ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-x76r-966h-5qv9 | Out-of-bounds Write in vec-const | An issue was discovered in the vec-const crate before 2.0.0 for Rust. It tries to construct a Vec from a pointer to a const slice, leading to memory corruption. | {'CVE-2021-45680'} | 2022-01-07T16:19:26Z | 2022-01-06T22:15:56Z | HIGH | 7.5 | {'CWE-787'} | {'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/vec-const/RUSTSEC-2021-0082.md', 'https://github.com/advisories/GHSA-x76r-966h-5qv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45680', 'https://rustsec.org/advisories/RUSTSEC-2021-0082.html'} | null |
GHSA | GHSA-cqxw-3p7v-p9gr | Phusion Passenger uses a known /tmp filename | In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user | {'CVE-2016-10345'} | 2022-04-26T20:43:37Z | 2018-08-21T17:08:03Z | HIGH | 7.8 | null | {'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr', 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345'} | null |
GHSA | GHSA-236h-rqv8-8q73 | GraphQL: Security breach on Viewer query | ### Impact
An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object.
### Patches
This vulnerability has been patched in Parse Server 4.3.0.
### Workarounds
No
### References
See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details. | {'CVE-2020-15126'} | 2022-04-19T19:02:30Z | 2020-07-22T23:06:47Z | HIGH | 6.5 | {'CWE-863'} | {'https://github.com/advisories/GHSA-236h-rqv8-8q73', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430', 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'} | null |
GHSA | GHSA-232r-66cg-79px | Paramiko not properly checking authention before processing other requests | transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step. | {'CVE-2018-7750'} | 2022-04-26T20:43:25Z | 2018-07-12T20:29:30Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://access.redhat.com/errata/RHSA-2018:1525', 'https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516', 'https://access.redhat.com/errata/RHSA-2018:1124', 'https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst', 'https://access.redhat.com/errata/RHSA-2018:1125', 'https://github.com/paramiko/paramiko/issues/1175', 'https://access.redhat.com/errata/RHSA-2018:1274', 'https://usn.ubuntu.com/3603-1/', 'https://access.redhat.com/errata/RHSA-2018:1972', 'http://www.securityfocus.com/bid/103713', 'https://access.redhat.com/errata/RHSA-2018:0646', 'https://github.com/advisories/GHSA-232r-66cg-79px', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://access.redhat.com/errata/RHSA-2018:1213', 'https://www.exploit-db.com/exploits/45712/', 'https://usn.ubuntu.com/3603-2/', 'https://access.redhat.com/errata/RHSA-2018:1328', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html', 'https://access.redhat.com/errata/RHSA-2018:0591', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7750'} | null |
GHSA | GHSA-7wwv-vh3v-89cq | ReDOS vulnerabities: multiple grammars | ### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking)
[oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS):
> The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.
If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service).
This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@10.4.0/build/highlight.js
All versions prior to 10.4.1 are vulnerable, including version 9.18.5.
**Grammars with exponential backtracking issues:**
- c-like (c, cpp, arduino)
- handlebars (htmlbars)
- gams
- perl
- jboss-cli
- r
- erlang-repl
- powershell
- routeros
- livescript (10.4.0 and 9.18.5 included this fix)
- javascript & typescript (10.4.0 included partial fixes)
And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`.
**Grammars with polynomial backtracking issues:**
- kotlin
- gcode
- d
- aspectj
- moonscript
- coffeescript/livescript
- csharp
- scilab
- crystal
- elixir
- basic
- ebnf
- ruby
- fortran/irpf90
- livecodeserver
- yaml
- x86asm
- dsconfig
- markdown
- ruleslanguage
- xquery
- sqf
And again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues.
### Patches
- Version 10.4.1 resolves these vulnerabilities. Please upgrade.
### Workarounds / Mitigations
- Discontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues)
- Attempt cherry-picking the grammar fixes into older versions...
- Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary.
### References
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue: https://github.com/highlightjs/highlight.js/issues
* Email us at [security@highlightjs.com](mailto:security@highlightjs.com) | null | 2022-05-03T08:27:46Z | 2020-12-04T16:47:20Z | MODERATE | 0 | {'CWE-20', 'CWE-400'} | {'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c', 'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://github.com/advisories/GHSA-7wwv-vh3v-89cq'} | null |
GHSA | GHSA-h7f9-cvh5-qw7f | Path traversal in pimcore/pimcore | This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability. | {'CVE-2021-23340'} | 2021-02-25T16:32:46Z | 2021-02-25T16:32:46Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132', 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/advisories/GHSA-h7f9-cvh5-qw7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23340'} | null |
GHSA | GHSA-25xc-jwfq-39jw | Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19 | Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
- https://vaadin.com/security/cve-2021-31407 | {'CVE-2021-31407'} | 2021-05-06T17:12:47Z | 2021-04-19T14:50:49Z | HIGH | 8.6 | {'CWE-402', 'CWE-668'} | {'https://github.com/advisories/GHSA-25xc-jwfq-39jw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407', 'https://vaadin.com/security/cve-2021-31407', 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw', 'https://github.com/vaadin/flow/pull/10229', 'https://github.com/vaadin/flow/pull/10269', 'https://github.com/vaadin/osgi/issues/50'} | null |
GHSA | GHSA-8462-q7x7-g2x4 | High severity vulnerability that affects bson | The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string. | {'CVE-2018-13863'} | 2021-09-03T22:29:40Z | 2018-09-17T20:44:58Z | HIGH | 7.5 | {'CWE-400', 'CWE-185'} | {'https://snyk.io/vuln/npm:bson:20180225', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'} | null |
GHSA | GHSA-xcwj-wfcm-m23c | Invalid validation in `SparseMatrixSparseCholesky` | ### Impact
An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`:
```python
import tensorflow as tf
import numpy as np
from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops
indices_array = np.array([[0, 0]])
value_array = np.array([-10.0], dtype=np.float32)
dense_shape = [1, 1]
st = tf.SparseTensor(indices_array, value_array, dense_shape)
input = sparse_csr_matrix_ops.sparse_tensor_to_csr_sparse_matrix(
st.indices, st.values, st.dense_shape)
permutation = tf.constant([], shape=[1, 0], dtype=tf.int32)
tf.raw_ops.SparseMatrixSparseCholesky(input=input, permutation=permutation, type=tf.float32)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments:
```cc
void Compute(OpKernelContext* ctx) final {
...
const Tensor& input_permutation_indices = ctx->input(1);
...
ValidateInputs(ctx, *input_matrix, input_permutation_indices, &batch_size, &num_rows);
...
}
void ValidateInputs(OpKernelContext* ctx,
const CSRSparseMatrix& sparse_matrix,
const Tensor& permutation_indices, int* batch_size,
int64* num_rows) {
OP_REQUIRES(ctx, sparse_matrix.dtype() == DataTypeToEnum<T>::value, ...)
...
}
```
Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since [`OP_REQUIRES`](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function.
```cc
#define OP_REQUIRES(CTX, EXP, STATUS) \
do { \
if (!TF_PREDICT_TRUE(EXP)) { \
CheckNotInComputeAsync((CTX), "OP_REQUIRES_ASYNC"); \
(CTX)->CtxFailure(__FILE__, __LINE__, (STATUS)); \
return; \
} \
} while (0)
```
Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`.
