ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-rch7-f4h5-x9rj
Identity Spoofing in libp2p-secio
Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability. ## Recommendation Update to version 0.9.0 or later.
null
2021-08-17T21:32:42Z
2019-08-23T00:04:52Z
CRITICAL
9.1
{'CWE-290'}
{'https://github.com/advisories/GHSA-rch7-f4h5-x9rj', 'https://github.com/libp2p/js-libp2p-secio/pull/95', 'https://www.npmjs.com/advisories/558', 'https://nodesecurity.io/advisories/558', 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}
null
GHSA
GHSA-mm62-wxc8-cf7m
Code Execution Through IIFE in serialize-to-js
Affected versions of `serialize-to-js` may be vulnerable to arbitrary code execution through an Immediately Invoked Function Expression (IIFE). ## Proof of Concept ``` var payload = "{e: (function(){ eval('console.log(`exploited`)') })() }" var serialize = require('serialize-to-js'); serialize.deserialize(payload); ``` ## Recommendation Update to version 1.0.0, or later, and review [this disclaimer](https://www.npmjs.com/package/serialize-to-js#deserialize) from the author.
{'CVE-2017-5954'}
2021-09-15T20:28:23Z
2018-07-18T18:27:41Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-5954', 'https://www.npmjs.com/package/serialize-to-js#deserialize', 'https://github.com/commenthol/serialize-to-js/issues/1', 'https://github.com/advisories/GHSA-mm62-wxc8-cf7m', 'https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/', 'http://www.securityfocus.com/bid/96223', 'https://www.npmjs.com/advisories/313'}
null
GHSA
GHSA-9r27-994c-4xch
discord-html not escaping HTML code blocks when lacking a language identifier
### Impact Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed. ### Patches This has been patched in version 2.3.1 ### Workarounds Escape the characters `<>&` before sending plain code blocks to discord-markdown. ### References https://github.com/brussell98/discord-markdown/issues/13
null
2020-02-24T17:34:02Z
2020-02-24T17:34:02Z
HIGH
0
null
{'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch', 'https://github.com/advisories/GHSA-9r27-994c-4xch', 'https://github.com/brussell98/discord-markdown/issues/13', 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}
null
GHSA
GHSA-h7pc-85cg-wmch
Downloads Resources over HTTP in kindlegen
Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`. ## Recommendation Update to version 1.1.0 or greater.
{'CVE-2016-10575'}
2021-01-08T18:42:36Z
2019-02-18T23:35:10Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/251', 'https://github.com/advisories/GHSA-h7pc-85cg-wmch', 'https://www.npmjs.com/advisories/251', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10575'}
null
GHSA
GHSA-2cpx-427x-q2c6
CHECK-fail in AddManySparseToTensorsMap
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`: ```python import tensorflow as tf import numpy as np sparse_indices = tf.constant(530, shape=[1, 1], dtype=tf.int64) sparse_values = tf.ones([1], dtype=tf.int64) shape = tf.Variable(tf.ones([55], dtype=tf.int64)) shape[:8].assign(np.array([855, 901, 429, 892, 892, 852, 93, 96], dtype=np.int64)) tf.raw_ops.AddManySparseToTensorsMap(sparse_indices=sparse_indices, sparse_values=sparse_values, sparse_shape=shape) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape: ```cc TensorShape tensor_input_shape(input_shape->vec<int64>()); ``` The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. ```cc template <class Shape> TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) { set_tag(REP16); set_data_type(DT_INVALID); TF_CHECK_OK(InitDims(dim_sizes)); } ``` In our scenario, this occurs when adding a dimension from the argument results in overflow: ```cc template <class Shape> Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) { ... Status status = Status::OK(); for (int64 s : dim_sizes) { status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); if (!status.ok()) { return status; } } } template <class Shape> Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) { ... int64 new_num_elements; if (kIsPartial && (num_elements() < 0 || size < 0)) { new_num_elements = -1; } else { new_num_elements = MultiplyWithoutOverflow(num_elements(), size); if (TF_PREDICT_FALSE(new_num_elements < 0)) { return errors::Internal("Encountered overflow when multiplying ", num_elements(), " with ", size, ", result: ", new_num_elements); } } ... } ``` This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. ### Patches We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29523'}
