ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-673x-f5wx-fxpw
Cross Site Scripting and RCE in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). * Impact: XSS to RCE via Arbitrary file upload. * Attack vector is: Administrator must be logged in. * Components are: ThemeFilesController.php, UploaderFilesController.php. * Tested baserCMS Version : 4.3.6 (Latest) * Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE) * Patches : https://basercms.net/security/20200827 Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/)
{'CVE-2020-15159'}
2022-04-19T19:02:28Z
2020-08-28T21:45:15Z
LOW
7.6
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/advisories/GHSA-673x-f5wx-fxpw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159'}
null
GHSA
GHSA-hf2m-j98r-4fqw
API token verification can be bypassed in NodeBB
### Impact Incorrect logic present in the token verification step unintentionally allowed master token access to the API. ### Patches The vulnerability has been patch as of v1.18.5. ### Workarounds Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43786'}
2022-04-19T19:03:13Z
2021-11-30T22:21:05Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/advisories/GHSA-hf2m-j98r-4fqw'}
null
GHSA
GHSA-cqqj-4p63-rrmm
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
{'CVE-2019-20444'}
2021-08-25T17:26:47Z
2020-02-21T18:55:24Z
CRITICAL
9.1
{'CWE-444'}
{'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://github.com/netty/netty/pull/9871', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/issues/9866', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-cqqj-4p63-rrmm', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0601', 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}
null
GHSA
GHSA-v88g-cgmw-v5xw
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
{'CVE-2020-15366'}
2022-02-10T23:30:59Z
2022-02-10T23:30:59Z
MODERATE
5.6
{'CWE-915'}
{'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3', 'https://github.com/ajv-validator/ajv/tags', 'https://github.com/advisories/GHSA-v88g-cgmw-v5xw', 'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366'}
null
GHSA
GHSA-xf27-jqwv-gf3r
Unintended Require in larvitbase-api
Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running. ## Recommendation Upgrade to version 0.5.4 or later.
{'CVE-2019-5479'}
2021-01-08T21:27:21Z
2019-09-11T23:03:57Z
MODERATE
0
{'CWE-98'}
{'https://www.npmjs.com/advisories/1120', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5479', 'https://hackerone.com/reports/566056', 'https://github.com/advisories/GHSA-xf27-jqwv-gf3r'}
null
GHSA
GHSA-5629-8855-gf4g
Authentication Bypass by CSRF Weakness
### Impact The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details. The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end. ### Patches For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`. ### Workarounds Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). ### References - [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). ### For more information If you have any questions or comments about this advisory: * Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
null
2022-05-09T22:05:52Z
2021-11-18T20:12:40Z
CRITICAL
9.3
{'CWE-352', 'CWE-305'}
{'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-5629-8855-gf4g'}
null
GHSA
GHSA-xr9h-9m79-x29g
SSRF in Rendertron
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
{'CVE-2020-8902'}
2021-03-01T19:38:23Z
2021-03-01T19:38:23Z
MODERATE
0
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8902', 'https://www.npmjs.com/package/rendertron', 'https://github.com/advisories/GHSA-xr9h-9m79-x29g', 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0'}
null
GHSA
GHSA-579h-mv94-g4gp
Privilege Escalation in Kubernetes
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
{'CVE-2018-1002105'}
2022-04-12T22:34:38Z
2022-02-15T01:57:18Z
CRITICAL
9.8
{'CWE-269'}
{'https://www.securityfocus.com/bid/106068', 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905', 'https://access.redhat.com/errata/RHSA-2018:3598', 'https://www.exploit-db.com/exploits/46052/', 'https://www.openwall.com/lists/oss-security/2019/07/06/4', 'https://github.com/kubernetes/kubernetes/issues/71411', 'https://access.redhat.com/errata/RHSA-2018:3752', 'https://github.com/advisories/GHSA-579h-mv94-g4gp', 'https://security.netapp.com/advisory/ntap-20190416-0001/', 'https://www.exploit-db.com/exploits/46053/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105', 'https://www.openwall.com/lists/oss-security/2019/06/28/2', 'https://access.redhat.com/errata/RHSA-2018:3754', 'https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88', 'https://access.redhat.com/errata/RHSA-2018:3537', 'https://access.redhat.com/errata/RHSA-2018:3624', 'https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html', 'https://access.redhat.com/errata/RHSA-2018:3742', 'https://www.openwall.com/lists/oss-security/2019/07/06/3', 'https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do', 'https://access.redhat.com/errata/RHSA-2018:3551', 'https://access.redhat.com/errata/RHSA-2018:3549', 'https://www.exploit-db.com/exploits/46053', 'https://github.com/evict/poc_CVE-2018-1002105'}
null
GHSA
GHSA-g7w8-pp9w-7p32
Creation of order credits was not validated by acl in admin orders
### Impact Creation of order credits was not validated by ACL in admin orders ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
null
2021-10-05T17:26:04Z
2021-06-28T16:57:32Z
LOW
0
{'CWE-306'}
{'https://www.shopware.com/en/download/#shopware-6', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709', 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://github.com/advisories/GHSA-g7w8-pp9w-7p32'}
null
GHSA
GHSA-xpfv-89vg-r562
Cross Site Request Forgery in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
{'CVE-2022-0335'}
2022-02-02T16:06:35Z
2022-01-28T22:07:23Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0335', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://github.com/advisories/GHSA-xpfv-89vg-r562', 'https://moodle.org/mod/forum/discuss.php?d=431103'}
null
GHSA
GHSA-p9g3-vpvp-hcj5
Malicious Package in bufber-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:56:22Z
2020-09-03T21:41:55Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1234', 'https://github.com/advisories/GHSA-p9g3-vpvp-hcj5'}
null
GHSA
GHSA-mcfm-h73v-635m
High severity vulnerability that affects io.undertow:undertow-core
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
{'CVE-2017-2666'}
2021-09-15T18:53:08Z
2018-10-19T16:55:14Z
MODERATE
6.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-2666', 'https://github.com/advisories/GHSA-mcfm-h73v-635m'}
null
GHSA
GHSA-322m-p39j-r5m2
Malicious Package in npm-script-demo
The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given. It has been removed from the npm registry. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2017-16128'}
2021-01-14T15:35:14Z
2020-09-01T18:55:37Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/481', 'https://nodesecurity.io/advisories/481', 'https://github.com/advisories/GHSA-322m-p39j-r5m2', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128'}
null
GHSA
GHSA-68wg-qv6r-j4vp
SQL Injection in usmanhalalit/pixie
Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.