### Patches
We have patched the issue in GitHub commit [e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd](https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29530'} | 2021-05-21T14:22:09Z | 2021-05-21T14:22:09Z | LOW | 2.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/advisories/GHSA-xcwj-wfcm-m23c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29530', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | null |
GHSA | GHSA-7h8x-wmq2-7mff | Command injection in launchpad | All versions of package launchpad are vulnerable to Command Injection via stop. | {'CVE-2021-23330'} | 2021-04-13T15:20:20Z | 2021-04-13T15:20:20Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://github.com/bitovi/launchpad/pull/124', 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118', 'https://github.com/advisories/GHSA-7h8x-wmq2-7mff', 'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330'} | null |
GHSA | GHSA-mj9p-v2r8-wf8w | Cross-site scripting in SimpleSAMLphp | ### Background
SimpleSAMLphp allows users to report errors and failures to the system administrators via a web form. This web form gathers some contextual information automatically, but it also allows the user to provide their email address for follow-ups and a free-text explanation of what happened. Once submitted, the report is sent as an email to the administrative email address configured in the software.
### Description
The `www/erroreport.php` script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new `SimpleSAML\Utils\EMail` class was introduced to handle sending emails, implemented as a wrapper of an external dependency.
This new wrapper allows us to use Twig templates in order to create the email sent with an error report. Since Twig provides automatic escaping of variables, manual escaping of the free-text field in `www/errorreport.php` was removed to avoid double escaping. However, for those not using the new user interface yet, an email template is hardcoded into the class itself in plain PHP. Since no escaping is provided in this template, it is then possible to inject HTML inside the template by manually crafting the contents of the free-text field.
### Affected versions
SimpleSAMLphp versions 1.18.0 to 1.18.3, both inclusive.
### Impact
An attacker may take advantage of this issue to manually craft a modified email sent via the error reporting mechanism, such as this email might trick a system administrator into performing an action, such as introducing their credentials into a phishing web site that resembles the original.
Remote execution of javascript code is considered unfeasible since email clients do not run javascript present in emails, although there might be email clients which don't follow this rule, making the attack surface grow.
### Resolution
Upgrade the SimpleSAMLphp installation to version 1.18.4.
### Credit
This vulnerability was discovered and reported by Frederic Vleminckx. | {'CVE-2020-5226'} | 2021-01-08T20:32:55Z | 2020-01-24T21:26:54Z | LOW | 4.4 | {'CWE-79'} | {'https://simplesamlphp.org/security/202001-01', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5226', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w', 'https://github.com/advisories/GHSA-mj9p-v2r8-wf8w'} | null |
GHSA | GHSA-q48g-p5cx-c7c7 | Directory Traversal in yzt | Affected versions of `yzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16221'} | 2021-01-14T15:45:59Z | 2020-09-01T17:36:42Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-q48g-p5cx-c7c7', 'https://nodesecurity.io/advisories/416', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16221', 'https://www.npmjs.com/advisories/416', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt'} | null |
GHSA | GHSA-c4qh-4vgv-qc6g | Uncontrolled Resource Consumption in Django | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. | {'CVE-2019-14232'} | 2021-12-03T20:28:51Z | 2019-08-06T01:43:29Z | HIGH | 7.5 | {'CWE-400'} | {'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-c4qh-4vgv-qc6g', 'https://github.com/pypa/advisory-db/tree/main/vulns/django/PYSEC-2019-11.yaml', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14232', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'} | null |
GHSA | GHSA-24x6-8c7m-hv3f | Heap OOB read in TFLite's implementation of `Minimum` or `Maximum` | ### Impact
The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty.
This is because [the broadcasting implementation](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds:
```cc
auto maxmin_func = [&](int indexes[N]) {
output_data[SubscriptToIndex(output_desc, indexes)] =
op(input1_data[SubscriptToIndex(desc1, indexes)],
input2_data[SubscriptToIndex(desc2, indexes)]);
};
```
### Patches
We have patched the issue in GitHub commit [953f28dca13c92839ba389c055587cfe6c723578](https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29590'} | 2021-05-21T14:26:53Z | 2021-05-21T14:26:53Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29590', 'https://github.com/advisories/GHSA-24x6-8c7m-hv3f', 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'} | null |
GHSA | GHSA-xmh9-rg6f-j3mr | Verification flaw in Solid identity-token-verifier | ### Impact
#### Severity
Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod.
#### Summary
A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed.
DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP.
A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability.
### Patches
A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35
### Workarounds
None
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository.
* Email: info@solidproject.org | null | 2021-03-12T22:39:01Z | 2021-03-12T22:39:01Z | MODERATE | 0 | {'CWE-290'} | {'https://github.com/advisories/GHSA-xmh9-rg6f-j3mr', 'https://www.npmjs.com/package/@solid/identity-token-verifier', 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2', 'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr'} | null |
GHSA | GHSA-8892-84wf-cg8f | SyncChannel<T> can move 'T: !Send' to other threads | Affected versions of this crate unconditionally implement Send/Sync for `SyncChannel<T>`.
`SyncChannel<T>` doesn't provide access to `&T` but merely serves as a channel that consumes and returns owned `T`.
Users can create UB in safe Rust by sending `T: !Send` to other threads with `SyncChannel::send/recv` APIs. Using `T = Arc<Cell<_>` allows to create data races (which can lead to memory corruption), and using `T = MutexGuard<T>` allows to unlock a mutex from a thread that didn't lock the mutex.
| null | 2021-08-25T21:00:16Z | 2021-08-25T21:00:16Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/kitsuneninetails/signal-rust/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html', 'https://github.com/advisories/GHSA-8892-84wf-cg8f'} | null |
GHSA | GHSA-ph87-fvjr-v33w | CHECK-fail in `tf.raw_ops.RFFT` | ### Impact
An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`:
```python
import tensorflow as tf
inputs = tf.constant([1], shape=[1], dtype=tf.float32)
fft_length = tf.constant([0], shape=[1], dtype=tf.int32)
tf.raw_ops.RFFT(input=inputs, fft_length=fft_length)
```
The above example causes Eigen code to operate on an empty matrix. This triggers on an assertion and causes program termination.
### Patches
We have patched the issue in GitHub commit [31bd5026304677faa8a0b77602c6154171b9aec1](https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29563'} | 2021-05-21T14:25:05Z | 2021-05-21T14:25:05Z | LOW | 2.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-ph87-fvjr-v33w', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29563', 'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1'} | null |
GHSA | GHSA-9cg2-2j2h-59v9 | Data races in atom | An issue was discovered in the atom crate before 0.3.6 for Rust. An unsafe Send implementation allows a cross-thread data race. | {'CVE-2020-35897'} | 2021-08-25T20:49:11Z | 2021-08-25T20:49:11Z | MODERATE | 4.7 | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35897', 'https://github.com/advisories/GHSA-9cg2-2j2h-59v9', 'https://rustsec.org/advisories/RUSTSEC-2020-0044.html', 'https://github.com/slide-rs/atom/issues/13'} | null |
GHSA | GHSA-4f9m-pxwh-68hg | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.20.9 or later. | null | 2021-09-28T16:57:08Z | 2020-09-11T21:20:14Z | MODERATE | 6.5 | {'CWE-79'} | {'https://www.npmjs.com/advisories/976', 'https://github.com/advisories/GHSA-4f9m-pxwh-68hg', 'https://github.com/swagger-api/swagger-ui/pull/5190', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921'} | null |
GHSA | GHSA-h67m-xg8f-fxcf | Deadlock in mutually recursive `tf.function` objects | ### Impact
The [code behind `tf.function` API](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/python/eager/def_function.py#L542) can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive:
```python
import tensorflow as tf
@tf.function()
def fun1(num):
if num == 1:
return
print(num)
fun2(num-1)
@tf.function()
def fun2(num):
if num == 0:
return
print(num)
fun1(num-1)
fun1(9)
```
This occurs due to using a non-reentrant `Lock` Python object.
Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario.
### Patches
We have patched the issue in GitHub commit [afac8158d43691661ad083f6dd9e56f327c1dcb7](https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41213'} | 2021-11-10T18:59:32Z | 2021-11-10T18:59:32Z | MODERATE | 5.5 | {'CWE-667'} | {'https://github.com/advisories/GHSA-h67m-xg8f-fxcf', 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41213', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf'} | null |
GHSA | GHSA-v662-xpcc-9xf6 | It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro | ### Impact
The `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights).
Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension.
### Patches
It has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1.
### Workarounds
There is no easy workaround other than disabling the affected macros.
Inserting content in a safe way or knowing what is the user who called the wiki macro is not easy.
### References
https://jira.xwiki.org/browse/XWIKI-17759
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2021-21379'} | 2021-03-23T22:47:26Z | 2021-03-23T22:47:26Z | LOW | 0 | {'CWE-281'} | {'https://github.com/advisories/GHSA-v662-xpcc-9xf6', 'https://jira.xwiki.org/browse/XWIKI-17759', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21379', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6'} | null |
GHSA | GHSA-p4v2-r99v-wjc2 | Improper Encoding or Escaping of Output in Nicotine+ | Denial of service (DoS) vulnerability in Nicotine+ starting with version 3.0.3 and prior to version 3.2.1 allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character. | {'CVE-2021-45848'} | 2022-03-29T21:18:19Z | 2022-03-16T00:00:38Z | HIGH | 7.5 | {'CWE-116'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45848', 'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045', 'https://github.com/advisories/GHSA-p4v2-r99v-wjc2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWYV53KERFH2EC4XI2IVVQFTV75E5XM6/', 'https://github.com/nicotine-plus/nicotine-plus/issues/1777'} | null |
GHSA | GHSA-hc9w-4p87-j549 | Prototype Pollution in cached-path-relative | Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.2 or later. | {'CVE-2018-16472'} | 2021-01-08T18:41:56Z | 2018-11-07T20:46:25Z | HIGH | 0 | {'CWE-400'} | {'https://hackerone.com/reports/390847', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472', 'https://github.com/ashaffer/cached-path-relative/issues/3', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json', 'https://www.npmjs.com/advisories/739', 'https://github.com/advisories/GHSA-hc9w-4p87-j549'} | null |
GHSA | GHSA-h33p-5j96-w8qh | OS Command Injection in gulkp-styledocco | gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument 'options' of the exports function in 'index.js' can be controlled by users without any sanitization. | {'CVE-2020-7607'} | 2021-07-28T21:22:24Z | 2021-05-07T16:14:48Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7607', 'https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126', 'https://github.com/advisories/GHSA-h33p-5j96-w8qh'} | null |
GHSA | GHSA-33p6-fx42-7rf5 | Harbor is vulnerable to a limited Server-Side Request Forgery (SSRF) (CVE-2020-13788) | # Impact
Matt Hamilton from Soluble has discovered a limited Server-Side Request Forgery (SSRF) that allowed Harbor project owners to scan the TCP ports of hosts on the Harbor server's internal network.
The vulnerability was immediately fixed by the Harbor team.
# Issue
The “Test Endpoint” API, part of the functionality for ensuring a project Webhook is accessible and functional, is vulnerable to a limited SSRF attack. A malicious user that is also a project administrator can use this API for internal port scanning.
# Known Attack Vectors
Successful exploitation of this issue will lead to bad actors identifying open TCP ports on any network that is accessible by the Harbor core services
# Patches
If your product uses the affected releases of Harbor, update to version 2.0.1 to patch this issue immediately.
https://github.com/goharbor/harbor/releases/tag/v2.0.1
# Workarounds
Since only project administrators (the user that created the project) are allowed to test the webhook endpoints configured in Harbor, a Harbor system administrator can control who is a project admin. In addition, Harbor system administrators can enforce a setting where only an administrator is allowed to create new projects instead of the default Everyone. This further restricts who can be a project administrator in Harbor.
# For more information
If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io
View our security policy at https://github.com/goharbor/harbor/security/policy
https://nvd.nist.gov/vuln/detail/CVE-2020-13788
https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788 | {'CVE-2020-13788'} | 2022-02-11T23:17:02Z | 2022-02-11T23:17:02Z | LOW | 4 | {'CWE-918'} | {'https://github.com/goharbor/harbor/security/advisories/GHSA-33p6-fx42-7rf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13788', 'https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788', 'https://github.com/goharbor/harbor/releases', 'https://github.com/advisories/GHSA-33p6-fx42-7rf5', 'https://www.youtube.com/watch?v=v8Isqy4yR3Q'} | null |
GHSA | GHSA-jhjh-ghwx-6h7r | Low severity vulnerability that affects modulemd | modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution. | {'CVE-2017-1002157'} | 2021-01-08T18:34:49Z | 2019-01-17T13:56:18Z | LOW | 0 | {'CWE-242'} | {'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157', 'https://pagure.io/modulemd/issue/55'} | null |
GHSA | GHSA-p43x-xfjf-5jhr | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). | {'CVE-2020-9548'} | 2021-10-21T21:11:57Z | 2020-05-15T18:59:01Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9548', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-p43x-xfjf-5jhr'} | null |
GHSA | GHSA-rw53-q8x7-ccx8 | Malicious Package in buffer-xkr | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:04:01Z | 2020-09-03T21:55:17Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-rw53-q8x7-ccx8', 'https://www.npmjs.com/advisories/1245'} | null |
GHSA | GHSA-f3fg-5j9p-vchc | File exposure in pleaser | pleaser before 0.4 allows a local unprivileged attacker to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option. | {'CVE-2021-31153'} | 2021-08-25T21:01:41Z | 2021-08-25T21:01:41Z | MODERATE | 0 | {'CWE-200', 'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31153', 'http://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://github.com/advisories/GHSA-f3fg-5j9p-vchc', 'https://crates.io/crates/pleaser'} | null |
GHSA | GHSA-vj54-cjrx-x696 | Observable Discrepancy in Argo | Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts within Argo. | {'CVE-2020-11576'} | 2021-12-09T19:59:24Z | 2021-12-09T19:59:24Z | MODERATE | 5.3 | {'CWE-203'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11576', 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo-cd/pull/3215', 'https://github.com/advisories/GHSA-vj54-cjrx-x696'} | null |
GHSA | GHSA-mh6f-8j2x-4483 | Critical severity vulnerability that affects event-stream and flatmap-stream | The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version.