2021-05-21T14:21:43Z
2021-05-21T14:21:43Z
LOW
2.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/advisories/GHSA-2cpx-427x-q2c6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29523', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'}
null
GHSA
GHSA-w222-53c6-c86p
Remote Code Execution in electron
Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met: 1. The electron application is running on Windows. 2. The electron application registers as the default handler for a protocol, such as `nodeapp://`. This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron. MacOS and Linux are not vulnerable. ## Recommendation Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance: If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted. ``` app.setAsDefaultProtocolClient(protocol, process.execPath, [ '--your-switches-here', '--' ]) ```
{'CVE-2018-1000006'}
2021-06-10T19:55:45Z
2018-01-23T03:57:44Z
HIGH
8.8
{'CWE-78'}
{'https://www.exploit-db.com/exploits/44357/', 'http://www.securityfocus.com/bid/102796', 'https://www.npmjs.com/advisories/563', 'https://electronjs.org/blog/protocol-handler-fix', 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4', 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374', 'https://github.com/advisories/GHSA-w222-53c6-c86p', 'https://www.exploit-db.com/exploits/43899/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006'}
null
GHSA
GHSA-cv9j-78f7-w6v9
Incorrect Authorization in TYPO3 extension
The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields).
{'CVE-2020-25025'}
2021-07-28T19:21:32Z
2021-07-26T21:41:22Z
MODERATE
4.3
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25025', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016', 'https://github.com/advisories/GHSA-cv9j-78f7-w6v9'}
null
GHSA
GHSA-9f5r-vqm5-m342
Use of Uninitialized Resource in ms3d
An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read.
{'CVE-2021-26952'}
2021-08-25T20:53:16Z
2021-08-25T20:53:16Z
HIGH
7.5
{'CWE-908'}
{'https://github.com/andrewhickman/ms3d/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0016.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26952', 'https://github.com/advisories/GHSA-9f5r-vqm5-m342'}
null
GHSA
GHSA-jp27-cwp2-5qqr
Hijacked Environment Variables in jquery.js
The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16045'}
2021-01-08T18:32:55Z
2018-07-23T20:54:24Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16045', 'https://www.npmjs.com/advisories/496', 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr', 'https://nodesecurity.io/advisories/496'}
null
GHSA
GHSA-hqqv-9x3v-mp7w
Privilege Escalation Flaw in Elasticsearch
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
{'CVE-2020-7014'}
2021-03-18T19:27:20Z
2021-03-18T19:27:20Z
MODERATE
8.8
{'CWE-269', 'CWE-266'}
{'https://github.com/advisories/GHSA-hqqv-9x3v-mp7w', 'https://security.netapp.com/advisory/ntap-20200619-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7014', 'https://www.elastic.co/community/security/'}
null
GHSA
GHSA-582f-p4pg-xc74
Regular Expression Denial of Service in csv-parse
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option. ## Recommendation Upgrade to version 4.4.6 or later.
{'CVE-2019-17592'}
2022-01-04T19:51:33Z
2019-10-15T20:06:16Z
HIGH
7.5
{'CWE-20', 'CWE-400'}
{'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a', 'https://github.com/advisories/GHSA-582f-p4pg-xc74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://security.netapp.com/advisory/ntap-20191127-0002/', 'https://www.npmjs.com/advisories/1171'}
null
GHSA
GHSA-xh8g-j88w-6v59
Malicious Package in cionstring
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:23Z
2020-09-03T19:42:16Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-xh8g-j88w-6v59', 'https://www.npmjs.com/advisories/1381'}
null
GHSA
GHSA-x24j-87x9-jvv5
Improper Authorization in Publify
In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only.
