ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-x76r-966h-5qv9
Out-of-bounds Write in vec-const
An issue was discovered in the vec-const crate before 2.0.0 for Rust. It tries to construct a Vec from a pointer to a const slice, leading to memory corruption.
{'CVE-2021-45680'}
2022-01-07T16:19:26Z
2022-01-06T22:15:56Z
HIGH
7.5
{'CWE-787'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/vec-const/RUSTSEC-2021-0082.md', 'https://github.com/advisories/GHSA-x76r-966h-5qv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45680', 'https://rustsec.org/advisories/RUSTSEC-2021-0082.html'}
null
GHSA
GHSA-cqxw-3p7v-p9gr
Phusion Passenger uses a known /tmp filename
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
{'CVE-2016-10345'}
2022-04-26T20:43:37Z
2018-08-21T17:08:03Z
HIGH
7.8
null
{'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr', 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345'}
null
GHSA
GHSA-236h-rqv8-8q73
GraphQL: Security breach on Viewer query
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.
{'CVE-2020-15126'}
2022-04-19T19:02:30Z
2020-07-22T23:06:47Z
HIGH
6.5
{'CWE-863'}
{'https://github.com/advisories/GHSA-236h-rqv8-8q73', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430', 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
null
GHSA
GHSA-232r-66cg-79px
Paramiko not properly checking authention before processing other requests
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
{'CVE-2018-7750'}
2022-04-26T20:43:25Z
2018-07-12T20:29:30Z
CRITICAL
9.8
{'CWE-287'}
{'https://access.redhat.com/errata/RHSA-2018:1525', 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516', 'https://access.redhat.com/errata/RHSA-2018:1124', 'https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst', 'https://access.redhat.com/errata/RHSA-2018:1125', 'https://github.com/paramiko/paramiko/issues/1175', 'https://access.redhat.com/errata/RHSA-2018:1274', 'https://usn.ubuntu.com/3603-1/', 'https://access.redhat.com/errata/RHSA-2018:1972', 'http://www.securityfocus.com/bid/103713', 'https://access.redhat.com/errata/RHSA-2018:0646', 'https://github.com/advisories/GHSA-232r-66cg-79px', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://access.redhat.com/errata/RHSA-2018:1213', 'https://www.exploit-db.com/exploits/45712/', 'https://usn.ubuntu.com/3603-2/', 'https://access.redhat.com/errata/RHSA-2018:1328', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html', 'https://access.redhat.com/errata/RHSA-2018:0591', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7750'}
null
GHSA
GHSA-7wwv-vh3v-89cq
ReDOS vulnerabities: multiple grammars
### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking) [oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS): > The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time. If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service). This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@10.4.0/build/highlight.js All versions prior to 10.4.1 are vulnerable, including version 9.18.5. **Grammars with exponential backtracking issues:** - c-like (c, cpp, arduino) - handlebars (htmlbars) - gams - perl - jboss-cli - r - erlang-repl - powershell - routeros - livescript (10.4.0 and 9.18.5 included this fix) - javascript & typescript (10.4.0 included partial fixes) And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`. **Grammars with polynomial backtracking issues:** - kotlin - gcode - d - aspectj - moonscript - coffeescript/livescript - csharp - scilab - crystal - elixir - basic - ebnf - ruby - fortran/irpf90 - livecodeserver - yaml - x86asm - dsconfig - markdown - ruleslanguage - xquery - sqf And again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues. ### Patches - Version 10.4.1 resolves these vulnerabilities. Please upgrade. ### Workarounds / Mitigations - Discontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues) - Attempt cherry-picking the grammar fixes into older versions... - Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary. ### References - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue: https://github.com/highlightjs/highlight.js/issues * Email us at [security@highlightjs.com](mailto:security@highlightjs.com)
null
2022-05-03T08:27:46Z
2020-12-04T16:47:20Z
MODERATE
0
{'CWE-20', 'CWE-400'}
{'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c', 'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://github.com/advisories/GHSA-7wwv-vh3v-89cq'}
null
GHSA
GHSA-h7f9-cvh5-qw7f
Path traversal in pimcore/pimcore
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.
{'CVE-2021-23340'}
2021-02-25T16:32:46Z
2021-02-25T16:32:46Z
HIGH
0
{'CWE-22'}
{'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132', 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/advisories/GHSA-h7f9-cvh5-qw7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23340'}
null
GHSA
GHSA-25xc-jwfq-39jw
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. - https://vaadin.com/security/cve-2021-31407
{'CVE-2021-31407'}
2021-05-06T17:12:47Z
2021-04-19T14:50:49Z
HIGH
8.6
{'CWE-402', 'CWE-668'}
{'https://github.com/advisories/GHSA-25xc-jwfq-39jw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407', 'https://vaadin.com/security/cve-2021-31407', 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw', 'https://github.com/vaadin/flow/pull/10229', 'https://github.com/vaadin/flow/pull/10269', 'https://github.com/vaadin/osgi/issues/50'}
null
GHSA
GHSA-8462-q7x7-g2x4
High severity vulnerability that affects bson
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
{'CVE-2018-13863'}
2021-09-03T22:29:40Z
2018-09-17T20:44:58Z
HIGH
7.5
{'CWE-400', 'CWE-185'}
{'https://snyk.io/vuln/npm:bson:20180225', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'}
null
GHSA
GHSA-xcwj-wfcm-m23c
Invalid validation in `SparseMatrixSparseCholesky`
### Impact An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`: ```python import tensorflow as tf import numpy as np from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops indices_array = np.array([[0, 0]]) value_array = np.array([-10.0], dtype=np.float32) dense_shape = [1, 1] st = tf.SparseTensor(indices_array, value_array, dense_shape) input = sparse_csr_matrix_ops.sparse_tensor_to_csr_sparse_matrix( st.indices, st.values, st.dense_shape) permutation = tf.constant([], shape=[1, 0], dtype=tf.int32) tf.raw_ops.SparseMatrixSparseCholesky(input=input, permutation=permutation, type=tf.float32) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments: ```cc void Compute(OpKernelContext* ctx) final { ... const Tensor& input_permutation_indices = ctx->input(1); ... ValidateInputs(ctx, *input_matrix, input_permutation_indices, &batch_size, &num_rows); ... } void ValidateInputs(OpKernelContext* ctx, const CSRSparseMatrix& sparse_matrix, const Tensor& permutation_indices, int* batch_size, int64* num_rows) { OP_REQUIRES(ctx, sparse_matrix.dtype() == DataTypeToEnum<T>::value, ...) ... } ``` Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since [`OP_REQUIRES`](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. ```cc #define OP_REQUIRES(CTX, EXP, STATUS) \ do { \ if (!TF_PREDICT_TRUE(EXP)) { \ CheckNotInComputeAsync((CTX), "OP_REQUIRES_ASYNC"); \ (CTX)->CtxFailure(__FILE__, __LINE__, (STATUS)); \ return; \ } \ } while (0) ``` Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. ### Patches We have patched the issue in GitHub commit [e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd](https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29530'}
2021-05-21T14:22:09Z
2021-05-21T14:22:09Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/advisories/GHSA-xcwj-wfcm-m23c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29530', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
null
GHSA
GHSA-7h8x-wmq2-7mff
Command injection in launchpad
All versions of package launchpad are vulnerable to Command Injection via stop.
