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
| null | 2022-05-09T22:05:52Z | 2021-11-18T20:12:40Z | CRITICAL | 9.3 | {'CWE-352', 'CWE-305'} | {'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-5629-8855-gf4g'} | null |
GHSA | GHSA-xr9h-9m79-x29g | SSRF in Rendertron | Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain. | {'CVE-2020-8902'} | 2021-03-01T19:38:23Z | 2021-03-01T19:38:23Z | MODERATE | 0 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8902', 'https://www.npmjs.com/package/rendertron', 'https://github.com/advisories/GHSA-xr9h-9m79-x29g', 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0'} | null |
GHSA | GHSA-579h-mv94-g4gp | Privilege Escalation in Kubernetes | In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection. | {'CVE-2018-1002105'} | 2022-04-12T22:34:38Z | 2022-02-15T01:57:18Z | CRITICAL | 9.8 | {'CWE-269'} | {'https://www.securityfocus.com/bid/106068', 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905', 'https://access.redhat.com/errata/RHSA-2018:3598', 'https://www.exploit-db.com/exploits/46052/', 'https://www.openwall.com/lists/oss-security/2019/07/06/4', 'https://github.com/kubernetes/kubernetes/issues/71411', 'https://access.redhat.com/errata/RHSA-2018:3752', 'https://github.com/advisories/GHSA-579h-mv94-g4gp', 'https://security.netapp.com/advisory/ntap-20190416-0001/', 'https://www.exploit-db.com/exploits/46053/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105', 'https://www.openwall.com/lists/oss-security/2019/06/28/2', 'https://access.redhat.com/errata/RHSA-2018:3754', 'https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88', 'https://access.redhat.com/errata/RHSA-2018:3537', 'https://access.redhat.com/errata/RHSA-2018:3624', 'https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html', 'https://access.redhat.com/errata/RHSA-2018:3742', 'https://www.openwall.com/lists/oss-security/2019/07/06/3', 'https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do', 'https://access.redhat.com/errata/RHSA-2018:3551', 'https://access.redhat.com/errata/RHSA-2018:3549', 'https://www.exploit-db.com/exploits/46053', 'https://github.com/evict/poc_CVE-2018-1002105'} | null |
GHSA | GHSA-g7w8-pp9w-7p32 | Creation of order credits was not validated by acl in admin orders | ### Impact
Creation of order credits was not validated by ACL in admin orders
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 | null | 2021-10-05T17:26:04Z | 2021-06-28T16:57:32Z | LOW | 0 | {'CWE-306'} | {'https://www.shopware.com/en/download/#shopware-6', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709', 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://github.com/advisories/GHSA-g7w8-pp9w-7p32'} | null |
GHSA | GHSA-xpfv-89vg-r562 | Cross Site Request Forgery in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk. | {'CVE-2022-0335'} | 2022-02-02T16:06:35Z | 2022-01-28T22:07:23Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0335', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://github.com/advisories/GHSA-xpfv-89vg-r562', 'https://moodle.org/mod/forum/discuss.php?d=431103'} | null |
GHSA | GHSA-p9g3-vpvp-hcj5 | Malicious Package in bufber-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T20:56:22Z | 2020-09-03T21:41:55Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1234', 'https://github.com/advisories/GHSA-p9g3-vpvp-hcj5'} | null |
GHSA | GHSA-mcfm-h73v-635m | High severity vulnerability that affects io.undertow:undertow-core | It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. | {'CVE-2017-2666'} | 2021-09-15T18:53:08Z | 2018-10-19T16:55:14Z | MODERATE | 6.5 | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-2666', 'https://github.com/advisories/GHSA-mcfm-h73v-635m'} | null |
GHSA | GHSA-322m-p39j-r5m2 | Malicious Package in npm-script-demo | The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given.
It has been removed from the npm registry.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | {'CVE-2017-16128'} | 2021-01-14T15:35:14Z | 2020-09-01T18:55:37Z | MODERATE | 0 | {'CWE-506'} | {'https://www.npmjs.com/advisories/481', 'https://nodesecurity.io/advisories/481', 'https://github.com/advisories/GHSA-322m-p39j-r5m2', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128'} | null |
GHSA | GHSA-68wg-qv6r-j4vp | SQL Injection in usmanhalalit/pixie | Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization. | {'CVE-2019-10766'} | 2021-08-18T22:44:59Z | 2019-11-20T17:44:54Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10766', 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9', 'https://github.com/advisories/GHSA-68wg-qv6r-j4vp'} | null |
GHSA | GHSA-3fxp-vwxm-2r5p | Command injection in gitlogplus | All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization. | {'CVE-2021-23412'} | 2021-08-03T18:58:28Z | 2021-07-26T21:23:35Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832', 'https://hackerone.com/reports/808942', 'https://github.com/advisories/GHSA-3fxp-vwxm-2r5p', 'https://www.npmjs.com/package/gitlogplus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412'} | null |
GHSA | GHSA-7fjp-g4m7-fx23 | User (Encrypted) Password Field Being Serialised | ### Impact
Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed.
### Patches
Issue has been patched in version 0.3.7-beta and onwards.
### Workarounds
Add the 'password' field to the Users model file in the hidden array:
```php
/**
* The attributes that should be hidden for arrays.
*
* @var array
*/
protected $hidden = [
'remember_token',
'password',
];
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core)
* Email us at [security@pw-websolutions.com](mailto:security@pw-websolutions.com) | null | 2021-04-13T15:12:26Z | 2021-04-13T15:12:26Z | LOW | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-7fjp-g4m7-fx23', 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'} | null |
GHSA | GHSA-p86x-652p-6385 | Incorrect Default Permissions in keyring | Python keyring lib before 0.10 created keyring files with world-readable permissions. | {'CVE-2012-5577'} | 2021-08-19T21:56:10Z | 2020-03-11T21:36:38Z | HIGH | 7.5 | {'CWE-276'} | {'https://github.com/advisories/GHSA-p86x-652p-6385', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5577', 'https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5577', 'http://www.openwall.com/lists/oss-security/2012/11/27/3', 'https://security-tracker.debian.org/tracker/CVE-2012-5577', 'https://bitbucket.org/kang/python-keyring-lib/issue/67/set-go-rwx-on-keyring_passcfg'} | null |
GHSA | GHSA-g54x-29xv-58h5 | Remote code execution in Subrion | Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval(). | {'CVE-2021-43464'} | 2022-04-15T02:46:22Z | 2022-04-05T00:00:23Z | HIGH | 8.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43464', 'https://github.com/advisories/GHSA-g54x-29xv-58h5', 'https://github.com/intelliants/subrion/issues/888'} | null |
GHSA | GHSA-8hmr-w35f-3qgj | Malicious Package in harmlesspackage | Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise. | null | 2021-09-29T20:46:21Z | 2020-09-03T21:07:37Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1199', 'https://github.com/advisories/GHSA-8hmr-w35f-3qgj'} | null |
GHSA | GHSA-23f7-99jx-m54r | Remote code execution in dependabot-core branch names when cloning | ### Impact
Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code.