{'CVE-2019-10766'}
2021-08-18T22:44:59Z
2019-11-20T17:44:54Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10766', 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9', 'https://github.com/advisories/GHSA-68wg-qv6r-j4vp'}
null
GHSA
GHSA-3fxp-vwxm-2r5p
Command injection in gitlogplus
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
{'CVE-2021-23412'}
2021-08-03T18:58:28Z
2021-07-26T21:23:35Z
CRITICAL
9.8
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832', 'https://hackerone.com/reports/808942', 'https://github.com/advisories/GHSA-3fxp-vwxm-2r5p', 'https://www.npmjs.com/package/gitlogplus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412'}
null
GHSA
GHSA-7fjp-g4m7-fx23
User (Encrypted) Password Field Being Serialised
### Impact Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed. ### Patches Issue has been patched in version 0.3.7-beta and onwards. ### Workarounds Add the 'password' field to the Users model file in the hidden array: ```php /** * The attributes that should be hidden for arrays. * * @var array */ protected $hidden = [ 'remember_token', 'password', ]; ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core) * Email us at [security@pw-websolutions.com](mailto:security@pw-websolutions.com)
null
2021-04-13T15:12:26Z
2021-04-13T15:12:26Z
LOW
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-7fjp-g4m7-fx23', 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}
null
GHSA
GHSA-p86x-652p-6385
Incorrect Default Permissions in keyring
Python keyring lib before 0.10 created keyring files with world-readable permissions.
{'CVE-2012-5577'}
2021-08-19T21:56:10Z
2020-03-11T21:36:38Z
HIGH
7.5
{'CWE-276'}
{'https://github.com/advisories/GHSA-p86x-652p-6385', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5577', 'https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5577', 'http://www.openwall.com/lists/oss-security/2012/11/27/3', 'https://security-tracker.debian.org/tracker/CVE-2012-5577', 'https://bitbucket.org/kang/python-keyring-lib/issue/67/set-go-rwx-on-keyring_passcfg'}
null
GHSA
GHSA-g54x-29xv-58h5
Remote code execution in Subrion
Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval().
{'CVE-2021-43464'}
2022-04-15T02:46:22Z
2022-04-05T00:00:23Z
HIGH
8.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43464', 'https://github.com/advisories/GHSA-g54x-29xv-58h5', 'https://github.com/intelliants/subrion/issues/888'}
null
GHSA
GHSA-8hmr-w35f-3qgj
Malicious Package in harmlesspackage
Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server. ## Recommendation Remove the package from your environment. There is no evidence of further compromise.
null
2021-09-29T20:46:21Z
2020-09-03T21:07:37Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1199', 'https://github.com/advisories/GHSA-8hmr-w35f-3qgj'}
null
GHSA
GHSA-23f7-99jx-m54r
Remote code execution in dependabot-core branch names when cloning
### Impact Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. When Dependabot is configured to clone the source repository during an update, Dependabot runs a shell command to git clone the repository: ```bash git clone --no-tags --no-recurse-submodules --depth=1 --branch=<BRANCH> --single-branch <GITHUB_REPO_URL> repo/contents/path ``` Dependabot will always clone the source repository for `go_modules` during the file fetching step and can be configured to clone the repository for other package managers using the `FileFetcher` class from `dependabot-common`. ```ruby source = Dependabot::Source.new( provider: "github", repo: "repo/name", directory: "/", branch: "/$({curl,127.0.0.1})", ) repo_contents_path = "./file/path" fetcher = Dependabot::FileFetchers.for_package_manager("bundler"). new(source: source, credentials: [], repo_contents_path: repo_contents_path) fetcher.clone_repo_contents ``` ### Patches The fix was applied to version `0.125.1`: https://github.com/dependabot/dependabot-core/pull/2727 ### Workarounds Escape the branch name prior to passing it to the `Dependabot::Source` class. For example using `shellwords`: ```ruby require "shellwords" branch = Shellwords.escape("/$({curl,127.0.0.1})") source = Dependabot::Source.new( provider: "github", repo: "repo/name", directory: "/", branch: branch, ) ```
{'CVE-2020-26222'}
2022-04-19T19:02:40Z
2020-11-13T15:47:50Z
LOW
8.7
{'CWE-74'}
{'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5', 'https://github.com/advisories/GHSA-23f7-99jx-m54r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/dependabot-core/pull/2727', 'https://rubygems.org/gems/dependabot-common'}
null
GHSA
GHSA-m6cx-g6qm-p2cx
Arbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
{'CVE-2019-16775'}
2022-04-19T19:02:23Z
2019-12-13T15:39:19Z
HIGH
7.7
{'CWE-61', 'CWE-59'}
{'https://access.redhat.com/errata/RHEA-2020:0330', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://access.redhat.com/errata/RHSA-2020:0573', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://www.npmjs.com/advisories/1434'}
null
GHSA
GHSA-mwgj-7x7j-6966
Deserialization of Untrusted Data in ParlAI
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
{'CVE-2021-24040'}
2021-09-15T18:26:36Z
2021-09-13T20:06:14Z
MODERATE
0
{'CWE-502'}
{'https://github.com/advisories/GHSA-mwgj-7x7j-6966', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg', 'https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0', 'http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24040'}
null
GHSA
GHSA-85rr-4rh9-hhwh
Memory leak in Nanopb
### Impact Decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. ### Patches Preliminary patch is [available on git](https://github.com/nanopb/nanopb/commit/edf6dcbffee4d614ac0c2c1b258ab95185bdb6e9) and problem will be patched in versions 0.3.9.7 and 0.4.4 once testing has been completed. ### Workarounds Following workarounds are available: * Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. * Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed. * Use an arena allocator for nanopb, to make sure all memory can be released afterwards. ### References Bug report: https://github.com/nanopb/nanopb/issues/615 ### For more information If you have any questions or comments about this advisory, comment on the bug report linked above.
{'CVE-2020-26243'}
2021-01-07T22:39:40Z
2020-11-25T16:53:27Z
MODERATE
7.5
{'CWE-119', 'CWE-20'}
{'https://github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/nanopb/nanopb/blob/2b48a361786dfb1f63d229840217a93aae064667/CHANGELOG.txt', 'https://github.com/advisories/GHSA-85rr-4rh9-hhwh', 'https://github.com/nanopb/nanopb/issues/615', 'https://github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26243'}
null
GHSA
GHSA-384w-5v3f-q499
Base class whitelist configuration ignored in OAuthenticator
### Impact __What goes wrong?__ The deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If this is the only mechanism of authorization restriction (i.e. no group or team restrictions in configuration) then all authenticated users will be allowed. Provider-based restrictions, including deprecated values such as `GitHubOAuthenticator.org_whitelist` are **not** affected. __Who is impacted?__ All users of OAuthenticator 0.12.0 and 0.12.1 with JupyterHub 1.2 (JupyterHub Helm chart 0.10.0-0.10.5) who use the `admin.whitelist.users` configuration in the jupyterhub helm chart or the `c.Authenticator.whitelist` configuration directly. Users of other deprecated configuration, e.g. `c.GitHubOAuthenticator.team_whitelist` are **not** affected. If you see a log line like this and expect a specific list of allowed usernames: ``` [I 2020-11-27 16:51:54.528 JupyterHub app:1717] Not using allowed_users. Any authenticated user will be allowed. ``` you are likely affected. ### Patches - Replacing deprecated `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue. - Update oauthenticator to 0.12.2 - Update jupyterhub helm chart to 0.10.6 If any users have been authorized during this time who should not have been, they must be deleted via the API or admin interface, [per the documentation](https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub). ### Workarounds Replacing `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue. In the jupyterhub helm chart prior to 0.10.6, this can be done via `hub.extraConfig`: ```yaml auth: allowedUsers: - user1 - user2 hub: extraConfig: allowedUsers: | # set new field not exposed in helm chart < 0.10.6 set_config_if_not_none(c.Authenticator, "allowed_users", "auth.allowedUsers") ``` ### For more information If you have any questions or comments about this advisory: * Open a thread [on the Jupyter forum](http://discourse.jupyter.org) * Email us at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2020-26250'}
2021-01-07T22:38:55Z
2020-12-01T20:25:00Z
HIGH
6.3
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26250', 'https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-384w-5v3f-q499', 'https://github.com/advisories/GHSA-384w-5v3f-q499', 'https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub', 'https://github.com/jupyterhub/oauthenticator/blob/master/docs/source/changelog.md#0122---2020-11-30', 'https://github.com/jupyterhub/oauthenticator/commit/a4aac191c16cf6281f3d346615aefa75702b02d7'}
null
GHSA
GHSA-79hv-pfx6-hhpj
Cross-site scripting (XSS)
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.