Users of `flatmap-stream` are encouraged to remove the dependency entirely.
| null | 2021-09-15T20:08:28Z | 2018-11-26T23:58:21Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-mh6f-8j2x-4483', 'https://github.com/dominictarr/event-stream/issues/116'} | null |
GHSA | GHSA-j8r2-2x94-2q67 | Cross-Site Scripting in diagram-js-direct-editing | Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.3 or later. | null | 2021-09-28T16:59:51Z | 2020-09-11T21:19:09Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-j8r2-2x94-2q67', 'https://www.npmjs.com/advisories/983', 'https://github.com/bpmn-io/diagram-js-direct-editing'} | null |
GHSA | GHSA-8m5v-f2wp-wqr9 | Malicious Package in ali-contributors | All versions of `ali-contributors` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T17:50:12Z | 2020-09-03T17:30:36Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1046', 'https://github.com/advisories/GHSA-8m5v-f2wp-wqr9'} | null |
GHSA | GHSA-qcff-ffx3-m25c | Command Injection in meta-git | All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-04T20:47:36Z | 2020-09-04T17:31:44Z | CRITICAL | 0 | {'CWE-77'} | {'https://www.npmjs.com/advisories/1457', 'https://hackerone.com/reports/728040', 'https://github.com/advisories/GHSA-qcff-ffx3-m25c'} | null |
GHSA | GHSA-6gg3-pmm7-97xc | DOM-based XSS in auth0-lock | ### Overview
Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection.
- For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input.
- For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens.
When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using auth0-lock
- You are using Passwordless or Enterprise connection mode
### How to fix that?
Upgrade to version `11.26.3`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
https://github.com/mvisat | {'CVE-2020-15119'} | 2022-04-19T19:02:31Z | 2020-08-19T21:05:03Z | LOW | 6.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-6gg3-pmm7-97xc', 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc'} | null |
GHSA | GHSA-w9hw-v97w-g5f5 | Malicious Package in bitconi-ops | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:43:25Z | 2020-09-04T16:43:14Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-w9hw-v97w-g5f5', 'https://www.npmjs.com/advisories/1368'} | null |
GHSA | GHSA-4g53-vp7q-gfjv | constructEvent does not verify header | ### Impact
Anyone verifying a Stripe webhook request via this library's `constructEvent` function.
### Patches
Upgrade to 1.1.4.
### Workarounds
Use `await verifyHeader(...)` directly instead of `constructEvent`.
### References
https://github.com/worker-tools/stripe-webhook/issues/1
| null | 2022-04-19T19:02:58Z | 2021-05-28T19:18:28Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-4g53-vp7q-gfjv', 'https://github.com/worker-tools/stripe-webhook/security/advisories/GHSA-4g53-vp7q-gfjv'} | null |
GHSA | GHSA-3233-rgx3-c2wh | Moderate severity vulnerability that affects mustache | Withdrawn, accidental duplicate publish.
mustache package before 2.2.1 for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging a template with an attribute that is not quoted. | null | 2021-12-03T14:25:39Z | 2018-10-09T00:38:09Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://github.com/advisories/GHSA-3233-rgx3-c2wh'} | null |
GHSA | GHSA-j377-2x76-558h | Improper Input Validation in is-email | is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU. | {'CVE-2021-36716'} | 2022-05-05T13:52:58Z | 2021-12-10T17:25:21Z | HIGH | 7.5 | {'CWE-20', 'CWE-400'} | {'https://github.com/advisories/GHSA-j377-2x76-558h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716', 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/', 'https://github.com/segmentio/is-email/releases'} | null |
GHSA | GHSA-x7q3-67vc-wvcf | Downloads Resources over HTTP in grunt-images | Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10645'} | 2021-09-16T20:53:25Z | 2018-08-15T19:05:14Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nodesecurity.io/advisories/255', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10645', 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf', 'https://www.npmjs.com/advisories/255'} | null |
GHSA | GHSA-v9p9-535w-4285 | Prototype Pollution in litespeed.js and appwrite/server-ce | This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability. | {'CVE-2021-23682'} | 2022-02-26T00:57:39Z | 2022-02-17T00:00:32Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/appwrite/appwrite/releases/tag/0.11.1', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/pull/2778', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23682', 'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://github.com/advisories/GHSA-v9p9-535w-4285'} | null |
GHSA | GHSA-vwhq-49r4-gj9v | Reference binding to `nullptr` in `tf.ragged.cross` | ### Impact
The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) has an undefined behavior due to binding a reference to `nullptr`. In the following scenario, this results in a crash:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.ragged.cross([tf.ragged.constant([['1']]),'2'])
return y
test()
```
### Patches
We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41214'} | 2021-11-10T18:58:16Z | 2021-11-10T18:58:16Z | HIGH | 7.8 | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/advisories/GHSA-vwhq-49r4-gj9v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41214'} | null |
GHSA | GHSA-vh5c-jqfg-mhrh | Cross-Site Request Forgery in xwiki-platform | ### Impact
It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests.
### Patches
This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided:
- a first one to fix the CSRF problem
- a more complex one that now relies on sending an email for the Forgot username process.
### Workarounds
It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123
In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here.
### References
* https://jira.xwiki.org/browse/XWIKI-18384
* https://jira.xwiki.org/browse/XWIKI-18408
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
| {'CVE-2021-32732'} | 2022-02-11T21:08:09Z | 2022-02-10T22:42:46Z | HIGH | 7.5 | {'CWE-352'} | {'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://jira.xwiki.org/browse/XWIKI-18384', 'https://github.com/advisories/GHSA-vh5c-jqfg-mhrh', 'https://jira.xwiki.org/browse/XWIKI-18408', 'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf'} | null |
GHSA | GHSA-c2h6-7gm8-cv4w | XSS in MITREid Connect | The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript. | {'CVE-2020-5497'} | 2021-08-23T15:04:33Z | 2020-04-01T16:35:44Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-c2h6-7gm8-cv4w', 'http://seclists.org/fulldisclosure/2020/Feb/25', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521', 'http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1527', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526', 'https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5497'} | null |
GHSA | GHSA-9rwj-8mh9-4876 | Malicious Package in carloprojectdiscord | All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | null | 2021-09-30T21:23:53Z | 2020-09-02T21:19:37Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/874', 'https://github.com/advisories/GHSA-9rwj-8mh9-4876'} | null |
GHSA | GHSA-9qrg-h9g8-c65q | Prototype Pollution in deep-setter | All versions of `deep-setter` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-01T20:10:47Z | 2020-09-04T15:14:26Z | HIGH | 0 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-9qrg-h9g8-c65q', 'https://www.npmjs.com/advisories/1333'} | null |
GHSA | GHSA-h2xm-2p6w-mj2v | Out-of-bounds Write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0831'} | 2021-07-28T18:58:14Z | 2021-07-28T18:58:14Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0831', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831', 'https://github.com/advisories/GHSA-h2xm-2p6w-mj2v'} | null |
GHSA | GHSA-99qr-9cc9-fv2x | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file. | {'CVE-2017-3166'} | 2021-09-07T21:13:41Z | 2018-12-21T17:50:03Z | MODERATE | 7.8 | {'CWE-732'} | {'https://github.com/advisories/GHSA-99qr-9cc9-fv2x', 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'} | null |
GHSA | GHSA-grmf-4fq6-2r79 | Improper Restriction of Operations within the Bounds of a Memory Buffer in aubio | aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo. | {'CVE-2018-19800'} | 2022-03-21T19:05:04Z | 2019-07-26T16:10:28Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19800', 'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5', 'https://github.com/advisories/GHSA-grmf-4fq6-2r79'} | null |
GHSA | GHSA-23xp-j737-282v | Path Traversal in takeapeek | All versions of `takeapeek` are vulnerable to path traversal exposing files and directories.