For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository.
When Dependabot is configured to clone the source repository during an update, Dependabot runs a shell command to git clone the repository:
```bash
git clone --no-tags --no-recurse-submodules --depth=1 --branch=<BRANCH> --single-branch <GITHUB_REPO_URL> repo/contents/path
```
Dependabot will always clone the source repository for `go_modules` during the file fetching step and can be configured to clone the repository for other package managers using the `FileFetcher` class from `dependabot-common`.
```ruby
source = Dependabot::Source.new(
provider: "github",
repo: "repo/name",
directory: "/",
branch: "/$({curl,127.0.0.1})",
)
repo_contents_path = "./file/path"
fetcher = Dependabot::FileFetchers.for_package_manager("bundler").
new(source: source, credentials: [],
repo_contents_path: repo_contents_path)
fetcher.clone_repo_contents
```
### Patches
The fix was applied to version `0.125.1`: https://github.com/dependabot/dependabot-core/pull/2727
### Workarounds
Escape the branch name prior to passing it to the `Dependabot::Source` class.
For example using `shellwords`:
```ruby
require "shellwords"
branch = Shellwords.escape("/$({curl,127.0.0.1})")
source = Dependabot::Source.new(
provider: "github",
repo: "repo/name",
directory: "/",
branch: branch,
)
``` | {'CVE-2020-26222'} | 2022-04-19T19:02:40Z | 2020-11-13T15:47:50Z | LOW | 8.7 | {'CWE-74'} | {'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5', 'https://github.com/advisories/GHSA-23f7-99jx-m54r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/dependabot-core/pull/2727', 'https://rubygems.org/gems/dependabot-common'} | null |
GHSA | GHSA-m6cx-g6qm-p2cx | Arbitrary File Write in npm | Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk.
This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.3 or later. | {'CVE-2019-16775'} | 2022-04-19T19:02:23Z | 2019-12-13T15:39:19Z | HIGH | 7.7 | {'CWE-61', 'CWE-59'} | {'https://access.redhat.com/errata/RHEA-2020:0330', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://access.redhat.com/errata/RHSA-2020:0573', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://www.npmjs.com/advisories/1434'} | null |
GHSA | GHSA-mwgj-7x7j-6966 | Deserialization of Untrusted Data in ParlAI | Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0. | {'CVE-2021-24040'} | 2021-09-15T18:26:36Z | 2021-09-13T20:06:14Z | MODERATE | 0 | {'CWE-502'} | {'https://github.com/advisories/GHSA-mwgj-7x7j-6966', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0', 'http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24040'} | null |
GHSA | GHSA-85rr-4rh9-hhwh | Memory leak in Nanopb | ### Impact
Decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed.
### Patches
Preliminary patch is [available on git](https://github.com/nanopb/nanopb/commit/edf6dcbffee4d614ac0c2c1b258ab95185bdb6e9) and problem will be patched in versions 0.3.9.7 and 0.4.4 once testing has been completed.
### Workarounds
Following workarounds are available:
* Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code.
* Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed.
* Use an arena allocator for nanopb, to make sure all memory can be released afterwards.
### References
Bug report: https://github.com/nanopb/nanopb/issues/615
### For more information
If you have any questions or comments about this advisory, comment on the bug report linked above. | {'CVE-2020-26243'} | 2021-01-07T22:39:40Z | 2020-11-25T16:53:27Z | MODERATE | 7.5 | {'CWE-119', 'CWE-20'} | {'https://github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/nanopb/nanopb/blob/2b48a361786dfb1f63d229840217a93aae064667/CHANGELOG.txt', 'https://github.com/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/nanopb/nanopb/issues/615', 'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26243'} | null |
GHSA | GHSA-384w-5v3f-q499 | Base class whitelist configuration ignored in OAuthenticator | ### Impact
__What goes wrong?__
The deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If this is the only mechanism of authorization restriction (i.e. no group or team restrictions in configuration) then all authenticated users will be allowed. Provider-based restrictions, including deprecated values such as `GitHubOAuthenticator.org_whitelist` are **not** affected.
__Who is impacted?__
All users of OAuthenticator 0.12.0 and 0.12.1 with JupyterHub 1.2 (JupyterHub Helm chart 0.10.0-0.10.5) who use the `admin.whitelist.users` configuration in the jupyterhub helm chart or the `c.Authenticator.whitelist` configuration directly. Users of other deprecated configuration, e.g. `c.GitHubOAuthenticator.team_whitelist` are **not** affected.
If you see a log line like this and expect a specific list of allowed usernames:
```
[I 2020-11-27 16:51:54.528 JupyterHub app:1717] Not using allowed_users. Any authenticated user will be allowed.
```
you are likely affected.
### Patches
- Replacing deprecated `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue.
- Update oauthenticator to 0.12.2
- Update jupyterhub helm chart to 0.10.6
If any users have been authorized during this time who should not have been, they must be deleted via the API or admin interface, [per the documentation](https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub).
### Workarounds
Replacing `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue.