{'CVE-2021-28088'}
2021-03-12T21:34:02Z
2021-03-12T21:34:02Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28088', 'https://github.com/advisories/GHSA-79hv-pfx6-hhpj', 'https://hackerone.com/reports/1119296', 'https://anotepad.com/note/read/s3kkk6h7'}
null
GHSA
GHSA-rxq3-gm4p-5fj4
High severity vulnerability that affects rails
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
{'CVE-2009-2422'}
2021-09-20T14:46:40Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-287'}
{'http://support.apple.com/kb/HT4077', 'http://www.securityfocus.com/bid/35579', 'http://www.vupen.com/english/advisories/2009/1802', 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4', 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s', 'http://secunia.com/advisories/35702', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528', 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest'}
null
GHSA
GHSA-gcvh-66ff-4mwm
`CHECK`-failures in Tensorflow
### Impact The [implementation of `MapStage`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550) is vulnerable a `CHECK`-fail if the key tensor is not a scalar: ```python import tensorflow as tf import numpy as np tf.raw_ops.MapStage( key = tf.constant(value=[4], shape= (1,2), dtype=tf.int64), indices = np.array([[6]]), values = np.array([-60]), dtypes = [tf.int64], capacity=0, memory_limit=0, container='', shared_name='', name=None ) ``` ### Patches We have patched the issue in GitHub commit [f57315566d7094f322b784947093406c2aea0d7d](https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia. ~
{'CVE-2022-21734'}
2022-02-11T16:55:37Z
2022-02-10T00:21:12Z
MODERATE
6.5
{'CWE-617', 'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21734', 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550'}
null
GHSA
GHSA-jxg6-fhwc-9v9c
Regular Expression Denial of Service (ReDoS) in es6-crawler-detect
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
{'CVE-2020-28501'}
2021-04-13T15:19:39Z
2021-04-13T15:19:39Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/advisories/GHSA-jxg6-fhwc-9v9c', 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529', 'https://github.com/JefferyHus/es6-crawler-detect/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}
null
GHSA
GHSA-r695-7vr9-jgc2
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
{'CVE-2020-36187'}
2022-02-08T21:37:41Z
2021-12-09T19:16:51Z
HIGH
8.1
{'CWE-502'}
{'https://github.com/advisories/GHSA-r695-7vr9-jgc2', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-7mg4-w3w5-x5pc
Prototype pollution in json-pointer
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.
{'CVE-2020-7709'}
2021-07-29T22:28:51Z
2021-05-10T18:37:47Z
MODERATE
6
{'CWE-1321'}
{'https://github.com/advisories/GHSA-7mg4-w3w5-x5pc', 'https://www.npmjs.com/package/json-pointer', 'https://github.com/manuelstofer/json-pointer/pull/34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7709', 'https://github.com/manuelstofer/json-pointer/pull/34/files', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925'}
null
GHSA
GHSA-crf2-xm6x-46p6
Observable Timing Discrepancy in OpenMage LTS
### Impact This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks ### Patches The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved ### References Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html ) fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4 as part of 2.4.0/2.3.5-p2
{'CVE-2020-15151'}
2022-04-19T19:02:33Z
2020-08-19T18:02:36Z
HIGH
8
{'CWE-352', 'CWE-203'}
{'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://github.com/advisories/GHSA-crf2-xm6x-46p6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://helpx.adobe.com/security/products/magento/apsb20-47.html'}
null
GHSA
GHSA-cghx-9gcr-r42x
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
{'CVE-2020-8570'}
2021-04-12T20:53:33Z
2021-01-29T18:12:54Z
MODERATE
7.5
{'CWE-22'}
{'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589', 'https://github.com/kubernetes-client/java/pull/1450', 'https://github.com/advisories/GHSA-cghx-9gcr-r42x', 'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E', 'https://github.com/kubernetes-client/java/issues/1491'}
null
GHSA
GHSA-jxfh-8wgv-vfr2
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
{'CVE-2020-5258'}
2022-04-01T20:24:08Z
2020-03-10T18:03:14Z
HIGH
7.7
{'CWE-94', 'CWE-74', 'CWE-1321'}
{'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E', 'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2', 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-jxfh-8wgv-vfr2', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-c289-47qf-rvrr
Low severity vulnerability that affects easymon
easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later.
{'CVE-2018-1000855'}
2021-09-08T21:08:48Z
2018-12-21T17:46:03Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/basecamp/easymon/issues/26', 'https://github.com/advisories/GHSA-c289-47qf-rvrr', 'https://github.com/basecamp/easymon/pull/25', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855'}
null
GHSA
GHSA-832h-xg76-4gv6
ReDoS in brace-expansion
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition. ## Proof of Concept ``` var expand = require('brace-expansion'); expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}'); ``` ## Recommendation Update to version 1.1.7 or later.