{'CVE-2021-23330'}
2021-04-13T15:20:20Z
2021-04-13T15:20:20Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/bitovi/launchpad/pull/124', 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118', 'https://github.com/advisories/GHSA-7h8x-wmq2-7mff', 'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330'}
null
GHSA
GHSA-mj9p-v2r8-wf8w
Cross-site scripting in SimpleSAMLphp
### Background SimpleSAMLphp allows users to report errors and failures to the system administrators via a web form. This web form gathers some contextual information automatically, but it also allows the user to provide their email address for follow-ups and a free-text explanation of what happened. Once submitted, the report is sent as an email to the administrative email address configured in the software. ### Description The `www/erroreport.php` script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new `SimpleSAML\Utils\EMail` class was introduced to handle sending emails, implemented as a wrapper of an external dependency. This new wrapper allows us to use Twig templates in order to create the email sent with an error report. Since Twig provides automatic escaping of variables, manual escaping of the free-text field in `www/errorreport.php` was removed to avoid double escaping. However, for those not using the new user interface yet, an email template is hardcoded into the class itself in plain PHP. Since no escaping is provided in this template, it is then possible to inject HTML inside the template by manually crafting the contents of the free-text field. ### Affected versions SimpleSAMLphp versions 1.18.0 to 1.18.3, both inclusive. ### Impact An attacker may take advantage of this issue to manually craft a modified email sent via the error reporting mechanism, such as this email might trick a system administrator into performing an action, such as introducing their credentials into a phishing web site that resembles the original. Remote execution of javascript code is considered unfeasible since email clients do not run javascript present in emails, although there might be email clients which don't follow this rule, making the attack surface grow. ### Resolution Upgrade the SimpleSAMLphp installation to version 1.18.4. ### Credit This vulnerability was discovered and reported by Frederic Vleminckx.
{'CVE-2020-5226'}
2021-01-08T20:32:55Z
2020-01-24T21:26:54Z
LOW
4.4
{'CWE-79'}
{'https://simplesamlphp.org/security/202001-01', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5226', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w', 'https://github.com/advisories/GHSA-mj9p-v2r8-wf8w'}
null
GHSA
GHSA-q48g-p5cx-c7c7
Directory Traversal in yzt
Affected versions of `yzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16221'}
2021-01-14T15:45:59Z
2020-09-01T17:36:42Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-q48g-p5cx-c7c7', 'https://nodesecurity.io/advisories/416', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16221', 'https://www.npmjs.com/advisories/416', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt'}
null
GHSA
GHSA-c4qh-4vgv-qc6g
Uncontrolled Resource Consumption in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
{'CVE-2019-14232'}
2021-12-03T20:28:51Z
2019-08-06T01:43:29Z
HIGH
7.5
{'CWE-400'}
{'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-c4qh-4vgv-qc6g', 'https://github.com/pypa/advisory-db/tree/main/vulns/django/PYSEC-2019-11.yaml', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14232', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}
null
GHSA
GHSA-24x6-8c7m-hv3f
Heap OOB read in TFLite's implementation of `Minimum` or `Maximum`
### Impact The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because [the broadcasting implementation](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds: ```cc auto maxmin_func = [&](int indexes[N]) { output_data[SubscriptToIndex(output_desc, indexes)] = op(input1_data[SubscriptToIndex(desc1, indexes)], input2_data[SubscriptToIndex(desc2, indexes)]); }; ``` ### Patches We have patched the issue in GitHub commit [953f28dca13c92839ba389c055587cfe6c723578](https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29590'}
2021-05-21T14:26:53Z
2021-05-21T14:26:53Z
LOW
2.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29590', 'https://github.com/advisories/GHSA-24x6-8c7m-hv3f', 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}
null
GHSA
GHSA-xmh9-rg6f-j3mr
Verification flaw in Solid identity-token-verifier
### Impact #### Severity Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod. #### Summary A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed. DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP. A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability. ### Patches A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35 ### Workarounds None ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository. * Email: info@solidproject.org
null
2021-03-12T22:39:01Z
2021-03-12T22:39:01Z
MODERATE
0
{'CWE-290'}
{'https://github.com/advisories/GHSA-xmh9-rg6f-j3mr', 'https://www.npmjs.com/package/@solid/identity-token-verifier', 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2', 'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr'}
null
GHSA
GHSA-8892-84wf-cg8f
SyncChannel<T> can move 'T: !Send' to other threads
Affected versions of this crate unconditionally implement Send/Sync for `SyncChannel<T>`. `SyncChannel<T>` doesn't provide access to `&T` but merely serves as a channel that consumes and returns owned `T`. Users can create UB in safe Rust by sending `T: !Send` to other threads with `SyncChannel::send/recv` APIs. Using `T = Arc<Cell<_>` allows to create data races (which can lead to memory corruption), and using `T = MutexGuard<T>` allows to unlock a mutex from a thread that didn't lock the mutex.
null
2021-08-25T21:00:16Z
2021-08-25T21:00:16Z
MODERATE
0
{'CWE-362'}
{'https://github.com/kitsuneninetails/signal-rust/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html', 'https://github.com/advisories/GHSA-8892-84wf-cg8f'}
null
GHSA
GHSA-ph87-fvjr-v33w
CHECK-fail in `tf.raw_ops.RFFT`
### Impact An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`: ```python import tensorflow as tf inputs = tf.constant([1], shape=[1], dtype=tf.float32) fft_length = tf.constant([0], shape=[1], dtype=tf.int32) tf.raw_ops.RFFT(input=inputs, fft_length=fft_length) ``` The above example causes Eigen code to operate on an empty matrix. This triggers on an assertion and causes program termination. ### Patches We have patched the issue in GitHub commit [31bd5026304677faa8a0b77602c6154171b9aec1](https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29563'}
2021-05-21T14:25:05Z
2021-05-21T14:25:05Z
LOW
2.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-ph87-fvjr-v33w', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29563', 'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1'}
null
GHSA
GHSA-9cg2-2j2h-59v9
Data races in atom
An issue was discovered in the atom crate before 0.3.6 for Rust. An unsafe Send implementation allows a cross-thread data race.