In the jupyterhub helm chart prior to 0.10.6, this can be done via `hub.extraConfig`:
```yaml
auth:
allowedUsers:
- user1
- user2
hub:
extraConfig:
allowedUsers: |
# set new field not exposed in helm chart < 0.10.6
set_config_if_not_none(c.Authenticator, "allowed_users", "auth.allowedUsers")
```
### For more information
If you have any questions or comments about this advisory:
* Open a thread [on the Jupyter forum](http://discourse.jupyter.org)
* Email us at [security@ipython.org](mailto:security@ipython.org) | {'CVE-2020-26250'} | 2021-01-07T22:38:55Z | 2020-12-01T20:25:00Z | HIGH | 6.3 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26250', 'https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-384w-5v3f-q499', 'https://github.com/advisories/GHSA-384w-5v3f-q499', 'https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub', 'https://github.com/jupyterhub/oauthenticator/blob/master/docs/source/changelog.md#0122---2020-11-30', 'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'} | null |
GHSA | GHSA-79hv-pfx6-hhpj | Cross-site scripting (XSS) | Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field. | {'CVE-2021-28088'} | 2021-03-12T21:34:02Z | 2021-03-12T21:34:02Z | MODERATE | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-28088', 'https://github.com/advisories/GHSA-79hv-pfx6-hhpj', 'https://hackerone.com/reports/1119296', 'https://anotepad.com/note/read/s3kkk6h7'} | null |
GHSA | GHSA-rxq3-gm4p-5fj4 | High severity vulnerability that affects rails | The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password. | {'CVE-2009-2422'} | 2021-09-20T14:46:40Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-287'} | {'http://support.apple.com/kb/HT4077', 'http://www.securityfocus.com/bid/35579', 'http://www.vupen.com/english/advisories/2009/1802', 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4', 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s', 'http://secunia.com/advisories/35702', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528', 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest'} | null |
GHSA | GHSA-gcvh-66ff-4mwm | `CHECK`-failures in Tensorflow | ### Impact
The [implementation of `MapStage`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550) is vulnerable a `CHECK`-fail if the key tensor is not a scalar:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.MapStage(
key = tf.constant(value=[4], shape= (1,2), dtype=tf.int64),
indices = np.array([[6]]),
values = np.array([-60]),
dtypes = [tf.int64], capacity=0, memory_limit=0,
container='', shared_name='', name=None
)
```
### Patches
We have patched the issue in GitHub commit [f57315566d7094f322b784947093406c2aea0d7d](https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
~ | {'CVE-2022-21734'} | 2022-02-11T16:55:37Z | 2022-02-10T00:21:12Z | MODERATE | 6.5 | {'CWE-617', 'CWE-843'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21734', 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550'} | null |
GHSA | GHSA-jxg6-fhwc-9v9c | Regular Expression Denial of Service (ReDoS) in es6-crawler-detect | This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators. | {'CVE-2020-28501'} | 2021-04-13T15:19:39Z | 2021-04-13T15:19:39Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/advisories/GHSA-jxg6-fhwc-9v9c', 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529', 'https://github.com/JefferyHus/es6-crawler-detect/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'} | null |
GHSA | GHSA-r695-7vr9-jgc2 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. | {'CVE-2020-36187'} | 2022-02-08T21:37:41Z | 2021-12-09T19:16:51Z | HIGH | 8.1 | {'CWE-502'} | {'https://github.com/advisories/GHSA-r695-7vr9-jgc2', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
GHSA | GHSA-7mg4-w3w5-x5pc | Prototype pollution in json-pointer | This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported. | {'CVE-2020-7709'} | 2021-07-29T22:28:51Z | 2021-05-10T18:37:47Z | MODERATE | 6 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-7mg4-w3w5-x5pc', 'https://www.npmjs.com/package/json-pointer', 'https://github.com/manuelstofer/json-pointer/pull/34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7709', 'https://github.com/manuelstofer/json-pointer/pull/34/files', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925'} | null |
GHSA | GHSA-crf2-xm6x-46p6 | Observable Timing Discrepancy in OpenMage LTS | ### Impact
This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks
### Patches
The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved
### References
Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html )
fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4
as part of 2.4.0/2.3.5-p2 | {'CVE-2020-15151'} | 2022-04-19T19:02:33Z | 2020-08-19T18:02:36Z | HIGH | 8 | {'CWE-352', 'CWE-203'} | {'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://github.com/advisories/GHSA-crf2-xm6x-46p6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://helpx.adobe.com/security/products/magento/apsb20-47.html'} | null |
GHSA | GHSA-cghx-9gcr-r42x | Path Traversal in the Java Kubernetes Client | Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. | {'CVE-2020-8570'} | 2021-04-12T20:53:33Z | 2021-01-29T18:12:54Z | MODERATE | 7.5 | {'CWE-22'} | {'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589', 'https://github.com/kubernetes-client/java/pull/1450', 'https://github.com/advisories/GHSA-cghx-9gcr-r42x', 'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E', 'https://github.com/kubernetes-client/java/issues/1491'} | null |
GHSA | GHSA-jxfh-8wgv-vfr2 | Prototype pollution in dojo | In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution.
Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects.
An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values.
This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2 | {'CVE-2020-5258'} | 2022-04-01T20:24:08Z | 2020-03-10T18:03:14Z | HIGH | 7.7 | {'CWE-94', 'CWE-74', 'CWE-1321'} | {'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E', 'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2', 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-jxfh-8wgv-vfr2', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-c289-47qf-rvrr | Low severity vulnerability that affects easymon | easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later. | {'CVE-2018-1000855'} | 2021-09-08T21:08:48Z | 2018-12-21T17:46:03Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/basecamp/easymon/issues/26', 'https://github.com/advisories/GHSA-c289-47qf-rvrr', 'https://github.com/basecamp/easymon/pull/25', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855'} | null |
GHSA | GHSA-832h-xg76-4gv6 | ReDoS in brace-expansion | Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition.
## Proof of Concept
```
var expand = require('brace-expansion');
expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}');
```
## Recommendation
Update to version 1.1.7 or later. | {'CVE-2017-18077'} | 2021-09-03T22:10:25Z | 2018-01-29T15:50:46Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-832h-xg76-4gv6', 'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://bugs.debian.org/862712', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3', 'https://github.com/juliangruber/brace-expansion/issues/33', 'https://nodesecurity.io/advisories/338'} | null |
GHSA | GHSA-3vv5-42wr-m32g | Downloads Resources over HTTP in scala-bin | Affected versions of `scala-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scala-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10627'} | 2021-01-08T19:58:46Z | 2019-02-18T23:57:00Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/227', 'https://github.com/advisories/GHSA-3vv5-42wr-m32g', 'https://www.npmjs.com/advisories/227', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10627'} | null |
GHSA | GHSA-w655-w578-99pq | High severity vulnerability that affects espeak-ruby | Withdrawn, accidental duplicate publish.
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb. | null | 2021-12-03T14:11:04Z | 2018-08-21T17:09:08Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-w655-w578-99pq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'} | null |
GHSA | GHSA-8h2j-cgx8-6xv7 | Cross-Site Request Forgery (CSRF) in FastAPI | ### Impact
FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack.
In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`).
So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted.
But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application.
### Patches
This is fixed in FastAPI `0.65.2`.
The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`.
### Workarounds
It's best to upgrade to the latest FastAPI.
But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type.
### References
* [CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)
* [This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531)
* [OWASP CSRF](https://owasp.org/www-community/attacks/csrf)
* Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118)
### For more information
If you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com) | {'CVE-2021-32677'} | 2022-04-19T19:02:59Z | 2021-06-10T15:43:54Z | HIGH | 8.2 | {'CWE-352'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATAWX25TYKNEKLDMKWNLYDB34UWTROA/', 'https://github.com/advisories/GHSA-8h2j-cgx8-6xv7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32677', 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d', 'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7'} | null |
GHSA | GHSA-g68x-vvqq-pvw3 | Moderate severity vulnerability that affects ckeditor | CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. | {'CVE-2018-17960'} | 2021-09-10T20:27:13Z | 2018-11-21T22:19:50Z | MODERATE | 6.1 | {'CWE-79'} | {'http://www.securityfocus.com/bid/109205', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960', 'https://github.com/advisories/GHSA-g68x-vvqq-pvw3', 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'} | null |
GHSA | GHSA-vr8q-g5c7-m54m | XXE in Nokogiri | ### Severity
Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N).
### Description
In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks.
This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as **untrusted** by default whenever possible.
Please note that this security fix was pushed into a new minor version, 1.11.x, rather than a patch release to the 1.10.x branch, because it is a breaking change for some schemas and the risk was assessed to be "Low Severity".
### Affected Versions
Nokogiri `<= 1.10.10` as well as prereleases `1.11.0.rc1`, `1.11.0.rc2`, and `1.11.0.rc3`
### Mitigation
There are no known workarounds for affected versions. Upgrade to Nokogiri `1.11.0.rc4` or later.