{'CVE-2021-25973'}
2022-04-19T19:03:25Z
2021-11-03T17:34:22Z
MODERATE
6.5
{'CWE-863', 'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e', 'https://github.com/advisories/GHSA-x24j-87x9-jvv5'}
null
GHSA
GHSA-xmw9-q7x9-j5qc
Unbounded connection acceptance leads to file handle exhaustion
### Impact All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. ### Patches The issue is fixed in version 0.14.15 for `NIO1SocketServerGroup`. A `maxConnections` parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The `NIO2SocketServerGroup` has no such setting and is now deprecated. ### Workarounds * An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. * A similar sidecar strategy is viable for other non-HTTP services running on blaze-core. * http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. * http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. * http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s/blaze](http://github.com/http4s/blaze) * Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-21293'}
2021-02-09T18:51:29Z
2021-02-02T21:42:49Z
HIGH
0
{'CWE-400'}
{'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1', 'https://github.com/advisories/GHSA-xmw9-q7x9-j5qc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}
null
GHSA
GHSA-22gh-3r9q-xf38
Lacking Protection against HTTP Request Smuggling in mitmproxy
### Impact In mitmproxy 7.0.2 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless you use mitmproxy to protect an HTTP/1 service, no action is required. ### Patches The vulnerability has been fixed in mitmproxy 7.0.3 and above. ### Acknowledgements We thank João Sobral (@chinchila) for responsibly disclosing this vulnerability to the mitmproxy team. ### Timeline - **2021-09-08**: Received initial report for mitmproxy <= 6.0.2. - **2021-09-08**: Requested clarification if 7.x is affected. - **2021-09-10**: Received additional details, 7.x situation still unclear. - **2021-09-13**: Internally determined that 7.x is also affected. - **2021-09-13**: Shared initial fix with researcher. - **2021-09-14**: Received confirmation that fix is working, but H2.TE/H2.CL should also be looked at. - **2021-09-14**: Shared revised fix that includes additional H2.TE mitigations. - **2021-09-14**: Received confirmation that revised fix is working. - **2021-09-16**: Completed internal patch review. - **2021-09-16**: Published patch release and advisory.
{'CVE-2021-39214'}
2022-04-19T19:03:08Z
2021-09-20T19:53:30Z
HIGH
8.1
{'CWE-444'}
{'https://github.com/advisories/GHSA-22gh-3r9q-xf38', 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39214'}
null
GHSA
GHSA-jp6h-mxhx-pgqh
Shopware guest session is shared between customers
### Impact Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds ### Security Plugin For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. ### Disable HTTP Cache Disabling HTTP Cache is also a valid workaround
{'CVE-2022-24745'}
2022-03-24T00:22:08Z
2022-03-10T17:28:55Z
MODERATE
4.8
{'CWE-384'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.1646933116-1088482757.1646933116', 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh', 'https://github.com/advisories/GHSA-jp6h-mxhx-pgqh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24745'}
null
GHSA
GHSA-vwpg-f6gw-rjvf
Incorrect Authorization in Spring Cloud Netflix Zuul
Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing.
{'CVE-2021-22113'}
2021-05-10T15:18:50Z
2021-05-10T15:18:50Z
MODERATE
0
{'CWE-863'}
{'https://github.com/advisories/GHSA-vwpg-f6gw-rjvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113', 'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'}
null
GHSA
GHSA-xgxc-v2qg-chmh
Directory Traversal in Django
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
{'CVE-2021-28658'}
2021-05-29T00:14:17Z
2021-04-08T18:11:48Z
MODERATE
5.3
{'CWE-22'}
{'https://security.netapp.com/advisory/ntap-20210528-0001/', 'https://pypi.org/project/Django/', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'https://www.djangoproject.com/weblog/2021/apr/06/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html', 'https://github.com/advisories/GHSA-xgxc-v2qg-chmh'}
null
GHSA
GHSA-34r7-q49f-h37c
Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification. ## Recommendation Upgrade UglifyJS to version >= 2.4.24.