{'CVE-2020-35897'}
2021-08-25T20:49:11Z
2021-08-25T20:49:11Z
MODERATE
4.7
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35897', 'https://github.com/advisories/GHSA-9cg2-2j2h-59v9', 'https://rustsec.org/advisories/RUSTSEC-2020-0044.html', 'https://github.com/slide-rs/atom/issues/13'}
null
GHSA
GHSA-4f9m-pxwh-68hg
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.20.9 or later.
null
2021-09-28T16:57:08Z
2020-09-11T21:20:14Z
MODERATE
6.5
{'CWE-79'}
{'https://www.npmjs.com/advisories/976', 'https://github.com/advisories/GHSA-4f9m-pxwh-68hg', 'https://github.com/swagger-api/swagger-ui/pull/5190', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921'}
null
GHSA
GHSA-h67m-xg8f-fxcf
Deadlock in mutually recursive `tf.function` objects
### Impact The [code behind `tf.function` API](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/python/eager/def_function.py#L542) can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive: ```python import tensorflow as tf @tf.function() def fun1(num): if num == 1: return print(num) fun2(num-1) @tf.function() def fun2(num): if num == 0: return print(num) fun1(num-1) fun1(9) ``` This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. ### Patches We have patched the issue in GitHub commit [afac8158d43691661ad083f6dd9e56f327c1dcb7](https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41213'}
2021-11-10T18:59:32Z
2021-11-10T18:59:32Z
MODERATE
5.5
{'CWE-667'}
{'https://github.com/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41213', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf'}
null
GHSA
GHSA-v662-xpcc-9xf6
It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro
### Impact The `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights). Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension. ### Patches It has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1. ### Workarounds There is no easy workaround other than disabling the affected macros. Inserting content in a safe way or knowing what is the user who called the wiki macro is not easy. ### References https://jira.xwiki.org/browse/XWIKI-17759 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2021-21379'}
2021-03-23T22:47:26Z
2021-03-23T22:47:26Z
LOW
0
{'CWE-281'}
{'https://github.com/advisories/GHSA-v662-xpcc-9xf6', 'https://jira.xwiki.org/browse/XWIKI-17759', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21379', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6'}
null
GHSA
GHSA-p4v2-r99v-wjc2
Improper Encoding or Escaping of Output in Nicotine+
Denial of service (DoS) vulnerability in Nicotine+ starting with version 3.0.3 and prior to version 3.2.1 allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character.
{'CVE-2021-45848'}
2022-03-29T21:18:19Z
2022-03-16T00:00:38Z
HIGH
7.5
{'CWE-116'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45848', 'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045', 'https://github.com/advisories/GHSA-p4v2-r99v-wjc2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWYV53KERFH2EC4XI2IVVQFTV75E5XM6/', 'https://github.com/nicotine-plus/nicotine-plus/issues/1777'}
null
GHSA
GHSA-hc9w-4p87-j549
Prototype Pollution in cached-path-relative
Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2018-16472'}
2021-01-08T18:41:56Z
2018-11-07T20:46:25Z
HIGH
0
{'CWE-400'}
{'https://hackerone.com/reports/390847', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472', 'https://github.com/ashaffer/cached-path-relative/issues/3', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json', 'https://www.npmjs.com/advisories/739', 'https://github.com/advisories/GHSA-hc9w-4p87-j549'}
null
GHSA
GHSA-h33p-5j96-w8qh
OS Command Injection in gulkp-styledocco
gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument &#39;options&#39; of the exports function in &#39;index.js&#39; can be controlled by users without any sanitization.
{'CVE-2020-7607'}
2021-07-28T21:22:24Z
2021-05-07T16:14:48Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7607', 'https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126', 'https://github.com/advisories/GHSA-h33p-5j96-w8qh'}
null
GHSA
GHSA-33p6-fx42-7rf5
Harbor is vulnerable to a limited Server-Side Request Forgery (SSRF) (CVE-2020-13788)
# Impact Matt Hamilton from Soluble has discovered a limited Server-Side Request Forgery (SSRF) that allowed Harbor project owners to scan the TCP ports of hosts on the Harbor server's internal network. The vulnerability was immediately fixed by the Harbor team. # Issue The “Test Endpoint” API, part of the functionality for ensuring a project Webhook is accessible and functional, is vulnerable to a limited SSRF attack. A malicious user that is also a project administrator can use this API for internal port scanning. # Known Attack Vectors Successful exploitation of this issue will lead to bad actors identifying open TCP ports on any network that is accessible by the Harbor core services # Patches If your product uses the affected releases of Harbor, update to version 2.0.1 to patch this issue immediately. https://github.com/goharbor/harbor/releases/tag/v2.0.1 # Workarounds Since only project administrators (the user that created the project) are allowed to test the webhook endpoints configured in Harbor, a Harbor system administrator can control who is a project admin. In addition, Harbor system administrators can enforce a setting where only an administrator is allowed to create new projects instead of the default Everyone. This further restricts who can be a project administrator in Harbor. # For more information If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy https://nvd.nist.gov/vuln/detail/CVE-2020-13788 https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788
{'CVE-2020-13788'}
2022-02-11T23:17:02Z
2022-02-11T23:17:02Z
LOW
4
{'CWE-918'}
{'https://github.com/goharbor/harbor/security/advisories/GHSA-33p6-fx42-7rf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13788', 'https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788', 'https://github.com/goharbor/harbor/releases', 'https://github.com/advisories/GHSA-33p6-fx42-7rf5', 'https://www.youtube.com/watch?v=v8Isqy4yR3Q'}
null
GHSA
GHSA-jhjh-ghwx-6h7r
Low severity vulnerability that affects modulemd
modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.
{'CVE-2017-1002157'}
2021-01-08T18:34:49Z
2019-01-17T13:56:18Z
LOW
0
{'CWE-242'}
{'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157', 'https://pagure.io/modulemd/issue/55'}
null
GHSA
GHSA-p43x-xfjf-5jhr
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
{'CVE-2020-9548'}
2021-10-21T21:11:57Z
2020-05-15T18:59:01Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9548', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-p43x-xfjf-5jhr'}
null
GHSA
GHSA-rw53-q8x7-ccx8
Malicious Package in buffer-xkr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:01Z
2020-09-03T21:55:17Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-rw53-q8x7-ccx8', 'https://www.npmjs.com/advisories/1245'}
null
GHSA
GHSA-f3fg-5j9p-vchc
File exposure in pleaser
pleaser before 0.4 allows a local unprivileged attacker to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option.
{'CVE-2021-31153'}
2021-08-25T21:01:41Z
2021-08-25T21:01:41Z
MODERATE
0
{'CWE-200', 'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31153', 'http://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://github.com/advisories/GHSA-f3fg-5j9p-vchc', 'https://crates.io/crates/pleaser'}
null
GHSA
GHSA-vj54-cjrx-x696
Observable Discrepancy in Argo
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts within Argo.