If, after upgrading to `1.11.0.rc4` or later, you wish to re-enable network access for resolution of external resources (i.e., return to the previous behavior):
1. Ensure the input is trusted. Do not enable this option for untrusted input.
2. When invoking the `Nokogiri::XML::Schema` constructor, pass as the second parameter an instance of `Nokogiri::XML::ParseOptions` with the `NONET` flag turned off.
So if your previous code was:
``` ruby
# in v1.11.0.rc3 and earlier, this call allows resources to be accessed over the network
# but in v1.11.0.rc4 and later, this call will disallow network access for external resources
schema = Nokogiri::XML::Schema.new(schema)
# in v1.11.0.rc4 and later, the following is equivalent to the code above
# (the second parameter is optional, and this demonstrates its default value)
schema = Nokogiri::XML::Schema.new(schema, Nokogiri::XML::ParseOptions::DEFAULT_SCHEMA)
```
Then you can add the second parameter to indicate that the input is trusted by changing it to:
``` ruby
# in v1.11.0.rc3 and earlier, this would raise an ArgumentError
# but in v1.11.0.rc4 and later, this allows resources to be accessed over the network
schema = Nokogiri::XML::Schema.new(trusted_schema, Nokogiri::XML::ParseOptions.new.nononet)
```
### References
- [This issue's public advisory](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m)
- [Original Hackerone report (private)](https://hackerone.com/reports/747489)
- [OWASP description of XXE attack](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing)
- [OWASP description of SSRF attack](https://www.owasp.org/index.php/Server_Side_Request_Forgery)
### Credit
This vulnerability was independently reported by @eric-therond and @gucki.
The Nokogiri maintainers would like to thank [HackerOne](https://hackerone.com/nokogiri) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to us. | {'CVE-2020-26247'} | 2022-04-19T19:02:42Z | 2020-12-30T18:35:06Z | MODERATE | 4.3 | {'CWE-611'} | {'https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4', 'https://github.com/advisories/GHSA-vr8q-g5c7-m54m', 'https://hackerone.com/reports/747489', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m', 'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b', 'https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03', 'https://rubygems.org/gems/nokogiri', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html'} | null |
GHSA | GHSA-82hm-vh7g-hrh9 | Partial read is incorrect in molecule | ### Impact
Anyone who uses `total_size(..)` function to partial read the length of any `FixVec` will get an incorrect result, due to an incorrect implementation. This has been resolved in the 0.7.2 release.
### Workarounds
If you already have the whole `FixVec` `A`, you can use `A.as_slice().len()` to get the total size of the `FixVec`.
### For more information
If you have any questions or comments about this advisory:
- [Open an issue to ask use directly](https://github.com/nervosnetwork/molecule/issues/new). | null | 2021-09-09T17:55:11Z | 2021-08-25T21:01:25Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-82hm-vh7g-hrh9', 'https://github.com/nervosnetwork/molecule/security/advisories/GHSA-82hm-vh7g-hrh9', 'https://github.com/nervosnetwork/molecule/pull/49'} | null |
GHSA | GHSA-5ww9-j83m-q7qx | Information exposure in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. | {'CVE-2019-12086'} | 2022-04-21T17:54:12Z | 2019-05-23T09:32:24Z | HIGH | 7.5 | {'CWE-502'} | {'https://www.debian.org/security/2019/dsa-4452', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2326', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://github.com/advisories/GHSA-5ww9-j83m-q7qx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2@%3Creviews.spark.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html', 'http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/', 'http://www.securityfocus.com/bid/109227', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'} | null |
GHSA | GHSA-5jpf-pj32-xx53 | Authorization header is not sanitized in an error object in auth0 | ### Overview
Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using `auth0` npm package
- You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials
### How to fix that?
Upgrade to version `2.27.1`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
http://github.com/osdiab | {'CVE-2020-15125'} | 2022-04-19T19:02:31Z | 2020-07-29T16:26:22Z | HIGH | 7.7 | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.com/auth0/node-auth0/pull/507', 'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53', 'https://github.com/advisories/GHSA-5jpf-pj32-xx53'} | null |
GHSA | GHSA-6cwv-x26c-w2q4 | Jupyter Notebook file bypasses sanitization, executes JavaScript | In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous. | {'CVE-2018-8768'} | 2022-04-26T18:05:03Z | 2018-07-12T12:00:00Z | HIGH | 7.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8768', 'https://github.com/advisories/GHSA-6cwv-x26c-w2q4', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'http://openwall.com/lists/oss-security/2018/03/15/2'} | null |
GHSA | GHSA-7rpj-hg47-cx62 | Improper Restriction of XML External Entity Reference in com.h2database:h2. | H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability. | {'CVE-2021-23463'} | 2022-04-22T15:39:59Z | 2021-12-16T14:29:57Z | HIGH | 8.1 | {'CWE-611'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463', 'https://github.com/h2database/h2database/pull/3199', 'https://github.com/advisories/GHSA-7rpj-hg47-cx62', 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://github.com/h2database/h2database/issues/3195'} | null |
GHSA | GHSA-mph4-vhrx-mv67 | Deserialization of Untrusted Data in FasterXML jackson-databind | FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. | {'CVE-2019-12384'} | 2021-04-23T20:16:18Z | 2019-07-05T21:07:27Z | MODERATE | 5.9 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3200', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://doyensec.com/research.html', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://security.netapp.com/advisory/ntap-20190703-0002/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://blog.doyensec.com/2019/07/22/jackson-gadgets.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://access.redhat.com/errata/RHSA-2019:1820', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:2720', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12384', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-mph4-vhrx-mv67', 'https://access.redhat.com/errata/RHSA-2019:3292'} | null |
GHSA | GHSA-2rxh-h6h9-qrqc | Class destructors causing side-effects when being unserialized in TYPO3 CMS | Calling unserialize() on malicious user-submitted content can result in the following scenarios:
- trigger deletion of arbitrary directory in file system (if writable for web server)
- trigger message submission via email using identity of web site (mail relay)
Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-004 | {'CVE-2020-11066'} | 2022-04-19T19:02:26Z | 2020-05-13T23:18:38Z | HIGH | 8.7 | {'CWE-915'} | {'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066', 'https://github.com/advisories/GHSA-2rxh-h6h9-qrqc'} | null |
GHSA | GHSA-64fq-9c6w-rq44 | Improper Neutralization of Formula Elements in a CSV File in Kimai 2 | A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet. | {'CVE-2021-43515'} | 2022-04-22T20:21:49Z | 2022-04-09T00:00:25Z | HIGH | 7.8 | {'CWE-1236'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43515', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf', 'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/advisories/GHSA-64fq-9c6w-rq44'} | null |
GHSA | GHSA-m36m-x4c5-rjxj | Silently Runs Cryptocoin Miner in hooka-tools | Affected versions of `hooka-tools` were compromised and modified to silently run a cryptocoin miner in the background.
All affected versions have been unpublished from the npm registry.