{'CVE-2015-8857'}
2021-10-29T14:15:03Z
2017-10-24T18:33:36Z
CRITICAL
9.8
{'CWE-1254'}
{'https://github.com/mishoo/UglifyJS2/issues/751', 'https://nodesecurity.io/advisories/39', 'https://www.npmjs.com/advisories/39', 'http://www.securityfocus.com/bid/96410', 'https://github.com/advisories/GHSA-34r7-q49f-h37c', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857', 'https://zyan.scripts.mit.edu/blog/backdooring-js/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
GHSA
GHSA-3cpj-mj3q-82wr
Malicious Package in bs58chek
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:46Z
2020-09-04T16:49:43Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1376', 'https://github.com/advisories/GHSA-3cpj-mj3q-82wr'}
null
GHSA
GHSA-5635-9mvj-r6hp
Malicious Package in vue-backbone
Version 0.1.2 of `vue-backbone` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:08:22Z
2020-09-03T02:34:39Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/945', 'https://github.com/advisories/GHSA-5635-9mvj-r6hp'}
null
GHSA
GHSA-69j6-29vr-p3j9
Authentication bypass for viewing and deletions of snapshots
Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. 8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly. ## CVE-2021-39226 Snapshot authentication bypass ### Summary CVSS Score: 9.8 Critical CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability. ### Impact Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: * `/dashboard/snapshot/:key`, or * `/api/snapshots/:key` If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: * `/api/snapshots-delete/:deleteKey` Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: * `/api/snapshots/:key`, or * `/api/snapshots-delete/:deleteKey` The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. ### Attack audit While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment. #### Through reverse proxy/load balancer logs To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK). For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`. #### Through the Grafana Enterprise audit feature If you enabled “Log web requests” in your configuration with `router_logging = true`, look for `"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`. ### Patched versions Release 8.1.6: - [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/) Release 7.5.11: - [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/) ### Solutions and mitigations Download and install the appropriate patch for your version of Grafana. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ### Workaround If for some reason you cannot upgrade: You can use a reverse proxy or similar to block access to the literal paths * `/api/snapshots/:key` * `/api/snapshots-delete/:deleteKey` * `/dashboard/snapshot/:key` * `/api/snapshots/:key` They have no normal function and can be disabled without side effects. ### Timeline and postmortem Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. * 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication * 2021-09-15 15:56: Initial reproduction * 2021-09-15 17:10: MEDIUM severity declared * 2021-09-15 18:58: Workaround deployed on Grafana Cloud * 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well * 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud * 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more. * 2021-09-16 09:35: HIGH severity declared * 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS * 2021-09-16 11:19: CRITICAL declared * 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited * 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation * 2021-09-23: Grafana Cloud instances updated * 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo * 2021-10-05 17:00: Public release ## Reporting security issues If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index. ## Security announcements We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements), where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss). ## Acknowledgement We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us.
{'CVE-2021-39226'}
2022-04-19T19:03:09Z
2021-10-05T20:24:02Z
HIGH
7.3
{'CWE-287'}
{'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/', 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9', 'http://www.openwall.com/lists/oss-security/2021/10/05/4', 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269', 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/', 'https://security.netapp.com/advisory/ntap-20211029-0008/', 'https://github.com/advisories/GHSA-69j6-29vr-p3j9'}
null
GHSA
GHSA-h77f-xxx7-4858
User impersonation due to incorrect handling of the login JWT
### Impact <!--_What kind of vulnerability is it? Who is impacted?_--> This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still required to log in separately. If your credentials are saved, there is no risk of exposing your email or password. ### Patches <!--_Has the problem been patched? What versions should users upgrade to?_--> This was patched as part of https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 and https://github.com/GeyserMC/Geyser/commit/ab2f5b326fe590e09167e8b45b4b165ac06ecd13. if your Geyser version is `1.4.2-SNAPSHOT` or later, the issue has been addressed on your build. ### Workarounds <!--_Is there a way for users to fix or remediate the vulnerability without upgrading?_--> Geyser strongly recommends updating to fix this issue. If this isn't possible: - Use online mode and don't save credentials in your Geyser configuration - Use an additional authentication method on the Java server ### References <!--_Are there any links users can visit to find out more?_--> This was disclosed to us by a staff member over at Hive; you can read their disclosure here: https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY ### For more information If you have any questions or comments about this advisory: * Come talk to us over on our [Discord](https://discord.gg/geysermc) server in the [#development](https://discord.com/channels/613163671870242838/613170125696270357) channel
{'CVE-2021-39177'}
2022-04-19T19:03:07Z
2021-09-07T23:04:04Z
HIGH
7.4
{'CWE-287'}
{'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858', 'https://github.com/advisories/GHSA-h77f-xxx7-4858', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY'}
null
GHSA
GHSA-793h-6f7r-6qvm
Authenticated users can read data from other sources than intended
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.