{'CVE-2020-11576'}
2021-12-09T19:59:24Z
2021-12-09T19:59:24Z
MODERATE
5.3
{'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11576', 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo-cd/pull/3215', 'https://github.com/advisories/GHSA-vj54-cjrx-x696'}
null
GHSA
GHSA-mh6f-8j2x-4483
Critical severity vulnerability that affects event-stream and flatmap-stream
The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version. Users of `flatmap-stream` are encouraged to remove the dependency entirely.
null
2021-09-15T20:08:28Z
2018-11-26T23:58:21Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-mh6f-8j2x-4483', 'https://github.com/dominictarr/event-stream/issues/116'}
null
GHSA
GHSA-j8r2-2x94-2q67
Cross-Site Scripting in diagram-js-direct-editing
Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.4.3 or later.
null
2021-09-28T16:59:51Z
2020-09-11T21:19:09Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-j8r2-2x94-2q67', 'https://www.npmjs.com/advisories/983', 'https://github.com/bpmn-io/diagram-js-direct-editing'}
null
GHSA
GHSA-8m5v-f2wp-wqr9
Malicious Package in ali-contributors
All versions of `ali-contributors` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:50:12Z
2020-09-03T17:30:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1046', 'https://github.com/advisories/GHSA-8m5v-f2wp-wqr9'}
null
GHSA
GHSA-qcff-ffx3-m25c
Command Injection in meta-git
All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:47:36Z
2020-09-04T17:31:44Z
CRITICAL
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/1457', 'https://hackerone.com/reports/728040', 'https://github.com/advisories/GHSA-qcff-ffx3-m25c'}
null
GHSA
GHSA-6gg3-pmm7-97xc
DOM-based XSS in auth0-lock
### Overview Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection. - For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input. - For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens. When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using auth0-lock - You are using Passwordless or Enterprise connection mode ### How to fix that? Upgrade to version `11.26.3` ### Will this update impact my users? The fix provided in patch will not affect your users. ### Credit https://github.com/mvisat
{'CVE-2020-15119'}
2022-04-19T19:02:31Z
2020-08-19T21:05:03Z
LOW
6.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-6gg3-pmm7-97xc', 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc'}
null
GHSA
GHSA-w9hw-v97w-g5f5
Malicious Package in bitconi-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:25Z
2020-09-04T16:43:14Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-w9hw-v97w-g5f5', 'https://www.npmjs.com/advisories/1368'}
null
GHSA
GHSA-4g53-vp7q-gfjv
constructEvent does not verify header
### Impact Anyone verifying a Stripe webhook request via this library's `constructEvent` function. ### Patches Upgrade to 1.1.4. ### Workarounds Use `await verifyHeader(...)` directly instead of `constructEvent`. ### References https://github.com/worker-tools/stripe-webhook/issues/1
null
2022-04-19T19:02:58Z
2021-05-28T19:18:28Z
HIGH
0
null
{'https://github.com/advisories/GHSA-4g53-vp7q-gfjv', 'https://github.com/worker-tools/stripe-webhook/security/advisories/GHSA-4g53-vp7q-gfjv'}
null
GHSA
GHSA-3233-rgx3-c2wh
Moderate severity vulnerability that affects mustache
Withdrawn, accidental duplicate publish. mustache package before 2.2.1 for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging a template with an attribute that is not quoted.
null
2021-12-03T14:25:39Z
2018-10-09T00:38:09Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://github.com/advisories/GHSA-3233-rgx3-c2wh'}
null
GHSA
GHSA-j377-2x76-558h
Improper Input Validation in is-email
is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.
{'CVE-2021-36716'}
2022-05-05T13:52:58Z
2021-12-10T17:25:21Z
HIGH
7.5
{'CWE-20', 'CWE-400'}
{'https://github.com/advisories/GHSA-j377-2x76-558h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716', 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/', 'https://github.com/segmentio/is-email/releases'}
null
GHSA
GHSA-x7q3-67vc-wvcf
Downloads Resources over HTTP in grunt-images
Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10645'}
2021-09-16T20:53:25Z
2018-08-15T19:05:14Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nodesecurity.io/advisories/255', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10645', 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf', 'https://www.npmjs.com/advisories/255'}
null
GHSA
GHSA-v9p9-535w-4285
Prototype Pollution in litespeed.js and appwrite/server-ce
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
{'CVE-2021-23682'}
2022-02-26T00:57:39Z
2022-02-17T00:00:32Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/appwrite/appwrite/releases/tag/0.11.1', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/pull/2778', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23682', 'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://github.com/advisories/GHSA-v9p9-535w-4285'}
null
GHSA
GHSA-vwhq-49r4-gj9v
Reference binding to `nullptr` in `tf.ragged.cross`
### Impact The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) has an undefined behavior due to binding a reference to `nullptr`. In the following scenario, this results in a crash: ```python import tensorflow as tf @tf.function def test(): y = tf.ragged.cross([tf.ragged.constant([['1']]),'2']) return y test() ``` ### Patches We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41214'}
2021-11-10T18:58:16Z
2021-11-10T18:58:16Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/advisories/GHSA-vwhq-49r4-gj9v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41214'}
null
GHSA
GHSA-vh5c-jqfg-mhrh
Cross-Site Request Forgery in xwiki-platform
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Patches This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided: - a first one to fix the CSRF problem - a more complex one that now relies on sending an email for the Forgot username process. ### Workarounds It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123 In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here. ### References * https://jira.xwiki.org/browse/XWIKI-18384 * https://jira.xwiki.org/browse/XWIKI-18408 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
{'CVE-2021-32732'}
2022-02-11T21:08:09Z
2022-02-10T22:42:46Z
HIGH
7.5
{'CWE-352'}
{'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://jira.xwiki.org/browse/XWIKI-18384', 'https://github.com/advisories/GHSA-vh5c-jqfg-mhrh', 'https://jira.xwiki.org/browse/XWIKI-18408', 'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf'}
null
GHSA
GHSA-c2h6-7gm8-cv4w
XSS in MITREid Connect
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
{'CVE-2020-5497'}
2021-08-23T15:04:33Z
2020-04-01T16:35:44Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-c2h6-7gm8-cv4w', 'http://seclists.org/fulldisclosure/2020/Feb/25', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521', 'http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1527', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526', 'https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5497'}
null
GHSA
GHSA-9rwj-8mh9-4876
Malicious Package in carloprojectdiscord
All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:23:53Z
2020-09-02T21:19:37Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/874', 'https://github.com/advisories/GHSA-9rwj-8mh9-4876'}
null
GHSA
GHSA-9qrg-h9g8-c65q
Prototype Pollution in deep-setter
All versions of `deep-setter` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:10:47Z
2020-09-04T15:14:26Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-9qrg-h9g8-c65q', 'https://www.npmjs.com/advisories/1333'}
null
GHSA
GHSA-h2xm-2p6w-mj2v
Out-of-bounds Write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0831'}
2021-07-28T18:58:14Z
2021-07-28T18:58:14Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0831', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831', 'https://github.com/advisories/GHSA-h2xm-2p6w-mj2v'}
null
GHSA
GHSA-99qr-9cc9-fv2x
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
{'CVE-2017-3166'}
2021-09-07T21:13:41Z
2018-12-21T17:50:03Z
MODERATE
7.8
{'CWE-732'}
{'https://github.com/advisories/GHSA-99qr-9cc9-fv2x', 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}
null
GHSA
GHSA-grmf-4fq6-2r79
Improper Restriction of Operations within the Bounds of a Memory Buffer in aubio
aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo.
{'CVE-2018-19800'}
2022-03-21T19:05:04Z
2019-07-26T16:10:28Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19800', 'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5', 'https://github.com/advisories/GHSA-grmf-4fq6-2r79'}
null
GHSA
GHSA-23xp-j737-282v
Path Traversal in takeapeek
All versions of `takeapeek` are vulnerable to path traversal exposing files and directories. ## Recommendation As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.