## Recommendation
While this module has been unpublished, some versions may exist in mirrors or caches. Do not install this module, and remove it if found. | null | 2020-09-01T19:01:58Z | 2020-09-01T19:01:58Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-m36m-x4c5-rjxj', 'https://www.npmjs.com/advisories/549'} | null |
GHSA | GHSA-44qp-qhfv-c7f6 | Improper Handling of Exceptional Conditions in Apache Tomcat | A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64. | {'CVE-2021-30639'} | 2022-02-08T21:20:55Z | 2021-08-13T15:21:02Z | HIGH | 7.5 | {'CWE-755'} | {'https://github.com/advisories/GHSA-44qp-qhfv-c7f6', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cusers.tomcat.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30639', 'https://lists.apache.org/thread.html/rd84fae1f474597bdf358f5bdc0a5c453c507bd527b83e8be6b5ea3f4%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-vc3x-gx6c-g99f | Denial of Service in Bytom | In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash. | {'CVE-2018-18206'} | 2022-04-12T22:33:07Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/Bytom/bytom/pull/1307', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18206', 'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42', 'https://github.com/advisories/GHSA-vc3x-gx6c-g99f'} | null |
GHSA | GHSA-53r4-h27g-rg3x | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0992'} | 2021-03-29T20:59:07Z | 2021-03-29T20:59:07Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0992', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/advisories/GHSA-53r4-h27g-rg3x'} | null |
GHSA | GHSA-xcgx-27q5-7634 | Malicious Package in commanedr | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:59:33Z | 2020-09-03T19:41:05Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1388', 'https://github.com/advisories/GHSA-xcgx-27q5-7634'} | null |
GHSA | GHSA-43ch-2h55-2vj7 | Server-Side Request Forgery in private-ip | Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques. | {'CVE-2020-28360'} | 2021-07-16T14:39:54Z | 2021-04-13T15:18:17Z | CRITICAL | 9.8 | {'CWE-918'} | {'https://www.npmjs.com/package/private-ip', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://github.com/advisories/GHSA-43ch-2h55-2vj7', 'https://johnjhacking.com/blog/cve-2020-28360/', 'https://github.com/frenchbread/private-ip'} | null |
GHSA | GHSA-vw83-h3mq-3qwj | Path Traversal in Spring-integration-zip | Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. | {'CVE-2021-22114'} | 2022-03-18T21:45:43Z | 2022-03-18T17:40:44Z | MODERATE | 5.3 | {'CWE-22'} | {'https://tanzu.vmware.com/security/cve-2021-22114', 'https://github.com/advisories/GHSA-vw83-h3mq-3qwj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22114'} | null |
GHSA | GHSA-57h3-9rgr-c24m | Out of bounds write in Pillow | An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654. | {'CVE-2021-25289'} | 2021-12-02T17:48:13Z | 2021-03-29T16:35:16Z | HIGH | 8.8 | {'CWE-787'} | {'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-57h3-9rgr-c24m', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25289'} | null |
GHSA | GHSA-cf3w-g86h-35x4 | Code Injection vulnerability in CarrierWave::RMagick | ### Impact
[CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be executed as a Ruby code.
If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE).
(But supplying untrusted input to the option itself is dangerous even in absence of this vulnerability, since is prone to DoS vulnerability - attackers can try to consume massive amounts of memory by resizing to a very large dimension)
### Proof of Concept
```ruby
class MyUploader < CarrierWave::Uploader::Base
include CarrierWave::RMagick
end
MyUploader.new.manipulate!({ read: { density: "1 }; p 'Hacked'; {" }}) # => shows "Hacked"
```
### Patches
Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2).
### Workarounds
Stop supplying untrusted input to `#manipulate!`'s mutation option.
### References
[Code Injection Software Attack](https://owasp.org/www-community/attacks/Code_Injection)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave)
* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com) | {'CVE-2021-21305'} | 2022-04-27T19:58:19Z | 2021-02-08T19:16:39Z | HIGH | 7.4 | {'CWE-94', 'CWE-74'} | {'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://rubygems.org/gems/carrierwave', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://github.com/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305'} | null |
GHSA | GHSA-8rf5-92jh-3vc9 | Uncaught Exception leading to Denial of Service in json-sanitizer | OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations. | {'CVE-2021-23900'} | 2021-05-13T22:31:32Z | 2021-05-13T22:31:32Z | HIGH | 7.5 | {'CWE-248'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://github.com/advisories/GHSA-8rf5-92jh-3vc9', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900'} | null |
GHSA | GHSA-qcgx-7p5f-hxvr | Discoverability of user password hash in Statamic CMS | ## Description
It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash.
The hash would not be in the response, however the presence or absence of a result would confirm if the character was in the right position. It would take a long time since the API has throttling enabled by default.
Additionally, the REST API would need to be enabled, as well as the users endpoint. Both of which are disabled by default.
## Resolution
Filtering by password or password hash has been disabled.
## Credits
We would like to thank Thibaud Kehler for reporting the issue. | {'CVE-2022-24784'} | 2022-04-05T21:20:44Z | 2022-03-29T22:11:45Z | LOW | 3.7 | {'CWE-200', 'CWE-326'} | {'https://github.com/statamic/cms/issues/5604', 'https://github.com/advisories/GHSA-qcgx-7p5f-hxvr', 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784', 'https://github.com/statamic/cms/pull/5568'} | null |
GHSA | GHSA-q348-f93x-9gx4 | Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain | ### Impact
Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).
### Resolution
Validate the provided Zendesk subdomain to be a valid subdomain in:
* getAuthUrl
* getAccessToken | {'CVE-2021-30492'} | 2021-04-29T21:53:06Z | 2021-04-29T21:53:06Z | CRITICAL | 0 | {'CWE-20', 'CWE-918'} | {'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4', 'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/advisories/GHSA-q348-f93x-9gx4', 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'} | null |
GHSA | GHSA-j8hw-49gg-vq3w | Malicious Package in retcodelog | All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T20:00:59Z | 2020-09-03T17:45:41Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1061', 'https://github.com/advisories/GHSA-j8hw-49gg-vq3w'} | null |
GHSA | GHSA-6x3v-rw2q-9gx7 | Improper implementation of the session fixation protection in Infinispan | A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling. | {'CVE-2019-10158'} | 2021-08-19T16:28:59Z | 2020-01-21T21:18:44Z | CRITICAL | 9.8 | {'CWE-384'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10158', 'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://github.com/advisories/GHSA-6x3v-rw2q-9gx7', 'https://github.com/infinispan/infinispan/pull/7025', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/6960'} | null |
GHSA | GHSA-fwx5-5fqj-jv98 | Cross-Site Scripting in morris.js | Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.
## Recommendation
A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
```
npm i morrisjs/morris.js -s
``` | {'CVE-2017-16022'} | 2021-01-08T18:50:29Z | 2018-11-09T17:46:30Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/307', 'https://nodesecurity.io/advisories/307', 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98', 'https://github.com/morrisjs/morris.js/pull/464', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'} | null |
GHSA | GHSA-cxf7-qrc5-9446 | Remote shell execution vulnerability in image_processing | ### Impact
When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:
```rb
ImageProcessing::Vips.apply({ system: "echo EXECUTED" })
#>> EXECUTED
```
This method is called internally by Active Storage variants, so Active Storage is vulnerable as well.