## Recommendation
As no fix is currently available for this vulnerability is it is our recommendation to use another static file server. | {'CVE-2018-16473'} | 2021-01-08T20:10:26Z | 2018-11-06T23:12:30Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/740', 'https://hackerone.com/reports/403736', 'https://github.com/advisories/GHSA-23xp-j737-282v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json'} | null |
GHSA | GHSA-h43v-26r7-7j4c | Allocation of Resources Without Limits or Throttling in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise before 0.10.3 allow unbounded resource usage. | {'CVE-2020-7218'} | 2022-02-24T12:07:03Z | 2021-05-18T18:20:19Z | HIGH | 7.5 | {'CWE-400', 'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7218', 'https://github.com/hashicorp/nomad/pull/7022', 'https://github.com/hashicorp/nomad/issues/7002', 'https://www.hashicorp.com/blog/category/nomad/', 'https://github.com/advisories/GHSA-h43v-26r7-7j4c'} | null |
GHSA | GHSA-rq96-qhc5-vm4r | Exposure of Sensitive Information to an Unauthorized Actor in Apache NiFi | In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information. | {'CVE-2021-44145'} | 2022-01-05T17:33:32Z | 2022-01-05T17:33:32Z | MODERATE | 6.5 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44145', 'http://www.openwall.com/lists/oss-security/2021/12/17/1', 'https://nifi.apache.org/security.html#1.15.1-vulnerabilities', 'https://github.com/advisories/GHSA-rq96-qhc5-vm4r'} | null |
GHSA | GHSA-fxh6-w476-hgr4 | Directory Traversal in SharpCompress | SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction. | {'CVE-2018-1002206'} | 2021-08-17T22:21:47Z | 2019-09-11T22:59:57Z | MODERATE | 5.5 | {'CWE-22'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f', 'https://github.com/advisories/GHSA-fxh6-w476-hgr4'} | null |
GHSA | GHSA-f72h-wf57-7xwh | Malicious Package in buffer-xo2 | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:04:49Z | 2020-09-03T21:58:34Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1248', 'https://github.com/advisories/GHSA-f72h-wf57-7xwh'} | null |
GHSA | GHSA-mvvp-gwgc-5hrp | Path Traversal in elFinder.Net.Core | This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path. | {'CVE-2021-23407'} | 2021-08-31T21:21:26Z | 2021-08-02T17:30:27Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/advisories/GHSA-mvvp-gwgc-5hrp'} | null |
GHSA | GHSA-25gf-8qrr-g78r | Missing SSL Certificate Validation in Hashicorp Consul | HashiCorp Consul before 1.10.1 (and Consul Enterprise) has Missing SSL Certificate Validation. xds does not ensure that the Subject Alternative Name of an upstream is validated. | {'CVE-2021-32574'} | 2021-07-29T14:53:58Z | 2021-07-19T21:21:03Z | HIGH | 7.5 | {'CWE-295'} | {'https://github.com/hashicorp/consul/releases/tag/v1.10.1', 'https://www.hashicorp.com/blog/category/consul', 'https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32574', 'https://github.com/advisories/GHSA-25gf-8qrr-g78r'} | null |
GHSA | GHSA-q3j5-32m5-58c2 | Privilege Elevation in runc | libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. | {'CVE-2016-3697'} | 2021-12-20T18:21:34Z | 2021-12-20T18:21:34Z | HIGH | 7.8 | null | {'https://github.com/opencontainers/runc/releases/tag/v0.1.0', 'https://github.com/opencontainers/runc/pull/708', 'https://rhn.redhat.com/errata/RHSA-2016-1034.html', 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html', 'https://security.gentoo.org/glsa/201612-28', 'https://github.com/advisories/GHSA-q3j5-32m5-58c2', 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091', 'https://rhn.redhat.com/errata/RHSA-2016-2634.html', 'https://github.com/docker/docker/issues/21436', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697'} | null |
GHSA | GHSA-fg5w-w99f-rj6w | Command Injection in @ronomon/opened | The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input. | {'CVE-2021-29300'} | 2021-06-08T23:15:35Z | 2021-06-08T23:15:35Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec', 'https://github.com/advisories/GHSA-fg5w-w99f-rj6w', 'https://advisory.checkmarx.net/advisory/CX-2021-4775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300'} | null |
GHSA | GHSA-5rpc-gwh9-q9fg | Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV | In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier. | {'CVE-2017-12862'} | 2021-12-01T15:06:04Z | 2021-10-12T22:02:21Z | HIGH | 8.8 | {'CWE-119', 'CWE-787'} | {'https://github.com/advisories/GHSA-5rpc-gwh9-q9fg', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9370', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12862', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'} | null |
GHSA | GHSA-qr4m-jcvc-3382 | Prototype Pollution in dot-notes | All versions of package dot-notes up to and including version 3.2.0 are vulnerable to Prototype Pollution via the create function. | {'CVE-2020-7717'} | 2021-07-29T22:01:48Z | 2021-05-06T18:12:00Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-qr4m-jcvc-3382', 'https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7717'} | null |
GHSA | GHSA-chwr-hf3w-c984 | Regular Expression Denial of Service in dat.gui | All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values. | {'CVE-2020-7755'} | 2021-05-10T18:44:38Z | 2021-05-10T18:44:38Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-DATGUI-1016275', 'https://github.com/dataarts/dat.gui/issues/278', 'https://github.com/advisories/GHSA-chwr-hf3w-c984', 'https://github.com/dataarts/dat.gui/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7755', 'https://www.npmjs.com/package/dat.gui'} | null |
GHSA | GHSA-ghq2-m3pq-qf3p | Stored XSS in Jenkins CVS Plugin | Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-29037'} | 2022-05-03T20:52:55Z | 2022-04-13T00:00:18Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-ghq2-m3pq-qf3p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037', 'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'} | null |
GHSA | GHSA-wrvr-8mpx-r7pp | Regular Expression Denial of Service in mime | Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
## Recommendation
Update to version 2.0.3 or later. | {'CVE-2017-16138'} | 2021-01-08T01:23:39Z | 2018-07-20T16:20:52Z | MODERATE | 0 | {'CWE-400'} | {'https://www.npmjs.com/advisories/535', 'https://nodesecurity.io/advisories/535', 'https://github.com/advisories/GHSA-wrvr-8mpx-r7pp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16138', 'https://github.com/broofa/node-mime/issues/167'} | null |
GHSA | GHSA-7p6w-x2gr-rrf8 | Cross-Site Scripting in ag-grid-community | Versions of `ag-grid-community` prior to 14.0.0 are vulnerable to Cross-Site Scripting (XSS). Grid contents are not properly sanitized and may allow attackers to execute arbitrary JavaScript if user input is rendered in the grid.