{'CVE-2017-18077'}
2021-09-03T22:10:25Z
2018-01-29T15:50:46Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-832h-xg76-4gv6', 'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://bugs.debian.org/862712', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3', 'https://github.com/juliangruber/brace-expansion/issues/33', 'https://nodesecurity.io/advisories/338'}
null
GHSA
GHSA-3vv5-42wr-m32g
Downloads Resources over HTTP in scala-bin
Affected versions of `scala-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scala-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10627'}
2021-01-08T19:58:46Z
2019-02-18T23:57:00Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/227', 'https://github.com/advisories/GHSA-3vv5-42wr-m32g', 'https://www.npmjs.com/advisories/227', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10627'}
null
GHSA
GHSA-w655-w578-99pq
High severity vulnerability that affects espeak-ruby
Withdrawn, accidental duplicate publish. The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
null
2021-12-03T14:11:04Z
2018-08-21T17:09:08Z
HIGH
0
null
{'https://github.com/advisories/GHSA-w655-w578-99pq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}
null
GHSA
GHSA-8h2j-cgx8-6xv7
Cross-Site Request Forgery (CSRF) in FastAPI
### Impact FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack. In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`). So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted. But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application. ### Patches This is fixed in FastAPI `0.65.2`. The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`. ### Workarounds It's best to upgrade to the latest FastAPI. But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type. ### References * [CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) * [This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531) * [OWASP CSRF](https://owasp.org/www-community/attacks/csrf) * Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118) ### For more information If you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com)
{'CVE-2021-32677'}
2022-04-19T19:02:59Z
2021-06-10T15:43:54Z
HIGH
8.2
{'CWE-352'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATAWX25TYKNEKLDMKWNLYDB34UWTROA/', 'https://github.com/advisories/GHSA-8h2j-cgx8-6xv7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32677', 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d', 'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7'}
null
GHSA
GHSA-g68x-vvqq-pvw3
Moderate severity vulnerability that affects ckeditor
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
{'CVE-2018-17960'}
2021-09-10T20:27:13Z
2018-11-21T22:19:50Z
MODERATE
6.1
{'CWE-79'}
{'http://www.securityfocus.com/bid/109205', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960', 'https://github.com/advisories/GHSA-g68x-vvqq-pvw3', 'https://ckeditor.com/cke4/release/CKEditor-4.11.0'}
null
GHSA
GHSA-vr8q-g5c7-m54m
XXE in Nokogiri
### Severity Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N). ### Description In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as **untrusted** by default whenever possible. Please note that this security fix was pushed into a new minor version, 1.11.x, rather than a patch release to the 1.10.x branch, because it is a breaking change for some schemas and the risk was assessed to be "Low Severity". ### Affected Versions Nokogiri `<= 1.10.10` as well as prereleases `1.11.0.rc1`, `1.11.0.rc2`, and `1.11.0.rc3` ### Mitigation There are no known workarounds for affected versions. Upgrade to Nokogiri `1.11.0.rc4` or later. If, after upgrading to `1.11.0.rc4` or later, you wish to re-enable network access for resolution of external resources (i.e., return to the previous behavior): 1. Ensure the input is trusted. Do not enable this option for untrusted input. 2. When invoking the `Nokogiri::XML::Schema` constructor, pass as the second parameter an instance of `Nokogiri::XML::ParseOptions` with the `NONET` flag turned off. So if your previous code was: ``` ruby # in v1.11.0.rc3 and earlier, this call allows resources to be accessed over the network # but in v1.11.0.rc4 and later, this call will disallow network access for external resources schema = Nokogiri::XML::Schema.new(schema) # in v1.11.0.rc4 and later, the following is equivalent to the code above # (the second parameter is optional, and this demonstrates its default value) schema = Nokogiri::XML::Schema.new(schema, Nokogiri::XML::ParseOptions::DEFAULT_SCHEMA) ``` Then you can add the second parameter to indicate that the input is trusted by changing it to: ``` ruby # in v1.11.0.rc3 and earlier, this would raise an ArgumentError # but in v1.11.0.rc4 and later, this allows resources to be accessed over the network schema = Nokogiri::XML::Schema.new(trusted_schema, Nokogiri::XML::ParseOptions.new.nononet) ``` ### References - [This issue's public advisory](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m) - [Original Hackerone report (private)](https://hackerone.com/reports/747489) - [OWASP description of XXE attack](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing) - [OWASP description of SSRF attack](https://www.owasp.org/index.php/Server_Side_Request_Forgery) ### Credit This vulnerability was independently reported by @eric-therond and @gucki. The Nokogiri maintainers would like to thank [HackerOne](https://hackerone.com/nokogiri) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to us.
{'CVE-2020-26247'}
2022-04-19T19:02:42Z
2020-12-30T18:35:06Z
MODERATE
4.3
{'CWE-611'}
{'https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4', 'https://github.com/advisories/GHSA-vr8q-g5c7-m54m', 'https://hackerone.com/reports/747489', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m', 'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b', 'https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03', 'https://rubygems.org/gems/nokogiri', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html'}
null
GHSA
GHSA-82hm-vh7g-hrh9
Partial read is incorrect in molecule
### Impact Anyone who uses `total_size(..)` function to partial read the length of any `FixVec` will get an incorrect result, due to an incorrect implementation. This has been resolved in the 0.7.2 release. ### Workarounds If you already have the whole `FixVec` `A`, you can use `A.as_slice().len()` to get the total size of the `FixVec`. ### For more information If you have any questions or comments about this advisory: - [Open an issue to ask use directly](https://github.com/nervosnetwork/molecule/issues/new).
null
2021-09-09T17:55:11Z
2021-08-25T21:01:25Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-82hm-vh7g-hrh9', 'https://github.com/nervosnetwork/molecule/security/advisories/GHSA-82hm-vh7g-hrh9', 'https://github.com/nervosnetwork/molecule/pull/49'}
null
GHSA
GHSA-5ww9-j83m-q7qx
Information exposure in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
{'CVE-2019-12086'}
2022-04-21T17:54:12Z
2019-05-23T09:32:24Z
HIGH
7.5
{'CWE-502'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2326', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://github.com/advisories/GHSA-5ww9-j83m-q7qx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2@%3Creviews.spark.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html', 'http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/', 'http://www.securityfocus.com/bid/109227', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-5jpf-pj32-xx53
Authorization header is not sanitized in an error object in auth0
### Overview Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using `auth0` npm package - You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials ### How to fix that? Upgrade to version `2.27.1` ### Will this update impact my users? The fix provided in patch will not affect your users. ### Credit http://github.com/osdiab
{'CVE-2020-15125'}
2022-04-19T19:02:31Z
2020-07-29T16:26:22Z
HIGH
7.7
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.com/auth0/node-auth0/pull/507', 'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53', 'https://github.com/advisories/GHSA-5jpf-pj32-xx53'}
null
GHSA
GHSA-6cwv-x26c-w2q4
Jupyter Notebook file bypasses sanitization, executes JavaScript
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
{'CVE-2018-8768'}
2022-04-26T18:05:03Z
2018-07-12T12:00:00Z
HIGH
7.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8768', 'https://github.com/advisories/GHSA-6cwv-x26c-w2q4', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'http://openwall.com/lists/oss-security/2018/03/15/2'}
null
GHSA
GHSA-7rpj-hg47-cx62
Improper Restriction of XML External Entity Reference in com.h2database:h2.