{'CVE-2021-26920'}
2021-09-27T18:52:58Z
2021-08-13T15:21:50Z
MODERATE
6.5
{'CWE-863'}
{'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/02/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26920', 'https://github.com/advisories/GHSA-793h-6f7r-6qvm', 'https://lists.apache.org/thread.html/r29e45561343cc5cf7d3290ee0b0e94e565faab19c20d022df9b5e29c%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d@%3Cdev.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/24/1', 'https://lists.apache.org/thread.html/r61aab724cf97d80da7f02d50e9af6de5c7c40dd92dab7518746fbaa2@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-3wj8-vp9h-rm6m
Remote Code Execution (RCE)
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
{'CVE-2021-23344'}
2021-03-19T21:32:20Z
2021-03-19T21:32:20Z
CRITICAL
9.8
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04', 'https://github.com/advisories/GHSA-3wj8-vp9h-rm6m'}
null
GHSA
GHSA-3fw4-4h3m-892h
OS Command Injection in serial-number
serial-number through 1.3.0 allows execution of arbritary commands. The &quot;cmdPrefix&quot; argument in serialNumber function is used by the &quot;exec&quot; function without any validation.
{'CVE-2019-10804'}
2021-04-13T15:22:19Z
2021-04-13T15:22:19Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-3fw4-4h3m-892h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10804', 'https://github.com/es128/serial-number/blob/master/index.js#L106', 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010'}
null
GHSA
GHSA-x4qx-4fjv-hmw6
Integer overflow leading to crash in Tensorflow
### Impact The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseCountSparseOutput( indices=[[1,1]], values=[2], dense_shape=[2 ** 31, 2 ** 32], weights=[1], binary_output=True, minlength=-1, maxlength=-1, name=None) ``` ### Patches We have patched the issue in GitHub commit [6f4d3e8139ec724dbbcb40505891c81dd1052c4a](https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21738'}
2022-02-11T16:22:50Z
2022-02-09T23:45:09Z
MODERATE
6.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21738', 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a', 'https://github.com/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273'}
null
GHSA
GHSA-99cv-8cvv-666c
High severity vulnerability that affects apache-airflow
In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
{'CVE-2018-20244'}
2021-09-07T21:12:56Z
2019-03-06T17:35:58Z
MODERATE
5.5
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20244', 'https://lists.apache.org/thread.html/f656fddf9c49293b3ec450437c46709eb01a12d1645136b2f1b8573b@%3Cdev.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-99cv-8cvv-666c', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-xhv5-w9c5-2r2w
Unbounded connection acceptance in http4s-blaze-server
### Impact blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. http4s provides a general `MaxActiveRequests` middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. ### Patches In 0.21.18, 0.22.0-M3, and 1.0.0-M16, a new`maxConnections` property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. The connections are bounded in 0.21.17, 0.22.0-M2, and 1.0.0-M14, but the `maxConnections` parameter was passed incorrectly, making it impossible to change the Blaze default of 512. ### Workarounds * An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. * http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. * http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. * http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. ### References See [the Blaze GHSA](https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc) for more on the underlying issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s/http4s](http://github.com/http4s/http4s) * Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-21294'}
2021-02-09T18:51:45Z
2021-02-02T21:42:56Z
HIGH
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/advisories/GHSA-xhv5-w9c5-2r2w', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}
null
GHSA
GHSA-mq76-m7gv-xhfm
Downloads Resources over HTTP in sauce-connect
Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`. ## Recommendation No patch is currently available for this vulnerability, and this package has not been updated since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10599'}
2021-01-08T18:26:42Z
2019-02-18T23:34:00Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/186', 'https://www.npmjs.com/advisories/186', 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599'}
null
GHSA
GHSA-g4rf-pc26-6hmr
OMERO webclient does not validate URL redirects on login or switching group.