{'CVE-2018-16473'}
2021-01-08T20:10:26Z
2018-11-06T23:12:30Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/740', 'https://hackerone.com/reports/403736', 'https://github.com/advisories/GHSA-23xp-j737-282v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'}
null
GHSA
GHSA-h43v-26r7-7j4c
Allocation of Resources Without Limits or Throttling in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise before 0.10.3 allow unbounded resource usage.
{'CVE-2020-7218'}
2022-02-24T12:07:03Z
2021-05-18T18:20:19Z
HIGH
7.5
{'CWE-400', 'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7218', 'https://github.com/hashicorp/nomad/pull/7022', 'https://github.com/hashicorp/nomad/issues/7002', 'https://www.hashicorp.com/blog/category/nomad/', 'https://github.com/advisories/GHSA-h43v-26r7-7j4c'}
null
GHSA
GHSA-rq96-qhc5-vm4r
Exposure of Sensitive Information to an Unauthorized Actor in Apache NiFi
In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.
{'CVE-2021-44145'}
2022-01-05T17:33:32Z
2022-01-05T17:33:32Z
MODERATE
6.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44145', 'http://www.openwall.com/lists/oss-security/2021/12/17/1', 'https://nifi.apache.org/security.html#1.15.1-vulnerabilities', 'https://github.com/advisories/GHSA-rq96-qhc5-vm4r'}
null
GHSA
GHSA-fxh6-w476-hgr4
Directory Traversal in SharpCompress
SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction.
{'CVE-2018-1002206'}
2021-08-17T22:21:47Z
2019-09-11T22:59:57Z
MODERATE
5.5
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f', 'https://github.com/advisories/GHSA-fxh6-w476-hgr4'}
null
GHSA
GHSA-f72h-wf57-7xwh
Malicious Package in buffer-xo2
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:49Z
2020-09-03T21:58:34Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1248', 'https://github.com/advisories/GHSA-f72h-wf57-7xwh'}
null
GHSA
GHSA-mvvp-gwgc-5hrp
Path Traversal in elFinder.Net.Core
This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23407'}
2021-08-31T21:21:26Z
2021-08-02T17:30:27Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/advisories/GHSA-mvvp-gwgc-5hrp'}
null
GHSA
GHSA-25gf-8qrr-g78r
Missing SSL Certificate Validation in Hashicorp Consul
HashiCorp Consul before 1.10.1 (and Consul Enterprise) has Missing SSL Certificate Validation. xds does not ensure that the Subject Alternative Name of an upstream is validated.
{'CVE-2021-32574'}
2021-07-29T14:53:58Z
2021-07-19T21:21:03Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/hashicorp/consul/releases/tag/v1.10.1', 'https://www.hashicorp.com/blog/category/consul', 'https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32574', 'https://github.com/advisories/GHSA-25gf-8qrr-g78r'}
null
GHSA
GHSA-q3j5-32m5-58c2
Privilege Elevation in runc
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
{'CVE-2016-3697'}
2021-12-20T18:21:34Z
2021-12-20T18:21:34Z
HIGH
7.8
null
{'https://github.com/opencontainers/runc/releases/tag/v0.1.0', 'https://github.com/opencontainers/runc/pull/708', 'https://rhn.redhat.com/errata/RHSA-2016-1034.html', 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html', 'https://security.gentoo.org/glsa/201612-28', 'https://github.com/advisories/GHSA-q3j5-32m5-58c2', 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091', 'https://rhn.redhat.com/errata/RHSA-2016-2634.html', 'https://github.com/docker/docker/issues/21436', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697'}
null
GHSA
GHSA-fg5w-w99f-rj6w
Command Injection in @ronomon/opened
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
{'CVE-2021-29300'}
2021-06-08T23:15:35Z
2021-06-08T23:15:35Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec', 'https://github.com/advisories/GHSA-fg5w-w99f-rj6w', 'https://advisory.checkmarx.net/advisory/CX-2021-4775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300'}
null
GHSA
GHSA-5rpc-gwh9-q9fg
Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV
In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.
{'CVE-2017-12862'}
2021-12-01T15:06:04Z
2021-10-12T22:02:21Z
HIGH
8.8
{'CWE-119', 'CWE-787'}
{'https://github.com/advisories/GHSA-5rpc-gwh9-q9fg', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9370', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12862', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}
null
GHSA
GHSA-qr4m-jcvc-3382
Prototype Pollution in dot-notes
All versions of package dot-notes up to and including version 3.2.0 are vulnerable to Prototype Pollution via the create function.
{'CVE-2020-7717'}
2021-07-29T22:01:48Z
2021-05-06T18:12:00Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-qr4m-jcvc-3382', 'https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7717'}
null
GHSA
GHSA-chwr-hf3w-c984
Regular Expression Denial of Service in dat.gui
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
{'CVE-2020-7755'}
2021-05-10T18:44:38Z
2021-05-10T18:44:38Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-DATGUI-1016275', 'https://github.com/dataarts/dat.gui/issues/278', 'https://github.com/advisories/GHSA-chwr-hf3w-c984', 'https://github.com/dataarts/dat.gui/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7755', 'https://www.npmjs.com/package/dat.gui'}
null
GHSA
GHSA-ghq2-m3pq-qf3p
Stored XSS in Jenkins CVS Plugin
Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29037'}
2022-05-03T20:52:55Z
2022-04-13T00:00:18Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-ghq2-m3pq-qf3p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037', 'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
null
GHSA
GHSA-wrvr-8mpx-r7pp
Regular Expression Denial of Service in mime
Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. ## Recommendation Update to version 2.0.3 or later.
{'CVE-2017-16138'}
2021-01-08T01:23:39Z
2018-07-20T16:20:52Z
MODERATE
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/535', 'https://nodesecurity.io/advisories/535', 'https://github.com/advisories/GHSA-wrvr-8mpx-r7pp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16138', 'https://github.com/broofa/node-mime/issues/167'}
null
GHSA
GHSA-7p6w-x2gr-rrf8
Cross-Site Scripting in ag-grid-community
Versions of `ag-grid-community` prior to 14.0.0 are vulnerable to Cross-Site Scripting (XSS). Grid contents are not properly sanitized and may allow attackers to execute arbitrary JavaScript if user input is rendered in the grid. ## Recommendation Upgrade to version 14.0.0 or later
null
2021-09-27T21:42:30Z
2020-09-02T21:28:05Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-7p6w-x2gr-rrf8', 'https://github.com/ag-grid/ag-grid/issues/1961', 'https://www.npmjs.com/advisories/894'}
null
GHSA
GHSA-x2j7-6hxm-87p3
Remote code injection
An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).