## Recommendation
Upgrade to version 14.0.0 or later | null | 2021-09-27T21:42:30Z | 2020-09-02T21:28:05Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7p6w-x2gr-rrf8', 'https://github.com/ag-grid/ag-grid/issues/1961', 'https://www.npmjs.com/advisories/894'} | null |
GHSA | GHSA-x2j7-6hxm-87p3 | Remote code injection | An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session). | {'CVE-2021-27903'} | 2021-07-07T17:13:31Z | 2021-07-02T18:36:41Z | CRITICAL | 9.8 | {'CWE-94', 'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27903', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38', 'https://github.com/advisories/GHSA-x2j7-6hxm-87p3', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23'} | null |
GHSA | GHSA-xv7v-rf6g-xwrc | Directory Traversal in typo3/phar-stream-wrapper | The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL. | {'CVE-2019-11831'} | 2021-09-30T17:10:14Z | 2021-09-30T17:10:14Z | CRITICAL | 9.8 | {'CWE-502', 'CWE-22'} | {'https://www.drupal.org/sa-core-2019-007', 'https://typo3.org/security/advisory/typo3-psa-2019-007/', 'http://www.securityfocus.com/bid/108302', 'https://github.com/advisories/GHSA-xv7v-rf6g-xwrc', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1', 'https://seclists.org/bugtraq/2019/May/36', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/', 'https://www.debian.org/security/2019/dsa-4445', 'https://www.synology.com/security/advisory/Synology_SA_19_22', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/'} | null |
GHSA | GHSA-6fc8-4gx4-v693 | ReDoS in Sec-Websocket-Protocol header | ### Impact
A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server.
### Proof of concept
```js
for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) {
const value = 'b' + ' '.repeat(length) + 'x';
const start = process.hrtime.bigint();
value.trim().split(/ *, */);
const end = process.hrtime.bigint();
console.log('length = %d, time = %f ns', length, end - start);
}
```
### Patches
The vulnerability was fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff) and backported to ws@6.2.2 (https://github.com/websockets/ws/commit/78c676d2a1acefbc05292e9f7ea0a9457704bf1b) and ws@5.2.3 (https://github.com/websockets/ws/commit/76d47c1479002022a3e4357b3c9f0e23a68d4cd2).
### Workarounds
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.
### Credits
The vulnerability was responsibly disclosed along with a fix in private by [Robert McLaughlin](https://github.com/robmcl4) from University of California, Santa Barbara.
| {'CVE-2021-32640'} | 2022-04-19T19:02:58Z | 2021-05-28T19:19:03Z | MODERATE | 5.3 | {'CWE-400', 'CWE-345'} | {'https://github.com/websockets/ws/issues/1895', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https://github.com/advisories/GHSA-6fc8-4gx4-v693'} | null |
GHSA | GHSA-h3p9-wrgx-82cm | Use of a Broken or Risky Cryptographic Algorithm in Terraform | When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP. | {'CVE-2019-19316'} | 2021-07-28T16:28:51Z | 2021-05-18T18:18:50Z | HIGH | 3.7 | {'CWE-327', 'CWE-20'} | {'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19316', 'https://github.com/hashicorp/terraform/issues/23493', 'https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626', 'https://github.com/advisories/GHSA-h3p9-wrgx-82cm'} | null |
GHSA | GHSA-3892-2r52-p65m | HTTP Request Smuggling in goliath | goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. | {'CVE-2020-7671'} | 2021-05-24T18:20:07Z | 2021-05-24T18:20:07Z | MODERATE | 7.5 | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7671', 'https://github.com/advisories/GHSA-3892-2r52-p65m', 'https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136', 'https://github.com/postrank-labs/goliath/issues/351,'} | null |
GHSA | GHSA-w2fr-65vp-mxw3 | Deserialization of untrusted data in Symfony | In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge. | {'CVE-2019-10912'} | 2021-08-19T17:12:23Z | 2020-02-12T18:44:50Z | HIGH | 7.1 | {'CWE-502'} | {'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/', 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/', 'https://github.com/advisories/GHSA-w2fr-65vp-mxw3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/', 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912', 'https://seclists.org/bugtraq/2019/May/21', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml', 'https://symfony.com/cve-2019-10912', 'https://www.debian.org/security/2019/dsa-4441'} | null |
GHSA | GHSA-r679-m633-g7wc | Improper input validation in Apache Shiro | Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack. | {'CVE-2019-12422'} | 2020-02-04T22:36:36Z | 2020-02-04T22:36:36Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-r679-m633-g7wc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E'} | null |
GHSA | GHSA-xq98-5rcf-5wqh | Directory Traversal in badjs-sourcemap-server | Affected versions of `badjs-sourcemap-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16036'} | 2021-01-07T23:59:51Z | 2018-07-24T15:43:02Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-xq98-5rcf-5wqh', 'https://nodesecurity.io/advisories/349', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16036', 'https://www.npmjs.com/advisories/349'} | null |
GHSA | GHSA-8xv9-qcr9-ww9j | Authenticated XML External Entity Processing | ### Impact
Authenticated XML External Entity Processing
### Patches
We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020 | null | 2022-04-19T19:02:38Z | 2020-10-19T21:32:18Z | MODERATE | 5.6 | {'CWE-611'} | {'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j', 'https://github.com/advisories/GHSA-8xv9-qcr9-ww9j', 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'} | null |
GHSA | GHSA-j85q-whc9-g4p9 | Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | {'CVE-2021-3678'} | 2021-09-02T17:07:48Z | 2021-09-02T17:07:48Z | MODERATE | 5.9 | {'CWE-338'} | {'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4', 'https://github.com/advisories/GHSA-j85q-whc9-g4p9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'} | null |
GHSA | GHSA-vq9j-jh62-5hmp | Apache Camel using an outdated vulnerable JSON-lib library | Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. | {'CVE-2017-5643'} | 2022-04-26T21:36:33Z | 2018-10-16T23:13:11Z | HIGH | 7.4 | {'CWE-918'} | {'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/advisories/GHSA-vq9j-jh62-5hmp', 'http://www.securityfocus.com/bid/97226', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5643', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-jxx8-v83v-rhw3 | Moderate severity vulnerability that affects spree | Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function. | {'CVE-2013-1656'} | 2021-09-14T22:04:07Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-20'} | {'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'https://github.com/advisories/GHSA-jxx8-v83v-rhw3', 'https://www.conviso.com.br/advisories/CVE-2013-1656.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656', 'http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html'} | null |
GHSA | GHSA-5jgq-x857-p8xw | Account compromise in Evmos | ## Impact
_What kind of vulnerability is it? Who is impacted?_
### Classification
The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.
### Disclosure
The attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK `AnteHandler`, and the Evmos `x/claims` module. The step-by-step attack is described below:
1. An actor creates a malicious chain with a custom `AnteHandler` that skips signature verification for transactions, specifically IBC `MsgTransfer`. This allows the attacker to impersonate any account by setting a custom `sender` address field of the IBC transfer message.
2. The malicious actor then connects this newly created chain via IBC to Evmos and fills the `recipient` address from the transfer message with an address they control.
3. Once the IBC packet containing the Transfer data is relayed to Evmos, it is processed by the claims module IBC middleware. Which migrates the claim records to the recipient address, which is owned by the attacker.
4. The attacker then performs two airdrop Actions, claiming up to 75% of the total initial claimable amount.
5. The Actor repeats steps 1., 2., and 3. for every address that has unclaimed funds from the airdrop. This automatically claims 75% of the unclaimable amount.
6. The malicious actor performs the final Action, claiming 100% of all the user funds.
7. Then, the attacker transfers the funds to another chain with a DEX (Osmosis, Cosmos Hub) via IBC.
8. Finally, the attacker withdraws the total amount in fiat through a centralized exchange.
### Users impacted
No users have suffered the loss of funds as no malicious chains have been connected to Evmos.