### Background OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.redirect_allowed_hosts`` setting. ### Impact OMERO.web before 5.9.0 ### Patches 5.9.0 ### Workarounds No workaround ### References ### For more information If you have any questions or comments about this advisory: * Open an issue in [omero-web](https://github.com/ome/omero-web) * Email us at [security](mailto:security@openmicroscopy.org.uk)
{'CVE-2021-21377'}
2021-03-29T17:37:03Z
2021-03-23T15:26:49Z
MODERATE
0
{'CWE-601'}
{'https://www.openmicroscopy.org/security/advisories/2021-SV2/', 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21377'}
null
GHSA
GHSA-cr3q-pqgq-m8c2
Spoofing attack in swagger-ui
Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.
{'CVE-2018-25031'}
2022-04-12T15:06:16Z
2022-03-12T00:00:36Z
MODERATE
4.3
{'CWE-20'}
{'https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://github.com/swagger-api/swagger-ui/pull/7697', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/advisories/GHSA-cr3q-pqgq-m8c2'}
null
GHSA
GHSA-8hrq-9wm7-v3jw
Malicious Package in btffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:53:27Z
2020-09-03T21:39:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1231', 'https://github.com/advisories/GHSA-8hrq-9wm7-v3jw'}
null
GHSA
GHSA-vh5w-fg69-rc8m
Improper Input Validation in Google Closure Library
A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315.
{'CVE-2020-8910'}
2021-05-07T16:06:34Z
2021-05-07T16:06:34Z
MODERATE
6.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://github.com/google/closure-library/releases/tag/v20200315', 'https://github.com/advisories/GHSA-vh5w-fg69-rc8m'}
null
GHSA
GHSA-3v3c-r5v2-68ph
High severity vulnerability that affects private_address_check
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
{'CVE-2017-0909'}
2021-01-08T20:00:19Z
2017-11-30T23:14:55Z
HIGH
0
{'CWE-184'}
{'https://github.com/jtdowney/private_address_check/pull/3', 'https://hackerone.com/reports/288950', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909', 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}
null
GHSA
GHSA-9frf-r7c7-j2vg
Out of bounds write in stackvector
An issue was discovered in the stackvector crate before 1.0.9 for Rust. There is an out-of-bounds write in StackVec::extend if size_hint provides certain anomalous data.
{'CVE-2021-29939'}
2021-08-25T20:54:14Z
2021-08-25T20:54:14Z
HIGH
7.3
{'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0048.html', 'https://github.com/Alexhuszagh/rust-stackvector/issues/2', 'https://github.com/advisories/GHSA-9frf-r7c7-j2vg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29939'}
null
GHSA
GHSA-hph2-m3g5-xxv4
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39151](https://x-stream.github.io/CVE-2021-39151.html). ### Credits Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39151'}
2022-04-22T15:42:56Z
2021-08-25T14:47:09Z
HIGH
8.5
{'CWE-434', 'CWE-502'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39151.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://github.com/advisories/GHSA-hph2-m3g5-xxv4', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-jj9h-mwhq-8vhm
Moderate severity vulnerability that affects org.apache.qpid:qpid-broker
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
{'CVE-2016-3094'}
2021-09-14T19:44:50Z
2018-10-16T19:50:13Z
MODERATE
5.9
{'CWE-287', 'CWE-20'}
{'https://github.com/advisories/GHSA-jj9h-mwhq-8vhm', 'https://issues.apache.org/jira/browse/QPID-7271', 'http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html', 'http://www.securityfocus.com/archive/1/538507/100/0/threaded', 'https://svn.apache.org/viewvc?view=revision&revision=1744403', 'http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html', 'http://www.securitytracker.com/id/1035982', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3094', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E'}
null
GHSA
GHSA-4rm3-4mq4-mfwr
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
{'CVE-2018-20595'}
2021-09-01T18:36:40Z
2019-01-04T17:43:22Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20595', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr'}
null
GHSA
GHSA-4jhw-2p6j-5wmp
Open Redirection in Login Handling
### Problem It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue. ### References * [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001)
{'CVE-2021-21338'}
2022-04-19T19:02:51Z