H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
{'CVE-2021-23463'}
2022-04-22T15:39:59Z
2021-12-16T14:29:57Z
HIGH
8.1
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463', 'https://github.com/h2database/h2database/pull/3199', 'https://github.com/advisories/GHSA-7rpj-hg47-cx62', 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://github.com/h2database/h2database/issues/3195'}
null
GHSA
GHSA-mph4-vhrx-mv67
Deserialization of Untrusted Data in FasterXML jackson-databind
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
{'CVE-2019-12384'}
2021-04-23T20:16:18Z
2019-07-05T21:07:27Z
MODERATE
5.9
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:3200', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://doyensec.com/research.html', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://security.netapp.com/advisory/ntap-20190703-0002/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://blog.doyensec.com/2019/07/22/jackson-gadgets.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://access.redhat.com/errata/RHSA-2019:1820', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:2720', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12384', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-mph4-vhrx-mv67', 'https://access.redhat.com/errata/RHSA-2019:3292'}
null
GHSA
GHSA-2rxh-h6h9-qrqc
Class destructors causing side-effects when being unserialized in TYPO3 CMS
Calling unserialize() on malicious user-submitted content can result in the following scenarios: - trigger deletion of arbitrary directory in file system (if writable for web server) - trigger message submission via email using identity of web site (mail relay) Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-004
{'CVE-2020-11066'}
2022-04-19T19:02:26Z
2020-05-13T23:18:38Z
HIGH
8.7
{'CWE-915'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066', 'https://github.com/advisories/GHSA-2rxh-h6h9-qrqc'}
null
GHSA
GHSA-64fq-9c6w-rq44
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
{'CVE-2021-43515'}
2022-04-22T20:21:49Z
2022-04-09T00:00:25Z
HIGH
7.8
{'CWE-1236'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43515', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf', 'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/advisories/GHSA-64fq-9c6w-rq44'}
null
GHSA
GHSA-m36m-x4c5-rjxj
Silently Runs Cryptocoin Miner in hooka-tools
Affected versions of `hooka-tools` were compromised and modified to silently run a cryptocoin miner in the background. All affected versions have been unpublished from the npm registry. ## Recommendation While this module has been unpublished, some versions may exist in mirrors or caches. Do not install this module, and remove it if found.
null
2020-09-01T19:01:58Z
2020-09-01T19:01:58Z
LOW
0
null
{'https://github.com/advisories/GHSA-m36m-x4c5-rjxj', 'https://www.npmjs.com/advisories/549'}
null
GHSA
GHSA-44qp-qhfv-c7f6
Improper Handling of Exceptional Conditions in Apache Tomcat
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
{'CVE-2021-30639'}
2022-02-08T21:20:55Z
2021-08-13T15:21:02Z
HIGH
7.5
{'CWE-755'}
{'https://github.com/advisories/GHSA-44qp-qhfv-c7f6', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cusers.tomcat.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30639', 'https://lists.apache.org/thread.html/rd84fae1f474597bdf358f5bdc0a5c453c507bd527b83e8be6b5ea3f4%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-vc3x-gx6c-g99f
Denial of Service in Bytom
In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash.
{'CVE-2018-18206'}
2022-04-12T22:33:07Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/Bytom/bytom/pull/1307', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18206', 'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42', 'https://github.com/advisories/GHSA-vc3x-gx6c-g99f'}
null
GHSA
GHSA-53r4-h27g-rg3x
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0992'}
2021-03-29T20:59:07Z
2021-03-29T20:59:07Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0992', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/advisories/GHSA-53r4-h27g-rg3x'}
null
GHSA
GHSA-xcgx-27q5-7634
Malicious Package in commanedr
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:33Z
2020-09-03T19:41:05Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1388', 'https://github.com/advisories/GHSA-xcgx-27q5-7634'}
null
GHSA
GHSA-43ch-2h55-2vj7
Server-Side Request Forgery in private-ip
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
{'CVE-2020-28360'}
2021-07-16T14:39:54Z
2021-04-13T15:18:17Z
CRITICAL
9.8
{'CWE-918'}
{'https://www.npmjs.com/package/private-ip', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://github.com/advisories/GHSA-43ch-2h55-2vj7', 'https://johnjhacking.com/blog/cve-2020-28360/', 'https://github.com/frenchbread/private-ip'}
null
GHSA
GHSA-vw83-h3mq-3qwj
Path Traversal in Spring-integration-zip
Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
{'CVE-2021-22114'}
2022-03-18T21:45:43Z
2022-03-18T17:40:44Z
MODERATE
5.3
{'CWE-22'}
{'https://tanzu.vmware.com/security/cve-2021-22114', 'https://github.com/advisories/GHSA-vw83-h3mq-3qwj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22114'}
null
GHSA
GHSA-57h3-9rgr-c24m
Out of bounds write in Pillow
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
{'CVE-2021-25289'}
2021-12-02T17:48:13Z
2021-03-29T16:35:16Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-57h3-9rgr-c24m', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25289'}
null
GHSA
GHSA-cf3w-g86h-35x4
Code Injection vulnerability in CarrierWave::RMagick
### Impact [CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). (But supplying untrusted input to the option itself is dangerous even in absence of this vulnerability, since is prone to DoS vulnerability - attackers can try to consume massive amounts of memory by resizing to a very large dimension) ### Proof of Concept ```ruby class MyUploader < CarrierWave::Uploader::Base include CarrierWave::RMagick end MyUploader.new.manipulate!({ read: { density: "1 }; p 'Hacked'; {" }}) # => shows "Hacked" ``` ### Patches Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). ### Workarounds Stop supplying untrusted input to `#manipulate!`'s mutation option. ### References [Code Injection Software Attack](https://owasp.org/www-community/attacks/Code_Injection) ### For more information If you have any questions or comments about this advisory: * Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) * Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
{'CVE-2021-21305'}
2022-04-27T19:58:19Z
2021-02-08T19:16:39Z
HIGH
7.4
{'CWE-94', 'CWE-74'}
{'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://rubygems.org/gems/carrierwave', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://github.com/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305'}
null
GHSA
GHSA-8rf5-92jh-3vc9
Uncaught Exception leading to Denial of Service in json-sanitizer
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
{'CVE-2021-23900'}
2021-05-13T22:31:32Z
2021-05-13T22:31:32Z
HIGH
7.5
{'CWE-248'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://github.com/advisories/GHSA-8rf5-92jh-3vc9', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900'}
null
GHSA
GHSA-qcgx-7p5f-hxvr
Discoverability of user password hash in Statamic CMS
## Description It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash. The hash would not be in the response, however the presence or absence of a result would confirm if the character was in the right position. It would take a long time since the API has throttling enabled by default. Additionally, the REST API would need to be enabled, as well as the users endpoint. Both of which are disabled by default. ## Resolution Filtering by password or password hash has been disabled. ## Credits We would like to thank Thibaud Kehler for reporting the issue.