{'CVE-2021-27903'}
2021-07-07T17:13:31Z
2021-07-02T18:36:41Z
CRITICAL
9.8
{'CWE-94', 'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27903', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38', 'https://github.com/advisories/GHSA-x2j7-6hxm-87p3', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23'}
null
GHSA
GHSA-xv7v-rf6g-xwrc
Directory Traversal in typo3/phar-stream-wrapper
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
{'CVE-2019-11831'}
2021-09-30T17:10:14Z
2021-09-30T17:10:14Z
CRITICAL
9.8
{'CWE-502', 'CWE-22'}
{'https://www.drupal.org/sa-core-2019-007', 'https://typo3.org/security/advisory/typo3-psa-2019-007/', 'http://www.securityfocus.com/bid/108302', 'https://github.com/advisories/GHSA-xv7v-rf6g-xwrc', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1', 'https://seclists.org/bugtraq/2019/May/36', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/', 'https://www.debian.org/security/2019/dsa-4445', 'https://www.synology.com/security/advisory/Synology_SA_19_22', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/'}
null
GHSA
GHSA-6fc8-4gx4-v693
ReDoS in Sec-Websocket-Protocol header
### Impact A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. ### Proof of concept ```js for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) { const value = 'b' + ' '.repeat(length) + 'x'; const start = process.hrtime.bigint(); value.trim().split(/ *, */); const end = process.hrtime.bigint(); console.log('length = %d, time = %f ns', length, end - start); } ``` ### Patches The vulnerability was fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff) and backported to ws@6.2.2 (https://github.com/websockets/ws/commit/78c676d2a1acefbc05292e9f7ea0a9457704bf1b) and ws@5.2.3 (https://github.com/websockets/ws/commit/76d47c1479002022a3e4357b3c9f0e23a68d4cd2). ### Workarounds In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options. ### Credits The vulnerability was responsibly disclosed along with a fix in private by [Robert McLaughlin](https://github.com/robmcl4) from University of California, Santa Barbara.
{'CVE-2021-32640'}
2022-04-19T19:02:58Z
2021-05-28T19:19:03Z
MODERATE
5.3
{'CWE-400', 'CWE-345'}
{'https://github.com/websockets/ws/issues/1895', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https://github.com/advisories/GHSA-6fc8-4gx4-v693'}
null
GHSA
GHSA-h3p9-wrgx-82cm
Use of a Broken or Risky Cryptographic Algorithm in Terraform
When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.
{'CVE-2019-19316'}
2021-07-28T16:28:51Z
2021-05-18T18:18:50Z
HIGH
3.7
{'CWE-327', 'CWE-20'}
{'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19316', 'https://github.com/hashicorp/terraform/issues/23493', 'https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626', 'https://github.com/advisories/GHSA-h3p9-wrgx-82cm'}
null
GHSA
GHSA-3892-2r52-p65m
HTTP Request Smuggling in goliath
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
{'CVE-2020-7671'}
2021-05-24T18:20:07Z
2021-05-24T18:20:07Z
MODERATE
7.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7671', 'https://github.com/advisories/GHSA-3892-2r52-p65m', 'https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136', 'https://github.com/postrank-labs/goliath/issues/351,'}
null
GHSA
GHSA-w2fr-65vp-mxw3
Deserialization of untrusted data in Symfony
In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.
{'CVE-2019-10912'}
2021-08-19T17:12:23Z
2020-02-12T18:44:50Z
HIGH
7.1
{'CWE-502'}
{'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/', 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/', 'https://github.com/advisories/GHSA-w2fr-65vp-mxw3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/', 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912', 'https://seclists.org/bugtraq/2019/May/21', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml', 'https://symfony.com/cve-2019-10912', 'https://www.debian.org/security/2019/dsa-4441'}
null
GHSA
GHSA-r679-m633-g7wc
Improper input validation in Apache Shiro
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
{'CVE-2019-12422'}
2020-02-04T22:36:36Z
2020-02-04T22:36:36Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-r679-m633-g7wc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E'}
null
GHSA
GHSA-xq98-5rcf-5wqh
Directory Traversal in badjs-sourcemap-server
Affected versions of `badjs-sourcemap-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16036'}
2021-01-07T23:59:51Z
2018-07-24T15:43:02Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-xq98-5rcf-5wqh', 'https://nodesecurity.io/advisories/349', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16036', 'https://www.npmjs.com/advisories/349'}
null
GHSA
GHSA-8xv9-qcr9-ww9j
Authenticated XML External Entity Processing
### Impact Authenticated XML External Entity Processing ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
null
2022-04-19T19:02:38Z
2020-10-19T21:32:18Z
MODERATE
5.6
{'CWE-611'}
{'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j', 'https://github.com/advisories/GHSA-8xv9-qcr9-ww9j', 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'}
null
GHSA
GHSA-j85q-whc9-g4p9
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
{'CVE-2021-3678'}
2021-09-02T17:07:48Z
2021-09-02T17:07:48Z
MODERATE
5.9
{'CWE-338'}
{'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4', 'https://github.com/advisories/GHSA-j85q-whc9-g4p9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'}
null
GHSA
GHSA-vq9j-jh62-5hmp
Apache Camel using an outdated vulnerable JSON-lib library
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.
{'CVE-2017-5643'}
2022-04-26T21:36:33Z
2018-10-16T23:13:11Z
HIGH
7.4
{'CWE-918'}
{'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/advisories/GHSA-vq9j-jh62-5hmp', 'http://www.securityfocus.com/bid/97226', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5643', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-jxx8-v83v-rhw3
Moderate severity vulnerability that affects spree
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
{'CVE-2013-1656'}
2021-09-14T22:04:07Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-20'}
{'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'https://github.com/advisories/GHSA-jxx8-v83v-rhw3', 'https://www.conviso.com.br/advisories/CVE-2013-1656.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656', 'http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html'}
null
GHSA
GHSA-5jgq-x857-p8xw
Account compromise in Evmos