2021-03-23T01:53:35Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-4jhw-2p6j-5wmp', 'https://typo3.org/security/advisory/typo3-core-sa-2021-001', 'https://packagist.org/packages/typo3/cms-core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21338', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'}
null
GHSA
GHSA-5xjx-4xcm-hpcm
Prototype Pollution in ts-nodash
`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
{'CVE-2021-23403'}
2021-12-10T18:53:42Z
2021-12-10T18:53:42Z
HIGH
7.3
{'CWE-1321', 'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://github.com/advisories/GHSA-5xjx-4xcm-hpcm'}
null
GHSA
GHSA-rf6r-2c4q-2vwg
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
{'CVE-2020-10968'}
2021-10-21T21:10:55Z
2020-05-15T18:58:54Z
HIGH
8.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-rf6r-2c4q-2vwg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10968', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2662', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-c6c4-jmqx-3r33
Open Redirect in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
{'CVE-2020-11611'}
2022-04-19T19:03:27Z
2021-12-09T19:30:14Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-c6c4-jmqx-3r33', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11611', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client'}
null
GHSA
GHSA-mwp6-j9wf-968c
Critical severity vulnerability that affects generator-jhipster
Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html
null
2022-04-19T19:02:30Z
2019-09-13T21:33:25Z
CRITICAL
9.8
{'CWE-338'}
{'https://github.com/advisories/GHSA-j3rh-8vwq-wh84', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/advisories/GHSA-mwp6-j9wf-968c'}
null
GHSA
GHSA-g7mw-5cq6-fv82
Cross-Site Scripting in wangeditor
All versions of `wangeditor` are vulnerable to Cross-Site Scripting. The package fails to properly encode output, allowing arbitrary JavaScript to be inserted in links and executed by browsers. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T21:00:39Z
2020-09-02T21:20:40Z
HIGH
0
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-WANGEDITOR-174536', 'https://www.npmjs.com/advisories/876', 'https://github.com/advisories/GHSA-g7mw-5cq6-fv82', 'https://github.com/wangfupeng1988/wangEditor/issues/1945'}
null
GHSA
GHSA-c6rp-xvqv-mwmf
Cross-site Scripting in epubjs
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.
{'CVE-2021-33040'}
2022-01-21T23:52:17Z
2022-01-21T23:52:17Z
HIGH
0
{'CWE-79'}
{'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e', 'https://github.com/advisories/GHSA-c6rp-xvqv-mwmf', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'}
null
GHSA
GHSA-952m-m83c-3xm6
Open redirect in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
{'CVE-2020-12699'}
2021-05-24T16:58:37Z
2021-05-24T16:58:37Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-952m-m83c-3xm6', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12699'}
null
GHSA
GHSA-74xw-82v7-hmrm
Improper Input Validation in python-dbusmock
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file.
{'CVE-2015-1326'}
2021-08-03T17:42:37Z
2019-04-23T16:04:36Z
HIGH
8.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-1326', 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093', 'https://github.com/advisories/GHSA-74xw-82v7-hmrm'}
null
GHSA
GHSA-rwg6-3fmj-w4wx
Hijacked Environment Variables in tkinter
The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16061'}
2021-09-16T20:58:23Z
2018-11-01T14:47:21Z
CRITICAL
0
{'CWE-506', 'CWE-433'}
{'https://www.npmjs.com/advisories/500', 'https://nodesecurity.io/advisories/500', 'https://github.com/advisories/GHSA-rwg6-3fmj-w4wx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'}
null
GHSA
GHSA-rrfw-hg9m-j47h
Signature Validation Bypass
### Impact An authentication bypass exists in the [goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) this library uses to determine if SAML assertions are genuine. An attacker could craft a SAML response that would appear to be valid but would not have been genuinely issued by the IDP. ### Patches Version 0.4.2 bumps the dependency which should fix the issue. ### For more information Please see [the advisory in goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) ## Credits The original vulnerability was discovered by @jupenur. Thanks to @russellhaering for the heads up.
null
2022-04-19T19:02:35Z
2021-05-24T16:59:42Z
CRITICAL
0
{'CWE-347'}
{'https://github.com/advisories/GHSA-rrfw-hg9m-j47h', 'https://github.com/crewjam/saml/security/advisories/GHSA-rrfw-hg9m-j47h'}
null
GHSA
GHSA-q26w-wjj2-22vv
Cross-site scripting in Joplin
Joplin allows XSS via a LINK element in a note.