### Patches
The vulnerability has been fixed in version 1.12.2 of image_processing.
### Workarounds
If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example:
```rb
operations = params[:operations]
.map { |operation| [operation[:name], *operation[:value]] }
.select { |name, *| name.to_s.include? %w[resize_to_limit strip ...] } # sanitization
ImageProcessing::Vips.apply(operations)
``` | {'CVE-2022-24720'} | 2022-03-10T15:56:29Z | 2022-03-01T22:22:26Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-78'} | {'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada', 'https://github.com/advisories/GHSA-cxf7-qrc5-9446', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'} | null |
GHSA | GHSA-r3r5-jhw6-4634 | Insecure temporary file usage in SWHKD | SWHKD 1.1.5 unsafely uses the /tmp/swhkd.sock pathname. There can be an information leak or denial of service. | {'CVE-2022-27818'} | 2022-04-19T18:16:59Z | 2022-04-08T00:00:24Z | CRITICAL | 9.1 | {'CWE-668'} | {'https://github.com/waycrate/swhkd/releases/tag/1.1.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27818', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818', 'https://github.com/advisories/GHSA-r3r5-jhw6-4634', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'} | null |
GHSA | GHSA-xf7w-r453-m56c | Arbitrary File Overwrite in fstream | Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable.
## Recommendation
Upgrade to version 1.0.12 or later. | {'CVE-2019-13173'} | 2021-08-04T20:12:16Z | 2019-05-30T17:19:34Z | HIGH | 7.5 | {'CWE-59'} | {'https://usn.ubuntu.com/4123-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'https://github.com/advisories/GHSA-xf7w-r453-m56c', 'https://www.npmjs.com/advisories/886', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html'} | null |
GHSA | GHSA-4w88-rjj3-x7wp | Chromium Remote Code Execution in electron | Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled.
## Recommendation
Update to electron version 1.7.8 or later. | {'CVE-2017-16151'} | 2021-01-08T19:53:11Z | 2018-07-24T20:04:23Z | HIGH | 0 | {'CWE-94'} | {'https://github.com/advisories/GHSA-4w88-rjj3-x7wp', 'https://www.npmjs.com/advisories/539', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16151', 'https://electronjs.org/blog/chromium-rce-vulnerability', 'https://nodesecurity.io/advisories/539', 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix'} | null |
GHSA | GHSA-jqvv-r4w3-8f7w | Malicious Package in bictoind-rpc | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:38:04Z | 2020-09-04T15:35:00Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1355', 'https://github.com/advisories/GHSA-jqvv-r4w3-8f7w'} | null |
GHSA | GHSA-hg5q-rj62-c43g | Malicious Package in reqest | All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-09-30T21:26:33Z | 2020-09-02T21:29:08Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/895', 'https://github.com/advisories/GHSA-hg5q-rj62-c43g'} | null |
GHSA | GHSA-3264-3fm9-fg44 | Infinite Loop in Apache Tika | A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23. | {'CVE-2020-1951'} | 2021-05-07T15:54:00Z | 2021-05-07T15:54:00Z | MODERATE | 5.5 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1951', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-3264-3fm9-fg44', 'https://lists.apache.org/thread.html/rd8c1b42bd0e31870d804890b3f00b13d837c528f7ebaf77031323172%40%3Cdev.tika.apache.org%3E', 'https://usn.ubuntu.com/4564-1/', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html'} | null |
GHSA | GHSA-w6g3-v46q-5p28 | Moderate severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file. | {'CVE-2018-11762'} | 2021-09-21T17:58:38Z | 2018-10-17T15:49:58Z | MODERATE | 5.9 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-11762', 'http://www.securityfocus.com/bid/105515', 'https://github.com/advisories/GHSA-w6g3-v46q-5p28', 'https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E'} | null |
GHSA | GHSA-59x4-67mh-px54 | Crypt_GPG does not prevent additional options in GPG calls | The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions. | {'CVE-2022-24953'} | 2022-03-01T18:36:14Z | 2022-02-18T00:00:36Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/advisories/GHSA-59x4-67mh-px54', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953'} | null |
GHSA | GHSA-45r8-3495-x6rm | High severity vulnerability that affects com.hubspot.jinjava:jinjava | Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java. | {'CVE-2018-18893'} | 2021-08-31T21:45:30Z | 2019-01-04T17:43:36Z | MODERATE | 5.3 | null | {'https://github.com/advisories/GHSA-45r8-3495-x6rm', 'https://github.com/HubSpot/jinjava/pull/230', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893', 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'} | null |
GHSA | GHSA-h6m7-j4h3-9rf5 | Remote Code Execution in SyliusResourceBundle | ### Impact
Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.
### Example
```yaml
sylius_grid:
grids:
foo:
fields:
bar:
options:
baz: "expr:service('sylius.repository.product').find($id)"
```
In this case, `$id` can be prepared in a way that calls other services.
If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database.
To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.
### Patches
This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
### Workarounds
The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language.
```php
- return is_string($variable) ? sprintf('"%s"', $variable) : $variable;
+ return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable;
```
### Acknowledgements
This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com) | {'CVE-2020-15146'} | 2022-04-19T19:02:33Z | 2020-08-19T19:52:30Z | CRITICAL | 9.6 | {'CWE-917', 'CWE-74'} | {'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146', 'https://github.com/advisories/GHSA-h6m7-j4h3-9rf5'} | null |
GHSA | GHSA-5fjj-cfh2-ghc5 | Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport | An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code. | {'CVE-2020-8128'} | 2021-04-13T15:25:24Z | 2021-04-13T15:25:24Z | HIGH | 9.8 | {'CWE-829', 'CWE-918'} | {'https://github.com/advisories/GHSA-5fjj-cfh2-ghc5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128', 'https://hackerone.com/reports/660565'} | null |
GHSA | GHSA-95m6-mjh3-58gm | Moderate severity vulnerability that affects org.keycloak:keycloak-core | It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks. | {'CVE-2016-8609'} | 2021-09-07T20:44:36Z | 2018-10-18T16:48:41Z | HIGH | 8.1 | {'CWE-287', 'CWE-384'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-8609', 'https://github.com/advisories/GHSA-95m6-mjh3-58gm'} | null |
GHSA | GHSA-h44f-769q-j6px | Malicious Package in requet | All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:08:16Z | 2020-09-02T20:33:14Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-h44f-769q-j6px', 'https://www.npmjs.com/advisories/864'} | null |
GHSA | GHSA-6vwp-35w3-xph8 | Insecure Deserialization in Apache XML-RPC | An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.