## Impact _What kind of vulnerability is it? Who is impacted?_ ### Classification The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses. ### Disclosure The attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK `AnteHandler`, and the Evmos `x/claims` module. The step-by-step attack is described below: 1. An actor creates a malicious chain with a custom `AnteHandler` that skips signature verification for transactions, specifically IBC `MsgTransfer`. This allows the attacker to impersonate any account by setting a custom `sender` address field of the IBC transfer message. 2. The malicious actor then connects this newly created chain via IBC to Evmos and fills the `recipient` address from the transfer message with an address they control. 3. Once the IBC packet containing the Transfer data is relayed to Evmos, it is processed by the claims module IBC middleware. Which migrates the claim records to the recipient address, which is owned by the attacker. 4. The attacker then performs two airdrop Actions, claiming up to 75% of the total initial claimable amount. 5. The Actor repeats steps 1., 2., and 3. for every address that has unclaimed funds from the airdrop. This automatically claims 75% of the unclaimable amount. 6. The malicious actor performs the final Action, claiming 100% of all the user funds. 7. Then, the attacker transfers the funds to another chain with a DEX (Osmosis, Cosmos Hub) via IBC. 8. Finally, the attacker withdraws the total amount in fiat through a centralized exchange. ### Users impacted No users have suffered the loss of funds as no malicious chains have been connected to Evmos. ## Patches _Has the problem been patched? What versions should users upgrade to?_ The patch involves defining a list of authorized channels for chains that are connected to Evmos via IBC. This restricts the chains that have the capability of migrating users' claims records as per the specification. By default, the authorized destination channels are `"channel-0"` (Osmosis) and `"channel-3"` (Cosmos Hub). Please upgrade your mainnet node and validator to [`v2.0.1`](https://github.com/tharsis/evmos/releases/tag/v2.0.1) **ASAP**. ## Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No, the fix for the critical vulnerability is state machine breaking. An upgrade procedure must be coordinated with the nodes running the network. ## References _Are there any links users can visit to find out more?_ * Claims module spec: [evmos.dev/modules/claims](https://evmos.dev/modules/claims) * Cosmos SDK documentation: [docs.cosmos.network](https://docs.cosmos.network/) * IBC documentation: [ibc.cosmos.network](https://ibc.cosmos.network/) ## For more information If you have any questions or comments about this advisory: * Reach out to the Core Team in [Discord](https://discord.gg/evmos) * Open an issue in [tharsis/evmos](http://github.com/tharsis/evmos/issues) * Email us at [security@thars.is](security@thars.is) Thanks to the Core IBC team at Interchain GmbH for the secure disclosure of this vulnerability
{'CVE-2022-24738'}
2022-03-18T20:07:35Z
2022-03-07T21:45:59Z
HIGH
7.4
{'CWE-287'}
{'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738', 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71', 'https://github.com/advisories/GHSA-5jgq-x857-p8xw', 'https://github.com/tharsis/evmos/releases/tag/v2.0.1'}
null
GHSA
GHSA-9x64-5r7x-2q53
Malicious Package in flatmap-stream
Version 0.1.1 of `flatmap-stream` is considered malicious. This module runs an encrypted payload targeting a very specific application, `copay` and because they shared the same description it would have likely worked for `copay-dash`. The injected code: - Read in AES encrypted data from a file disguised as a test fixture - Grabbed the npm package description of the module that imported it, using an automatically set environment variable - Used the package description as a key to decrypt a chunk of data pulled in from the disguised file The decrypted data was part of a module, which was then compiled in memory and executed. This module performed the following actions: - Decrypted another chunk of data from the disguised file - Concatenated a small, commented prefix from the first decrypted chunk to the end of the second decrypted chunk - Performed minor decoding tasks to transform the concatenated block of code from invalid JS to valid JS (we believe this was done to evade detection by dynamic analysis tools) - Wrote this processed block of JS out to a file stored in a dependency that would be packaged by the build scripts: The chunk of code that was written out was the actual malicious code, intended to be run on devices owned by the end users of Copay. This code would do the following: - Detect the current environment: Mobile/Cordova/Electron - Check the Bitcoin and Bitcoin Cash balances on the victim's copay account - If the current balance was greater than 100 Bitcoin, or 1000 Bitcoin Cash: - Harvest the victim's account data in full - Harvest the victim's copay private keys - Send the victim's account data/private keys off to a collection ## Recommendation If you find this module in your environment it's best to remove it. The malicious version of event-stream and flatmap-stream have been removed from the npm Registry.
null
2021-10-01T13:30:05Z
2020-09-01T21:21:32Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/737', 'https://github.com/advisories/GHSA-9x64-5r7x-2q53', 'https://github.com/dominictarr/event-stream/issues/116'}
null
GHSA
GHSA-hmq6-frv3-4727
High severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml
XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors.
{'CVE-2016-3720'}
2021-09-14T17:25:58Z
2018-10-18T17:43:16Z
CRITICAL
9.8
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3720', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184561.html', 'https://github.com/advisories/GHSA-hmq6-frv3-4727'}
null
GHSA
GHSA-rhvc-x32h-5526
No CSRF Validation in droppy
Affected versions of `droppy` are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others. ## Recommendation Update to version 3.5.0 or later.
{'CVE-2016-10529'}
2021-01-07T22:33:34Z
2019-02-18T23:39:32Z
HIGH
0
{'CWE-352'}
{'https://www.npmjs.com/advisories/91', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10529', 'https://nodesecurity.io/advisories/91', 'https://github.com/advisories/GHSA-rhvc-x32h-5526'}
null
GHSA
GHSA-m428-jqc4-2p5j
Prototype Pollution in phpjs
All versions of phpjs up to and including 1.3.2 are vulnerable to Prototype Pollution via parse_str. phpjs is no longer maintained and users are advised to use Locutus as a replacement (https://github.com/locutusjs/locutus)
{'CVE-2020-7700'}
2021-05-06T17:28:46Z
2021-05-06T17:28:46Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-m428-jqc4-2p5j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7700', 'https://snyk.io/vuln/SNYK-JS-PHPJS-598681'}
null
GHSA
GHSA-46fh-8fc5-xcwx
Prototype Pollution in lodash.defaultsdeep
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to Prototype Pollution. The function 'defaultsDeep' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2021-09-29T14:56:01Z
2020-09-03T18:09:16Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1070', 'https://github.com/advisories/GHSA-46fh-8fc5-xcwx'}
null
GHSA
GHSA-6wj2-g87r-pm62
Cross-site Scripting in comrak
An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.