{'CVE-2022-24784'}
2022-04-05T21:20:44Z
2022-03-29T22:11:45Z
LOW
3.7
{'CWE-200', 'CWE-326'}
{'https://github.com/statamic/cms/issues/5604', 'https://github.com/advisories/GHSA-qcgx-7p5f-hxvr', 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784', 'https://github.com/statamic/cms/pull/5568'}
null
GHSA
GHSA-q348-f93x-9gx4
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain
### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
{'CVE-2021-30492'}
2021-04-29T21:53:06Z
2021-04-29T21:53:06Z
CRITICAL
0
{'CWE-20', 'CWE-918'}
{'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4', 'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/advisories/GHSA-q348-f93x-9gx4', 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}
null
GHSA
GHSA-j8hw-49gg-vq3w
Malicious Package in retcodelog
All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:00:59Z
2020-09-03T17:45:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1061', 'https://github.com/advisories/GHSA-j8hw-49gg-vq3w'}
null
GHSA
GHSA-6x3v-rw2q-9gx7
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
{'CVE-2019-10158'}
2021-08-19T16:28:59Z
2020-01-21T21:18:44Z
CRITICAL
9.8
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10158', 'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://github.com/advisories/GHSA-6x3v-rw2q-9gx7', 'https://github.com/infinispan/infinispan/pull/7025', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/6960'}
null
GHSA
GHSA-fwx5-5fqj-jv98
Cross-Site Scripting in morris.js
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded. ## Recommendation A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via: ``` npm i morrisjs/morris.js -s ```
{'CVE-2017-16022'}
2021-01-08T18:50:29Z
2018-11-09T17:46:30Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/307', 'https://nodesecurity.io/advisories/307', 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98', 'https://github.com/morrisjs/morris.js/pull/464', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022'}
null
GHSA
GHSA-cxf7-qrc5-9446
Remote shell execution vulnerability in image_processing
### Impact When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands: ```rb ImageProcessing::Vips.apply({ system: "echo EXECUTED" }) #>> EXECUTED ``` This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. ### Patches The vulnerability has been fixed in version 1.12.2 of image_processing. ### Workarounds If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example: ```rb operations = params[:operations] .map { |operation| [operation[:name], *operation[:value]] } .select { |name, *| name.to_s.include? %w[resize_to_limit strip ...] } # sanitization ImageProcessing::Vips.apply(operations) ```
{'CVE-2022-24720'}
2022-03-10T15:56:29Z
2022-03-01T22:22:26Z
CRITICAL
9.8
{'CWE-20', 'CWE-78'}
{'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada', 'https://github.com/advisories/GHSA-cxf7-qrc5-9446', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'}
null
GHSA
GHSA-r3r5-jhw6-4634
Insecure temporary file usage in SWHKD
SWHKD 1.1.5 unsafely uses the /tmp/swhkd.sock pathname. There can be an information leak or denial of service.
{'CVE-2022-27818'}
2022-04-19T18:16:59Z
2022-04-08T00:00:24Z
CRITICAL
9.1
{'CWE-668'}
{'https://github.com/waycrate/swhkd/releases/tag/1.1.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27818', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818', 'https://github.com/advisories/GHSA-r3r5-jhw6-4634', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'}
null
GHSA
GHSA-xf7w-r453-m56c
Arbitrary File Overwrite in fstream
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable. ## Recommendation Upgrade to version 1.0.12 or later.
{'CVE-2019-13173'}
2021-08-04T20:12:16Z
2019-05-30T17:19:34Z
HIGH
7.5
{'CWE-59'}
{'https://usn.ubuntu.com/4123-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'https://github.com/advisories/GHSA-xf7w-r453-m56c', 'https://www.npmjs.com/advisories/886', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html'}
null
GHSA
GHSA-4w88-rjj3-x7wp
Chromium Remote Code Execution in electron
Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled. ## Recommendation Update to electron version 1.7.8 or later.
{'CVE-2017-16151'}
2021-01-08T19:53:11Z
2018-07-24T20:04:23Z
HIGH
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-4w88-rjj3-x7wp', 'https://www.npmjs.com/advisories/539', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16151', 'https://electronjs.org/blog/chromium-rce-vulnerability', 'https://nodesecurity.io/advisories/539', 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix'}
null
GHSA
GHSA-jqvv-r4w3-8f7w
Malicious Package in bictoind-rpc
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:04Z
2020-09-04T15:35:00Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1355', 'https://github.com/advisories/GHSA-jqvv-r4w3-8f7w'}
null
GHSA
GHSA-hg5q-rj62-c43g
Malicious Package in reqest
All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:26:33Z
2020-09-02T21:29:08Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/895', 'https://github.com/advisories/GHSA-hg5q-rj62-c43g'}
null
GHSA
GHSA-3264-3fm9-fg44
Infinite Loop in Apache Tika
A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23.
{'CVE-2020-1951'}
2021-05-07T15:54:00Z
2021-05-07T15:54:00Z
MODERATE
5.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1951', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-3264-3fm9-fg44', 'https://lists.apache.org/thread.html/rd8c1b42bd0e31870d804890b3f00b13d837c528f7ebaf77031323172%40%3Cdev.tika.apache.org%3E', 'https://usn.ubuntu.com/4564-1/', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html'}
null
GHSA
GHSA-w6g3-v46q-5p28
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
{'CVE-2018-11762'}
2021-09-21T17:58:38Z
2018-10-17T15:49:58Z
MODERATE
5.9
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11762', 'http://www.securityfocus.com/bid/105515', 'https://github.com/advisories/GHSA-w6g3-v46q-5p28', 'https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E'}
null
GHSA
GHSA-59x4-67mh-px54
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
{'CVE-2022-24953'}
2022-03-01T18:36:14Z
2022-02-18T00:00:36Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/advisories/GHSA-59x4-67mh-px54', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953'}
null
GHSA
GHSA-45r8-3495-x6rm
High severity vulnerability that affects com.hubspot.jinjava:jinjava
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
{'CVE-2018-18893'}
2021-08-31T21:45:30Z
2019-01-04T17:43:36Z
MODERATE
5.3
null
{'https://github.com/advisories/GHSA-45r8-3495-x6rm', 'https://github.com/HubSpot/jinjava/pull/230', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893', 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}
null
GHSA
GHSA-h6m7-j4h3-9rf5
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`. ### Example ```yaml sylius_grid: grids: foo: fields: bar: options: baz: "expr:service('sylius.repository.product').find($id)" ``` In this case, `$id` can be prepared in a way that calls other services. If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. ### Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. ### Workarounds The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language. ```php - return is_string($variable) ? sprintf('"%s"', $variable) : $variable; + return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable; ``` ### Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2020-15146'}
2022-04-19T19:02:33Z
2020-08-19T19:52:30Z
CRITICAL
9.6
{'CWE-917', 'CWE-74'}
{'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146', 'https://github.com/advisories/GHSA-h6m7-j4h3-9rf5'}
null
GHSA
GHSA-5fjj-cfh2-ghc5
Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport
An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.