Apache XML-RPC is no longer maintained and this issue will not be fixed. | {'CVE-2019-17570'} | 2022-04-26T17:58:54Z | 2020-06-10T20:02:39Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17570', 'https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E', 'https://usn.ubuntu.com/4496-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html', 'https://seclists.org/bugtraq/2020/Feb/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570;', 'http://www.openwall.com/lists/oss-security/2020/01/24/2', 'https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp', 'https://www.debian.org/security/2020/dsa-4619', 'https://access.redhat.com/errata/RHSA-2020:0310', 'https://github.com/advisories/GHSA-6vwp-35w3-xph8'} | null |
GHSA | GHSA-5rcc-6cmj-7728 | Cross-site Scripting in BookStack | Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack. | {'CVE-2022-0877'} | 2022-03-14T21:03:35Z | 2022-03-09T00:00:44Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877', 'https://github.com/advisories/GHSA-5rcc-6cmj-7728'} | null |
GHSA | GHSA-qgm9-232x-hwpx | Moderate severity vulnerability that affects org.keycloak:keycloak-core | Withdrawn: Duplicate of CVE-2017-12161 / GHSA-959q-32g8-vvp7 | {'CVE-2017-1000500'} | 2021-01-29T17:10:11Z | 2018-10-18T16:48:15Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000500', 'https://github.com/advisories/GHSA-qgm9-232x-hwpx'} | null |
GHSA | GHSA-5947-m4fg-xhqg | Prototype Pollution in lodash.mergewith | Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | null | 2021-09-29T14:09:37Z | 2020-09-03T18:08:10Z | HIGH | 0 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-5947-m4fg-xhqg', 'https://www.npmjs.com/advisories/1069'} | null |
GHSA | GHSA-qj26-7grj-whg3 | Privilege Escalation in fscrypt | The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam). | {'CVE-2018-6558'} | 2021-06-23T17:18:49Z | 2021-06-23T17:18:49Z | MODERATE | 6.5 | null | {'https://github.com/google/fscrypt/issues/77', 'https://github.com/advisories/GHSA-qj26-7grj-whg3', 'https://launchpad.net/bugs/1787548', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6558', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'} | null |
GHSA | GHSA-9p64-h5q4-phpm | Remote Code Execution in office-converter | All versions of `office-converter` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-27T13:41:42Z | 2020-09-02T15:44:58Z | HIGH | 0 | {'CWE-20'} | {'https://github.com/advisories/GHSA-9p64-h5q4-phpm', 'https://www.npmjs.com/advisories/759'} | null |
GHSA | GHSA-vpq7-m4qm-p2gp | Business Logic Errors in microweber | Business Logic Errors in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0596'} | 2022-02-24T13:55:55Z | 2022-02-16T00:01:45Z | MODERATE | 4.3 | null | {'https://github.com/advisories/GHSA-vpq7-m4qm-p2gp', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5'} | null |
GHSA | GHSA-3pqh-p72c-fj85 | Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki | ### Impact
When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation.
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com | {'CVE-2021-3978'} | 2022-04-19T19:03:15Z | 2021-11-19T19:34:26Z | MODERATE | 0 | {'CWE-281'} | {'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3pqh-p72c-fj85', 'https://github.com/advisories/GHSA-3pqh-p72c-fj85'} | null |
GHSA | GHSA-87p2-cvhq-q4mv | Authentication bypass in Apache Zeppelin | Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. | {'CVE-2020-13929'} | 2021-09-29T18:03:53Z | 2021-09-07T22:56:56Z | HIGH | 7.5 | {'CWE-287'} | {'http://www.openwall.com/lists/oss-security/2021/09/02/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13929', 'https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/advisories/GHSA-87p2-cvhq-q4mv', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028%40%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cusers.zeppelin.apache.org%3E'} | null |
GHSA | GHSA-fpcp-9h7m-ffpx | Null pointer dereference in TensorFlow | ### Impact
When [building an XLA compilation cache](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104), if default settings are used, TensorFlow triggers a null pointer dereference:
```cc
string allowed_gpus =
flr->config_proto()->gpu_options().visible_device_list();
```
In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`.
### Patches
We have patched the issue in GitHub commit [e21af685e1828f7ca65038307df5cc06de4479e8](https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23595'} | 2022-02-11T19:55:41Z | 2022-02-09T23:33:17Z | MODERATE | 5.3 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23595', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104', 'https://github.com/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'} | null |
GHSA | GHSA-27xj-rqx5-2255 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). | {'CVE-2020-11619'} | 2021-08-25T21:01:55Z | 2020-05-15T18:58:44Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-27xj-rqx5-2255', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11619', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://github.com/FasterXML/jackson-databind/issues/2680', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'} | null |
GHSA | GHSA-qgwf-r2jj-2ccv | Use after free in heapless | An issue was discovered in the heapless crate before 0.6.1 for Rust. The IntoIter Clone implementation clones an entire underlying Vec without considering whether it has already been partially consumed. | {'CVE-2020-36464'} | 2021-08-25T20:56:09Z | 2021-08-25T20:56:09Z | HIGH | 7.5 | {'CWE-416'} | {'https://github.com/japaric/heapless/issues/181', 'https://github.com/advisories/GHSA-qgwf-r2jj-2ccv', 'https://rustsec.org/advisories/RUSTSEC-2020-0145.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36464'} | null |
GHSA | GHSA-599h-8wpj-75xj | Authentication Bypass in tyk-identity-broker | The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data). | {'CVE-2021-23365'} | 2021-06-23T17:23:30Z | 2021-06-23T17:23:30Z | CRITICAL | 9.1 | {'CWE-287'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0', 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1', 'https://github.com/TykTechnologies/tyk-identity-broker/pull/147', 'https://github.com/advisories/GHSA-599h-8wpj-75xj', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365'} | null |
GHSA | GHSA-9699-gm7f-cmjv | Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy | A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected. | {'CVE-2020-25724'} | 2021-06-08T22:29:46Z | 2021-06-08T22:29:46Z | MODERATE | 4.3 | {'CWE-567'} | {'https://access.redhat.com/security/cve/cve-2020-25724', 'https://github.com/advisories/GHSA-9699-gm7f-cmjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25724', 'https://bugzilla.redhat.com/show_bug.cgi?id=1899354'} | null |
GHSA | GHSA-jc7r-v6fg-2gpf | High severity vulnerability that affects org.apache.cxf:apache-cxf, org.apache.cxf:apache-cxf , and org.apache.cxf:cxf | It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks. | {'CVE-2018-8039'} | 2021-12-03T14:54:43Z | 2018-10-19T16:40:01Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-jc7r-v6fg-2gpf'} | null |
GHSA | GHSA-9jm3-5835-537m | Command Injection in apex-publish-static-files | Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method.
## Recommendation
Update to version 2.0.1 or later. | {'CVE-2018-16462'} | 2021-01-08T19:03:45Z | 2018-11-01T14:48:50Z | CRITICAL | 0 | {'CWE-77'} | {'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json', 'https://hackerone.com/reports/405694', 'https://www.npmjs.com/advisories/718', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462', 'https://github.com/advisories/GHSA-9jm3-5835-537m'} | null |
GHSA | GHSA-c9x9-xv66-xp3v | Improper privilege management in Keycloak | A flaw was found in Keycloak, where it would permit a user with a view-profile role to manage the resources in the new account console. This flaw allows a user with a view-profile role to access and modify data for which the user does not have adequate permission. | {'CVE-2020-14389'} | 2021-11-10T15:30:36Z | 2021-11-10T15:30:36Z | HIGH | 8.1 | {'CWE-916', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-14389', 'https://access.redhat.com/security/cve/cve-2020-14389', 'https://github.com/advisories/GHSA-c9x9-xv66-xp3v'} | null |
GHSA | GHSA-xqp8-w826-hh6x | Crash server with query parameter | ### Impact
Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch.