{'CVE-2021-38186'}
2021-08-25T20:55:43Z
2021-08-25T20:55:43Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38186', 'https://github.com/advisories/GHSA-6wj2-g87r-pm62', 'https://github.com/kivikakk/comrak/releases/tag/0.10.1', 'https://rustsec.org/advisories/RUSTSEC-2021-0063.html'}
null
GHSA
GHSA-cwp3-834g-x79g
Moderate severity vulnerability that affects archive-tar-minitar and minitar
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
null
2021-12-03T14:10:53Z
2018-08-21T17:07:36Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-cwp3-834g-x79g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}
null
GHSA
GHSA-v62j-fcxq-j239
Stored XSS in Apache Atlas
Apache Atlas versions 0.8.3 and 1.1.0 were found vulnerable to Stored Cross-Site Scripting in the search functionality
{'CVE-2019-10070'}
2021-08-19T16:23:49Z
2020-01-08T17:26:53Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/cc21437c4c5053a13e13332d614d5172f39da03491fe17ae260be221@%3Cdev.atlas.apache.org%3E', 'https://github.com/advisories/GHSA-v62j-fcxq-j239', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10070'}
null
GHSA
GHSA-3m6r-39p3-jq25
Doorkeeper is vulnerable to replay attacks
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
{'CVE-2016-6582'}
2022-04-25T16:34:59Z
2017-10-24T18:33:35Z
CRITICAL
9.1
{'CWE-1254'}
{'http://www.securityfocus.com/bid/92551', 'http://seclists.org/fulldisclosure/2016/Aug/105', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/doorkeeper-gem/doorkeeper/issues/875', 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html', 'http://www.securityfocus.com/archive/1/539268/100/0/threaded', 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'}
null
GHSA
GHSA-m5ff-3wj3-8ph4
HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress
### Impact If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. ``` Content-Length: 10 Transfer-Encoding: [\x0b]chunked ``` For clarity: ``` 0x0b == vertical tab ``` Would get parsed by Waitress as being a `chunked` request, but a front-end server would use the `Content-Length` instead as the `Transfer-Encoding` header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. ### Patches Please upgrade to Waitress 1.4.1 which fixes this issue with stricter HTTP field validation. Waitress 1.4.1 due to this change has become much more strict in what is allowed in header values, while the maintainers don't believe that these changes will cause any issues, it may cause failures with non-conformist reverse proxies or clients, and it is highly recommend that users validate the changes in their environment and make sure it won't cause any unacceptable failures. ### Workarounds You may enable additional protections on front-end servers, those that follow RFC7230 correctly would drop the request with a 400 Bad Request. Waitress will now correctly responds to the request with a 400 Bad Request, and will drop the connection to avoid any potential HTTP pipelining issues. ### References This was mentioned in https://portswigger.net/research/http-desync-attacks-what-happened-next and was specifically mentioned as being an issue in HAProxy which did not properly filter it in this article: https://nathandavison.com/blog/haproxy-http-request-smuggling ### Thanks The Pylons Project would like to thank ZeddYu Lu for doing extended testing against Waitress 1.4.0 and bringing this to our attention! ### For more information If you have any questions or comments about this advisory: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
null
2022-04-25T23:09:44Z
2019-12-26T16:34:38Z
HIGH
0
{'CWE-444'}
{'https://github.com/advisories/GHSA-m5ff-3wj3-8ph4', 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}
null
GHSA
GHSA-q643-w9jp-q2qg
Hardcoded Initialization Vector in parsel
All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2020-09-04T17:34:59Z
2020-09-04T17:34:59Z
HIGH
0
null
{'https://github.com/advisories/GHSA-q643-w9jp-q2qg', 'https://www.npmjs.com/advisories/1460'}
null
GHSA
GHSA-6qfg-8799-r575
Symlink Attack
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
{'CVE-2019-11251'}
2021-05-18T15:30:07Z
2021-05-18T15:30:07Z
MODERATE
5.7
{'CWE-61', 'CWE-59'}
{'https://github.com/kubernetes/kubernetes/issues/87773', 'https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ', 'https://github.com/kubernetes/kubernetes/pull/82143', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11251', 'https://github.com/advisories/GHSA-6qfg-8799-r575'}
null
GHSA
GHSA-c2vr-2c89-ph88
Downloads Resources over HTTP in node-bsdiff-android
Affected versions of `node-bsdiff-android` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10641'}
2021-09-16T20:54:15Z
2018-09-18T13:49:54Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10641', 'https://nodesecurity.io/advisories/234', 'https://www.npmjs.com/advisories/234', 'https://github.com/advisories/GHSA-c2vr-2c89-ph88'}
null
GHSA
GHSA-m2q4-qghh-p9cq
Server-Side Request Forgery in yoast_seo
The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account.
{'CVE-2021-31779'}
2021-05-21T19:21:38Z
2021-05-21T19:21:38Z
MODERATE
6.4
{'CWE-918'}
{'https://github.com/advisories/GHSA-m2q4-qghh-p9cq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-006'}
null
GHSA
GHSA-qfcv-5whw-7pcw
Exposure of Sensitive Information to an Unauthorized Actor in AEgir
### Impact `aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm. ### Patches The code has been patched, users should upgrade to >= 21.10.1 ### Workarounds Run `printenv` to check your environment variables and revoke any secrets. ### For more information If you have any questions or comments about this advisory: * Open an issue in [aegir](https://github.com/ipfs/aegir)
{'CVE-2020-11059'}
2021-10-08T19:56:46Z
2020-05-27T21:09:15Z
CRITICAL
9.6
{'CWE-200'}
{'https://github.com/advisories/GHSA-qfcv-5whw-7pcw', 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059'}
null
GHSA
GHSA-72fv-qgj6-2w2p
Cross-site Scripting in NodeBB
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
{'CVE-2015-9286'}
2021-08-03T21:27:01Z
2019-05-01T18:37:08Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-72fv-qgj6-2w2p', 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529', 'https://github.com/NodeBB/NodeBB/pull/3371', 'https://www.vulnerability-lab.com/get_content.php?id=1608', 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}
null
GHSA
GHSA-f554-x222-wgf7
Command Injection in Xstream
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
{'CVE-2013-7285'}
2022-04-26T20:45:48Z
2019-05-29T18:05:03Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html', 'http://seclists.org/oss-sec/2014/q1/69', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285', 'http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html', 'http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html', 'https://x-stream.github.io/CVE-2013-7285.html', 'https://github.com/advisories/GHSA-f554-x222-wgf7', 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}
null
GHSA
GHSA-rgcm-rpq9-9cgr
Missing Authentication for Critical Function in Saleor
An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).
{'CVE-2020-7964'}
2021-07-28T17:57:09Z
2021-07-28T17:57:09Z
MODERATE
5.3
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7964', 'https://github.com/mirumee/saleor/releases/tag/2.9.1', 'https://github.com/advisories/GHSA-rgcm-rpq9-9cgr', 'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'}
null
GHSA
GHSA-r74q-gxcg-73hx
High severity vulnerability that affects simple_form
## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call ### Impact For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example: ```erb <%= simple_form_for @user do |f| %> <%= f.label @user_supplied_string %> ... <% end %> ``` The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`). By manipulation that input, an attacker could do any of the following: - Code execution (call actions like `#destroy`) - Denial of Service (by executing a computation intensive method) - Information Disclosure (check the presence of methods, leak user information) ### Patches The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem. ### Workarounds The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected. A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following: ```erb <%= form.input :avatar, as: :file %> ``` ### References [TDB] ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form) * Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br)
{'CVE-2019-16676'}
2021-09-17T14:36:30Z
2019-09-30T19:41:15Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/plataformatec/simple_form/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/', 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx'}
null
GHSA
GHSA-6jf5-rmhv-38cw
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0639'}
2021-09-02T16:39:08Z
2019-04-09T19:44:03Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/advisories/GHSA-6jf5-rmhv-38cw', 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639'}
null
GHSA
GHSA-mfwh-gqx8-c787
Allocation of Resources Without Limits or Throttling in Apache Tika
A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later.
{'CVE-2019-10088'}
2021-05-05T22:58:09Z
2019-08-06T01:43:40Z
HIGH
8.8
{'CWE-770'}
{'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-mfwh-gqx8-c787', 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190828-0004/'}
null
GHSA
GHSA-9cph-cqqh-36pw
Malicious Package in babel-loqder
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:18:00Z
2020-09-04T15:29:25Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1350', 'https://github.com/advisories/GHSA-9cph-cqqh-36pw'}
null
GHSA
GHSA-53hp-jpwq-2jgq
Uncontrolled Resource Consumption in Apache Tomcat
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
{'CVE-2020-11996'}
2022-02-09T23:03:59Z
2022-02-09T23:01:22Z
HIGH
7.5
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd@%3Cnotifications.ofbiz.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://usn.ubuntu.com/4596-1/', 'https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-53hp-jpwq-2jgq', 'https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11996', 'https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b@%3Ccommits.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200709-0002/', 'https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html', 'https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561@%3Ccommits.ofbiz.apache.org%3E'}
null