## Patches
_Has the problem been patched? What versions should users upgrade to?_
The patch involves defining a list of authorized channels for chains that are connected to Evmos via IBC. This restricts the chains that have the capability of migrating users' claims records as per the specification. By default, the authorized destination channels are `"channel-0"` (Osmosis) and `"channel-3"` (Cosmos Hub).
Please upgrade your mainnet node and validator to [`v2.0.1`](https://github.com/tharsis/evmos/releases/tag/v2.0.1) **ASAP**.
## Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No, the fix for the critical vulnerability is state machine breaking. An upgrade procedure must be coordinated with the nodes running the network.
## References
_Are there any links users can visit to find out more?_
* Claims module spec: [evmos.dev/modules/claims](https://evmos.dev/modules/claims)
* Cosmos SDK documentation: [docs.cosmos.network](https://docs.cosmos.network/)
* IBC documentation: [ibc.cosmos.network](https://ibc.cosmos.network/)
## For more information
If you have any questions or comments about this advisory:
* Reach out to the Core Team in [Discord](https://discord.gg/evmos)
* Open an issue in [tharsis/evmos](http://github.com/tharsis/evmos/issues)
* Email us at [security@thars.is](security@thars.is)
Thanks to the Core IBC team at Interchain GmbH for the secure disclosure of this vulnerability | {'CVE-2022-24738'} | 2022-03-18T20:07:35Z | 2022-03-07T21:45:59Z | HIGH | 7.4 | {'CWE-287'} | {'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738', 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71', 'https://github.com/advisories/GHSA-5jgq-x857-p8xw', 'https://github.com/tharsis/evmos/releases/tag/v2.0.1'} | null |
GHSA | GHSA-9x64-5r7x-2q53 | Malicious Package in flatmap-stream | Version 0.1.1 of `flatmap-stream` is considered malicious.
This module runs an encrypted payload targeting a very specific application, `copay` and because they shared the same description it would have likely worked for `copay-dash`.
The injected code:
- Read in AES encrypted data from a file disguised as a test fixture
- Grabbed the npm package description of the module that imported it, using an automatically set environment variable
- Used the package description as a key to decrypt a chunk of data pulled in from the disguised file
The decrypted data was part of a module, which was then compiled in memory and executed.
This module performed the following actions:
- Decrypted another chunk of data from the disguised file
- Concatenated a small, commented prefix from the first decrypted chunk to the end of the second decrypted chunk
- Performed minor decoding tasks to transform the concatenated block of code from invalid JS to valid JS (we believe this was done to evade detection by dynamic analysis tools)
- Wrote this processed block of JS out to a file stored in a dependency that would be packaged by the build scripts:
The chunk of code that was written out was the actual malicious code, intended to be run on devices owned by the end users of Copay.
This code would do the following:
- Detect the current environment: Mobile/Cordova/Electron
- Check the Bitcoin and Bitcoin Cash balances on the victim's copay account
- If the current balance was greater than 100 Bitcoin, or 1000 Bitcoin Cash:
- Harvest the victim's account data in full
- Harvest the victim's copay private keys
- Send the victim's account data/private keys off to a collection
## Recommendation
If you find this module in your environment it's best to remove it. The malicious version of event-stream and flatmap-stream have been removed from the npm Registry. | null | 2021-10-01T13:30:05Z | 2020-09-01T21:21:32Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/737', 'https://github.com/advisories/GHSA-9x64-5r7x-2q53', 'https://github.com/dominictarr/event-stream/issues/116'} | null |
GHSA | GHSA-hmq6-frv3-4727 | High severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml | XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors. | {'CVE-2016-3720'} | 2021-09-14T17:25:58Z | 2018-10-18T17:43:16Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-3720', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184561.html', 'https://github.com/advisories/GHSA-hmq6-frv3-4727'} | null |
GHSA | GHSA-rhvc-x32h-5526 | No CSRF Validation in droppy | Affected versions of `droppy` are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others.
## Recommendation
Update to version 3.5.0 or later. | {'CVE-2016-10529'} | 2021-01-07T22:33:34Z | 2019-02-18T23:39:32Z | HIGH | 0 | {'CWE-352'} | {'https://www.npmjs.com/advisories/91', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10529', 'https://nodesecurity.io/advisories/91', 'https://github.com/advisories/GHSA-rhvc-x32h-5526'} | null |
GHSA | GHSA-m428-jqc4-2p5j | Prototype Pollution in phpjs | All versions of phpjs up to and including 1.3.2 are vulnerable to Prototype Pollution via parse_str. phpjs is no longer maintained and users are advised to use Locutus as a replacement (https://github.com/locutusjs/locutus) | {'CVE-2020-7700'} | 2021-05-06T17:28:46Z | 2021-05-06T17:28:46Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-m428-jqc4-2p5j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7700', 'https://snyk.io/vuln/SNYK-JS-PHPJS-598681'} | null |
GHSA | GHSA-46fh-8fc5-xcwx | Prototype Pollution in lodash.defaultsdeep | Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to Prototype Pollution. The function 'defaultsDeep' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later. | null | 2021-09-29T14:56:01Z | 2020-09-03T18:09:16Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1070', 'https://github.com/advisories/GHSA-46fh-8fc5-xcwx'} | null |
GHSA | GHSA-6wj2-g87r-pm62 | Cross-site Scripting in comrak | An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities. | {'CVE-2021-38186'} | 2021-08-25T20:55:43Z | 2021-08-25T20:55:43Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-38186', 'https://github.com/advisories/GHSA-6wj2-g87r-pm62', 'https://github.com/kivikakk/comrak/releases/tag/0.10.1', 'https://rustsec.org/advisories/RUSTSEC-2021-0063.html'} | null |
GHSA | GHSA-cwp3-834g-x79g | Moderate severity vulnerability that affects archive-tar-minitar and minitar | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry. | null | 2021-12-03T14:10:53Z | 2018-08-21T17:07:36Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-cwp3-834g-x79g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'} | null |
GHSA | GHSA-v62j-fcxq-j239 | Stored XSS in Apache Atlas | Apache Atlas versions 0.8.3 and 1.1.0 were found vulnerable to Stored Cross-Site Scripting in the search functionality | {'CVE-2019-10070'} | 2021-08-19T16:23:49Z | 2020-01-08T17:26:53Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.apache.org/thread.html/cc21437c4c5053a13e13332d614d5172f39da03491fe17ae260be221@%3Cdev.atlas.apache.org%3E', 'https://github.com/advisories/GHSA-v62j-fcxq-j239', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10070'} | null |
GHSA | GHSA-3m6r-39p3-jq25 | Doorkeeper is vulnerable to replay attacks | The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification. | {'CVE-2016-6582'} | 2022-04-25T16:34:59Z | 2017-10-24T18:33:35Z | CRITICAL | 9.1 | {'CWE-1254'} | {'http://www.securityfocus.com/bid/92551', 'http://seclists.org/fulldisclosure/2016/Aug/105', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/doorkeeper-gem/doorkeeper/issues/875', 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html', 'http://www.securityfocus.com/archive/1/539268/100/0/threaded', 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'} | null |
GHSA | GHSA-m5ff-3wj3-8ph4 | HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress | ### Impact
If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling.
```
Content-Length: 10
Transfer-Encoding: [\x0b]chunked
```
For clarity:
```
0x0b == vertical tab
```
Would get parsed by Waitress as being a `chunked` request, but a front-end server would use the `Content-Length` instead as the `Transfer-Encoding` header is considered invalid due to containing invalid characters.