### Patches
Upgrade to Parse Server 4.10.3 | {'CVE-2021-39187'} | 2022-04-19T19:03:07Z | 2021-09-02T16:51:14Z | HIGH | 7.5 | {'CWE-74', 'CWE-20', 'CWE-755'} | {'https://jira.mongodb.org/browse/NODE-3463', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://github.com/parse-community/parse-server/releases/tag/4.10.3', 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://github.com/advisories/GHSA-xqp8-w826-hh6x'} | null |
GHSA | GHSA-6qgm-fv6v-rfpv | Overflow/denial of service in `tf.raw_ops.ReverseSequence` | ### Impact
The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service.
```python
import tensorflow as tf
input = tf.zeros([1, 1, 1], dtype=tf.int32)
seq_lengths = tf.constant([0], shape=[1], dtype=tf.int32)
tf.raw_ops.ReverseSequence(
input=input, seq_lengths=seq_lengths, seq_dim=-2, batch_dim=0)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/5b3b071975e01f0d250c928b2a8f901cd53b90a7/tensorflow/core/kernels/reverse_sequence_op.cc#L114-L118) fails to validate that `seq_dim` and `batch_dim` arguments are valid.
Negative values for `seq_dim` can result in stack overflow or `CHECK`-failure, depending on the version of Eigen code used to implement the operation. Similar behavior can be exhibited by invalid values of `batch_dim`.
### Patches
We have patched the issue in GitHub commit [ecf768cbe50cedc0a45ce1ee223146a3d3d26d23](https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29575'} | 2021-05-21T14:26:13Z | 2021-05-21T14:26:13Z | LOW | 2.5 | {'CWE-119', 'CWE-120'} | {'https://github.com/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29575'} | null |
GHSA | GHSA-m6gg-86c6-gfr9 | Cross-site Scripting in elasticsearch | A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser. | {'CVE-2022-23710'} | 2022-03-29T22:12:45Z | 2022-03-04T00:00:15Z | MODERATE | 6.1 | {'CWE-79'} | {'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447', 'https://github.com/advisories/GHSA-m6gg-86c6-gfr9', 'https://security.netapp.com/advisory/ntap-20220325-0009/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23710'} | null |
GHSA | GHSA-vqj2-4v8m-8vrq | Insecure Temporary File in mlflow | mlflow prior to 1.23.1 contains an insecure temporary file. The insecure function `tempfile.mktemp()` is deprecated and `mkstemp()` should be used instead. | {'CVE-2022-0736'} | 2022-03-03T19:18:19Z | 2022-02-24T00:00:54Z | HIGH | 8.2 | {'CWE-668', 'CWE-377'} | {'https://github.com/advisories/GHSA-vqj2-4v8m-8vrq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0736', 'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711', 'https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75'} | null |
GHSA | GHSA-gmjw-49p4-pcfm | Prototype poisoning | ### Impact
The issue is as follows: when `msgpack5` decodes a map containing a
key `"__proto__"`, it assigns the decoded value to `__proto__`. As you
are no doubt aware, `Object.prototype.__proto__` is an accessor
property for the receiver's prototype. If the value corresponding to
the key `__proto__` decodes to an object or `null`, `msgpack5` sets
the decoded object's prototype to that value.
An attacker who can submit crafted MessagePack data to a service can
use this to produce values that appear to be of other types; may have
unexpected prototype properties and methods (for example `length`,
numeric properties, and `push` et al if `__proto__`'s value decodes to
an `Array`); and/or may throw unexpected exceptions when used (for
example if the `__proto__` value decodes to a `Map` or `Date`). Other
unexpected behavior might be produced for other types.
There is no effect on the global prototype.
An example:
```js
const msgpack5 = require('msgpack5')();
const payload = {};
Object.defineProperty(payload, '__proto__', {
value: new Map().set(1, 2),
enumerable: true
});
const encoded = msgpack5.encode(payload);
console.log(encoded); // <Buffer 81 a9 5f 5f 70 72 6f 74 6f 5f 5f 81 01 02>
const decoded = msgpack5.decode(encoded);
// decoded's prototype has been overwritten
console.log(Object.getPrototypeOf(decoded)); // Map(1) { 1 => 2 }
console.log(decoded.get); // [Function: get]
// decoded appears to most common typechecks to be a Map
console.log(decoded instanceof Map); // true
console.log(decoded.toString()); // [object Map]
console.log(Object.prototype.toString.call(decoded)); // [object Map]
console.log(decoded.constructor.name); // Map
console.log(Object.getPrototypeOf(decoded).constructor.name); // Map
// decoded is not, however, a Map
console.log(Object.getPrototypeOf(decoded) === Map.prototype); // false
// using decoded as though it were a Map throws
try {
decoded.get(1);
} catch (error) {
console.log(error); // TypeError: Method Map.prototype.get called
// on incompatible receiver #<Map>
}
try {
decoded.size;
} catch (error) {
console.log(error); // TypeError: Method get Map.prototype.size
// called on incompatible receiver #<Map>
}
// re-encoding the decoded value throws
try {
msgpack5.encode(decoded);
} catch (error) {
console.log(error); // TypeError: Method Map.prototype.entries
// called on incompatible receiver #<Map>
}
```
This "prototype poisoning" is sort of a very limited inversion of a
prototype pollution attack. Only the decoded value's prototype is
affected, and it can only be set to `msgpack5` values (though if the
victim makes use of custom codecs, anything could be a `msgpack5`
value). We have not found a way to escalate this to true prototype
pollution (absent other bugs in the consumer's code).
### Patches
Versions v5.2.1, v4.5.1, v3.6.1 include the fix.
### Workarounds
Always validate incoming data after parsing before doing any processing.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com) | {'CVE-2021-21368'} | 2022-04-19T19:02:49Z | 2021-03-12T22:44:17Z | MODERATE | 6.7 | {'CWE-915'} | {'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8', 'https://www.npmjs.com/package/msgpack5', 'https://github.com/advisories/GHSA-gmjw-49p4-pcfm', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1', 'https://github.com/mcollina/msgpack5/releases/tag/v3.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm'} | null |
GHSA | GHSA-8vwm-8vj8-rqjf | User login denial of service in github.com/google/fscrypt | The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above | {'CVE-2022-25327'} | 2022-03-09T21:11:54Z | 2022-02-26T00:00:44Z | MODERATE | 5.5 | {'CWE-276'} | {'https://github.com/google/fscrypt/pull/346', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25327', 'https://github.com/advisories/GHSA-8vwm-8vj8-rqjf'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.