{'CVE-2020-8128'}
2021-04-13T15:25:24Z
2021-04-13T15:25:24Z
HIGH
9.8
{'CWE-829', 'CWE-918'}
{'https://github.com/advisories/GHSA-5fjj-cfh2-ghc5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128', 'https://hackerone.com/reports/660565'}
null
GHSA
GHSA-95m6-mjh3-58gm
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
{'CVE-2016-8609'}
2021-09-07T20:44:36Z
2018-10-18T16:48:41Z
HIGH
8.1
{'CWE-287', 'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8609', 'https://github.com/advisories/GHSA-95m6-mjh3-58gm'}
null
GHSA
GHSA-h44f-769q-j6px
Malicious Package in requet
All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:16Z
2020-09-02T20:33:14Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-h44f-769q-j6px', 'https://www.npmjs.com/advisories/864'}
null
GHSA
GHSA-6vwp-35w3-xph8
Insecure Deserialization in Apache XML-RPC
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
{'CVE-2019-17570'}
2022-04-26T17:58:54Z
2020-06-10T20:02:39Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17570', 'https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E', 'https://usn.ubuntu.com/4496-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html', 'https://seclists.org/bugtraq/2020/Feb/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570;', 'http://www.openwall.com/lists/oss-security/2020/01/24/2', 'https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp', 'https://www.debian.org/security/2020/dsa-4619', 'https://access.redhat.com/errata/RHSA-2020:0310', 'https://github.com/advisories/GHSA-6vwp-35w3-xph8'}
null
GHSA
GHSA-5rcc-6cmj-7728
Cross-site Scripting in BookStack
Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack.
{'CVE-2022-0877'}
2022-03-14T21:03:35Z
2022-03-09T00:00:44Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877', 'https://github.com/advisories/GHSA-5rcc-6cmj-7728'}
null
GHSA
GHSA-qgm9-232x-hwpx
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Withdrawn: Duplicate of CVE-2017-12161 / GHSA-959q-32g8-vvp7
{'CVE-2017-1000500'}
2021-01-29T17:10:11Z
2018-10-18T16:48:15Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000500', 'https://github.com/advisories/GHSA-qgm9-232x-hwpx'}
null
GHSA
GHSA-5947-m4fg-xhqg
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2021-09-29T14:09:37Z
2020-09-03T18:08:10Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-5947-m4fg-xhqg', 'https://www.npmjs.com/advisories/1069'}
null
GHSA
GHSA-qj26-7grj-whg3
Privilege Escalation in fscrypt
The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
{'CVE-2018-6558'}
2021-06-23T17:18:49Z
2021-06-23T17:18:49Z
MODERATE
6.5
null
{'https://github.com/google/fscrypt/issues/77', 'https://github.com/advisories/GHSA-qj26-7grj-whg3', 'https://launchpad.net/bugs/1787548', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6558', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}
null
GHSA
GHSA-9p64-h5q4-phpm
Remote Code Execution in office-converter
All versions of `office-converter` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T13:41:42Z
2020-09-02T15:44:58Z
HIGH
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-9p64-h5q4-phpm', 'https://www.npmjs.com/advisories/759'}
null
GHSA
GHSA-vpq7-m4qm-p2gp
Business Logic Errors in microweber
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0596'}
2022-02-24T13:55:55Z
2022-02-16T00:01:45Z
MODERATE
4.3
null
{'https://github.com/advisories/GHSA-vpq7-m4qm-p2gp', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5'}
null
GHSA
GHSA-3pqh-p72c-fj85
Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki
### Impact When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation. ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3978'}
2022-04-19T19:03:15Z
2021-11-19T19:34:26Z
MODERATE
0
{'CWE-281'}
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3pqh-p72c-fj85', 'https://github.com/advisories/GHSA-3pqh-p72c-fj85'}
null
GHSA
GHSA-87p2-cvhq-q4mv
Authentication bypass in Apache Zeppelin
Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
{'CVE-2020-13929'}
2021-09-29T18:03:53Z
2021-09-07T22:56:56Z
HIGH
7.5
{'CWE-287'}
{'http://www.openwall.com/lists/oss-security/2021/09/02/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13929', 'https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/advisories/GHSA-87p2-cvhq-q4mv', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028%40%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cusers.zeppelin.apache.org%3E'}
null
GHSA
GHSA-fpcp-9h7m-ffpx
Null pointer dereference in TensorFlow
### Impact When [building an XLA compilation cache](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104), if default settings are used, TensorFlow triggers a null pointer dereference: ```cc string allowed_gpus = flr->config_proto()->gpu_options().visible_device_list(); ``` In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. ### Patches We have patched the issue in GitHub commit [e21af685e1828f7ca65038307df5cc06de4479e8](https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23595'}
2022-02-11T19:55:41Z
2022-02-09T23:33:17Z
MODERATE
5.3
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23595', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104', 'https://github.com/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx', 'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'}
null
GHSA
GHSA-27xj-rqx5-2255
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
{'CVE-2020-11619'}
2021-08-25T21:01:55Z
2020-05-15T18:58:44Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-27xj-rqx5-2255', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11619', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://github.com/FasterXML/jackson-databind/issues/2680', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}
null
GHSA
GHSA-qgwf-r2jj-2ccv
Use after free in heapless
An issue was discovered in the heapless crate before 0.6.1 for Rust. The IntoIter Clone implementation clones an entire underlying Vec without considering whether it has already been partially consumed.
{'CVE-2020-36464'}
2021-08-25T20:56:09Z
2021-08-25T20:56:09Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/japaric/heapless/issues/181', 'https://github.com/advisories/GHSA-qgwf-r2jj-2ccv', 'https://rustsec.org/advisories/RUSTSEC-2020-0145.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36464'}
null
GHSA
GHSA-599h-8wpj-75xj
Authentication Bypass in tyk-identity-broker
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
{'CVE-2021-23365'}
2021-06-23T17:23:30Z
2021-06-23T17:23:30Z
CRITICAL
9.1
{'CWE-287'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0', 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1', 'https://github.com/TykTechnologies/tyk-identity-broker/pull/147', 'https://github.com/advisories/GHSA-599h-8wpj-75xj', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365'}
null
GHSA
GHSA-9699-gm7f-cmjv
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
{'CVE-2020-25724'}
2021-06-08T22:29:46Z
2021-06-08T22:29:46Z
MODERATE
4.3
{'CWE-567'}
{'https://access.redhat.com/security/cve/cve-2020-25724', 'https://github.com/advisories/GHSA-9699-gm7f-cmjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25724', 'https://bugzilla.redhat.com/show_bug.cgi?id=1899354'}
null
GHSA
GHSA-jc7r-v6fg-2gpf
High severity vulnerability that affects org.apache.cxf:apache-cxf, org.apache.cxf:apache-cxf , and org.apache.cxf:cxf
It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.
{'CVE-2018-8039'}
2021-12-03T14:54:43Z
2018-10-19T16:40:01Z
HIGH
0
null
{'https://github.com/advisories/GHSA-jc7r-v6fg-2gpf'}
null
GHSA
GHSA-9jm3-5835-537m
Command Injection in apex-publish-static-files
Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method. ## Recommendation Update to version 2.0.1 or later.