If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure.
### Patches
Please upgrade to Waitress 1.4.1 which fixes this issue with stricter HTTP field validation.
Waitress 1.4.1 due to this change has become much more strict in what is allowed in header values, while the maintainers don't believe that these changes will cause any issues, it may cause failures with non-conformist reverse proxies or clients, and it is highly recommend that users validate the changes in their environment and make sure it won't cause any unacceptable failures.
### Workarounds
You may enable additional protections on front-end servers, those that follow RFC7230 correctly would drop the request with a 400 Bad Request.
Waitress will now correctly responds to the request with a 400 Bad Request, and will drop the connection to avoid any potential HTTP pipelining issues.
### References
This was mentioned in https://portswigger.net/research/http-desync-attacks-what-happened-next and was specifically mentioned as being an issue in HAProxy which did not properly filter it in this article: https://nathandavison.com/blog/haproxy-http-request-smuggling
### Thanks
The Pylons Project would like to thank ZeddYu Lu for doing extended testing against Waitress 1.4.0 and bringing this to our attention!
### For more information
If you have any questions or comments about this advisory:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | null | 2022-04-25T23:09:44Z | 2019-12-26T16:34:38Z | HIGH | 0 | {'CWE-444'} | {'https://github.com/advisories/GHSA-m5ff-3wj3-8ph4', 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'} | null |
GHSA | GHSA-q643-w9jp-q2qg | Hardcoded Initialization Vector in parsel | All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package. | null | 2020-09-04T17:34:59Z | 2020-09-04T17:34:59Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-q643-w9jp-q2qg', 'https://www.npmjs.com/advisories/1460'} | null |
GHSA | GHSA-6qfg-8799-r575 | Symlink Attack | The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree. | {'CVE-2019-11251'} | 2021-05-18T15:30:07Z | 2021-05-18T15:30:07Z | MODERATE | 5.7 | {'CWE-61', 'CWE-59'} | {'https://github.com/kubernetes/kubernetes/issues/87773', 'https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ', 'https://github.com/kubernetes/kubernetes/pull/82143', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11251', 'https://github.com/advisories/GHSA-6qfg-8799-r575'} | null |
GHSA | GHSA-c2vr-2c89-ph88 | Downloads Resources over HTTP in node-bsdiff-android | Affected versions of `node-bsdiff-android` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10641'} | 2021-09-16T20:54:15Z | 2018-09-18T13:49:54Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10641', 'https://nodesecurity.io/advisories/234', 'https://www.npmjs.com/advisories/234', 'https://github.com/advisories/GHSA-c2vr-2c89-ph88'} | null |
GHSA | GHSA-m2q4-qghh-p9cq | Server-Side Request Forgery in yoast_seo | The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account. | {'CVE-2021-31779'} | 2021-05-21T19:21:38Z | 2021-05-21T19:21:38Z | MODERATE | 6.4 | {'CWE-918'} | {'https://github.com/advisories/GHSA-m2q4-qghh-p9cq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-006'} | null |
GHSA | GHSA-qfcv-5whw-7pcw | Exposure of Sensitive Information to an Unauthorized Actor in AEgir | ### Impact
`aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm.
### Patches
The code has been patched, users should upgrade to >= 21.10.1
### Workarounds
Run `printenv` to check your environment variables and revoke any secrets.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [aegir](https://github.com/ipfs/aegir) | {'CVE-2020-11059'} | 2021-10-08T19:56:46Z | 2020-05-27T21:09:15Z | CRITICAL | 9.6 | {'CWE-200'} | {'https://github.com/advisories/GHSA-qfcv-5whw-7pcw', 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059'} | null |
GHSA | GHSA-72fv-qgj6-2w2p | Cross-site Scripting in NodeBB | Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS. | {'CVE-2015-9286'} | 2021-08-03T21:27:01Z | 2019-05-01T18:37:08Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-72fv-qgj6-2w2p', 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529', 'https://github.com/NodeBB/NodeBB/pull/3371', 'https://www.vulnerability-lab.com/get_content.php?id=1608', 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'} | null |
GHSA | GHSA-f554-x222-wgf7 | Command Injection in Xstream | Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. | {'CVE-2013-7285'} | 2022-04-26T20:45:48Z | 2019-05-29T18:05:03Z | CRITICAL | 9.8 | {'CWE-77', 'CWE-78'} | {'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html', 'http://seclists.org/oss-sec/2014/q1/69', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285', 'http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html', 'http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html', 'https://x-stream.github.io/CVE-2013-7285.html', 'https://github.com/advisories/GHSA-f554-x222-wgf7', 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'} | null |
GHSA | GHSA-rgcm-rpq9-9cgr | Missing Authentication for Critical Function in Saleor | An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer). | {'CVE-2020-7964'} | 2021-07-28T17:57:09Z | 2021-07-28T17:57:09Z | MODERATE | 5.3 | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7964', 'https://github.com/mirumee/saleor/releases/tag/2.9.1', 'https://github.com/advisories/GHSA-rgcm-rpq9-9cgr', 'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'} | null |
GHSA | GHSA-r74q-gxcg-73hx | High severity vulnerability that affects simple_form | ## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call
### Impact
For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example:
```erb
<%= simple_form_for @user do |f| %>
<%= f.label @user_supplied_string %>
...
<% end %>
```
The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`).
By manipulation that input, an attacker could do any of the following:
- Code execution (call actions like `#destroy`)
- Denial of Service (by executing a computation intensive method)
- Information Disclosure (check the presence of methods, leak user information)
### Patches
The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem.
### Workarounds
The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected.
A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following:
```erb
<%= form.input :avatar, as: :file %>
```
### References
[TDB]
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form)
* Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br) | {'CVE-2019-16676'} | 2021-09-17T14:36:30Z | 2019-09-30T19:41:15Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://github.com/plataformatec/simple_form/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/', 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx'} | null |
GHSA | GHSA-6jf5-rmhv-38cw | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0639'} | 2021-09-02T16:39:08Z | 2019-04-09T19:44:03Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/advisories/GHSA-6jf5-rmhv-38cw', 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639'} | null |
GHSA | GHSA-mfwh-gqx8-c787 | Allocation of Resources Without Limits or Throttling in Apache Tika | A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later. | {'CVE-2019-10088'} | 2021-05-05T22:58:09Z | 2019-08-06T01:43:40Z | HIGH | 8.8 | {'CWE-770'} | {'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-mfwh-gqx8-c787', 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190828-0004/'} | null |
GHSA | GHSA-9cph-cqqh-36pw | Malicious Package in babel-loqder | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:18:00Z | 2020-09-04T15:29:25Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1350', 'https://github.com/advisories/GHSA-9cph-cqqh-36pw'} | null |
GHSA | GHSA-53hp-jpwq-2jgq | Uncontrolled Resource Consumption in Apache Tomcat | A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. | {'CVE-2020-11996'} | 2022-02-09T23:03:59Z | 2022-02-09T23:01:22Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd@%3Cnotifications.ofbiz.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://usn.ubuntu.com/4596-1/', 'https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-53hp-jpwq-2jgq', 'https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11996', 'https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b@%3Ccommits.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200709-0002/', 'https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html', 'https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561@%3Ccommits.ofbiz.apache.org%3E'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.