{'CVE-2018-16462'}
2021-01-08T19:03:45Z
2018-11-01T14:48:50Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json', 'https://hackerone.com/reports/405694', 'https://www.npmjs.com/advisories/718', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462', 'https://github.com/advisories/GHSA-9jm3-5835-537m'}
null
GHSA
GHSA-c9x9-xv66-xp3v
Improper privilege management in Keycloak
A flaw was found in Keycloak, where it would permit a user with a view-profile role to manage the resources in the new account console. This flaw allows a user with a view-profile role to access and modify data for which the user does not have adequate permission.
{'CVE-2020-14389'}
2021-11-10T15:30:36Z
2021-11-10T15:30:36Z
HIGH
8.1
{'CWE-916', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14389', 'https://access.redhat.com/security/cve/cve-2020-14389', 'https://github.com/advisories/GHSA-c9x9-xv66-xp3v'}
null
GHSA
GHSA-xqp8-w826-hh6x
Crash server with query parameter
### Impact Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. ### Patches Upgrade to Parse Server 4.10.3
{'CVE-2021-39187'}
2022-04-19T19:03:07Z
2021-09-02T16:51:14Z
HIGH
7.5
{'CWE-74', 'CWE-20', 'CWE-755'}
{'https://jira.mongodb.org/browse/NODE-3463', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://github.com/parse-community/parse-server/releases/tag/4.10.3', 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://github.com/advisories/GHSA-xqp8-w826-hh6x'}
null
GHSA
GHSA-6qgm-fv6v-rfpv
Overflow/denial of service in `tf.raw_ops.ReverseSequence`
### Impact The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service. ```python import tensorflow as tf input = tf.zeros([1, 1, 1], dtype=tf.int32) seq_lengths = tf.constant([0], shape=[1], dtype=tf.int32) tf.raw_ops.ReverseSequence( input=input, seq_lengths=seq_lengths, seq_dim=-2, batch_dim=0) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/5b3b071975e01f0d250c928b2a8f901cd53b90a7/tensorflow/core/kernels/reverse_sequence_op.cc#L114-L118) fails to validate that `seq_dim` and `batch_dim` arguments are valid. Negative values for `seq_dim` can result in stack overflow or `CHECK`-failure, depending on the version of Eigen code used to implement the operation. Similar behavior can be exhibited by invalid values of `batch_dim`. ### Patches We have patched the issue in GitHub commit [ecf768cbe50cedc0a45ce1ee223146a3d3d26d23](https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29575'}
2021-05-21T14:26:13Z
2021-05-21T14:26:13Z
LOW
2.5
{'CWE-119', 'CWE-120'}
{'https://github.com/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv', 'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29575'}
null
GHSA
GHSA-m6gg-86c6-gfr9
Cross-site Scripting in elasticsearch
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.
{'CVE-2022-23710'}
2022-03-29T22:12:45Z
2022-03-04T00:00:15Z
MODERATE
6.1
{'CWE-79'}
{'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447', 'https://github.com/advisories/GHSA-m6gg-86c6-gfr9', 'https://security.netapp.com/advisory/ntap-20220325-0009/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23710'}
null
GHSA
GHSA-vqj2-4v8m-8vrq
Insecure Temporary File in mlflow
mlflow prior to 1.23.1 contains an insecure temporary file. The insecure function `tempfile.mktemp()` is deprecated and `mkstemp()` should be used instead.
{'CVE-2022-0736'}
2022-03-03T19:18:19Z
2022-02-24T00:00:54Z
HIGH
8.2
{'CWE-668', 'CWE-377'}
{'https://github.com/advisories/GHSA-vqj2-4v8m-8vrq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0736', 'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711', 'https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75'}
null
GHSA
GHSA-gmjw-49p4-pcfm
Prototype poisoning
### Impact The issue is as follows: when `msgpack5` decodes a map containing a key `"__proto__"`, it assigns the decoded value to `__proto__`. As you are no doubt aware, `Object.prototype.__proto__` is an accessor property for the receiver's prototype. If the value corresponding to the key `__proto__` decodes to an object or `null`, `msgpack5` sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example `length`, numeric properties, and `push` et al if `__proto__`'s value decodes to an `Array`); and/or may throw unexpected exceptions when used (for example if the `__proto__` value decodes to a `Map` or `Date`). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. An example: ```js const msgpack5 = require('msgpack5')(); const payload = {}; Object.defineProperty(payload, '__proto__', { value: new Map().set(1, 2), enumerable: true }); const encoded = msgpack5.encode(payload); console.log(encoded); // <Buffer 81 a9 5f 5f 70 72 6f 74 6f 5f 5f 81 01 02> const decoded = msgpack5.decode(encoded); // decoded's prototype has been overwritten console.log(Object.getPrototypeOf(decoded)); // Map(1) { 1 => 2 } console.log(decoded.get); // [Function: get] // decoded appears to most common typechecks to be a Map console.log(decoded instanceof Map); // true console.log(decoded.toString()); // [object Map] console.log(Object.prototype.toString.call(decoded)); // [object Map] console.log(decoded.constructor.name); // Map console.log(Object.getPrototypeOf(decoded).constructor.name); // Map // decoded is not, however, a Map console.log(Object.getPrototypeOf(decoded) === Map.prototype); // false // using decoded as though it were a Map throws try { decoded.get(1); } catch (error) { console.log(error); // TypeError: Method Map.prototype.get called // on incompatible receiver #<Map> } try { decoded.size; } catch (error) { console.log(error); // TypeError: Method get Map.prototype.size // called on incompatible receiver #<Map> } // re-encoding the decoded value throws try { msgpack5.encode(decoded); } catch (error) { console.log(error); // TypeError: Method Map.prototype.entries // called on incompatible receiver #<Map> } ``` This "prototype poisoning" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to `msgpack5` values (though if the victim makes use of custom codecs, anything could be a `msgpack5` value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). ### Patches Versions v5.2.1, v4.5.1, v3.6.1 include the fix. ### Workarounds Always validate incoming data after parsing before doing any processing. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2021-21368'}
2022-04-19T19:02:49Z
2021-03-12T22:44:17Z
MODERATE
6.7
{'CWE-915'}
{'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8', 'https://www.npmjs.com/package/msgpack5', 'https://github.com/advisories/GHSA-gmjw-49p4-pcfm', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1', 'https://github.com/mcollina/msgpack5/releases/tag/v3.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm'}
null
GHSA
GHSA-8vwm-8vj8-rqjf
User login denial of service in github.com/google/fscrypt
The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above
{'CVE-2022-25327'}
2022-03-09T21:11:54Z
2022-02-26T00:00:44Z
MODERATE
5.5
{'CWE-276'}
{'https://github.com/google/fscrypt/pull/346', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25327', 'https://github.com/advisories/GHSA-8vwm-8vj8-rqjf'}
null