{'CVE-2020-28249'}
2021-05-10T18:47:36Z
2021-05-10T18:47:36Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/fhlip0/JopinXSS', 'https://github.com/advisories/GHSA-q26w-wjj2-22vv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'}
null
GHSA
GHSA-5vcm-3xc3-w7x3
Response Splitting from unsanitized headers
### Impact http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: * Header names (`Header.name`å * Header values (`Header.value`) * Status reason phrases (`Status.reason`) * URI paths (`Uri.Path`) * URI authority registered names (`URI.RegName`) (through 0.21) The following backends render invalid carriage return, newline, or null characters in an unsafe fashion. | | blaze-server | ember-server | blaze-client | ember-client | jetty-client | |:---------------|:-------------|:-------------|:-------------|--------------|--------------| | header names | ⚠ | ⚠ | ⚠ | ⚠ | ⚠ | | header values | ⚠ | ⚠ | ⚠ | ⚠ | | | status reasons | ⚠ | ⚠ | | | | | URI paths | | | ⚠ | ⚠ | | | URI regnames | | | ⚠ < 0.22 | ⚠ < 0.22 | | For example, given the following service: ```scala import cats.effect._ import org.http4s._ import org.http4s.dsl.io._ import org.http4s.server.blaze.BlazeServerBuilder import scala.concurrent.ExecutionContext.global object ResponseSplit extends IOApp { override def run(args: List[String]): IO[ExitCode] = BlazeServerBuilder[IO](global) .bindHttp(8080) .withHttpApp(httpApp) .resource .use(_ => IO.never) val httpApp: HttpApp[IO] = HttpApp[IO] { req => req.params.get("author") match { case Some(author) => Ok("The real content") .map(_.putHeaders(Header("Set-Cookie", s"author=${author}"))) case None => BadRequest("No author parameter") } } } ``` A clean `author` parameter returns a clean response: ```sh curl -i 'http://localhost:8080/?author=Ross' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=Ross Date: Mon, 20 Sep 2021 04:12:10 GMT Content-Length: 16 The real content ``` A malicious `author` parameter allows a user-agent to hijack the response from our server and return different content: ```sh curl -i 'http://localhost:8080/?author=hax0r%0d%0aContent-Length:+13%0d%0a%0aI+hacked+you' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=hax0r Content-Length: 13 I hacked you ``` ### Patches Versions 0.21.29, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following: * If a status reasoon phrase is invalid, it is dropped. Rendering is optional per spec. * If a header name is invalid in a request or response, the header is dropped. There is no way to generically sanitize a header without potentially shadowing a correct one. * If a header value is invalid in a request or response, it is sanitized by replacing null (`\u0000`), carriage return (`\r`), and newline (`\n`) with space (` `) characters per spec. * If a URI path or registered name is invalid in a request line, the client raises an `IllegalArgumentException`. * If a URI registered name is invalid in a host header, the client raises an `IllegalArgumentException`. ### Workarounds http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening. Not all backends were affected: jetty-server, tomcat-server, armeria, and netty on the server; async-http-client, okhttp-client, armeria, and netty as clients. ### References * https://owasp.org/www-community/attacks/HTTP_Response_Splitting * https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-41084'}
2021-10-21T14:31:25Z
2021-09-22T19:18:41Z
HIGH
8.7
{'CWE-918'}
{'https://github.com/advisories/GHSA-5vcm-3xc3-w7x3', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8', 'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084'}
null
GHSA
GHSA-94m7-w873-6wwf
Malicious Package in modlibrary
Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:28:56Z
2020-09-01T20:28:56Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/631', 'https://github.com/advisories/GHSA-94m7-w873-6wwf'}
null
GHSA
GHSA-33h2-69j3-r336
Out-of-bounds Read in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the cv::RBaseStream::readBlock function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 8-opencv-invalid-read-fread test case.
{'CVE-2017-12598'}
2021-11-18T00:07:17Z
2021-10-12T22:00:51Z
HIGH
8.8
{'CWE-125'}
{'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv-python/releases/tag/11', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12598', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/advisories/GHSA-33h2-69j3-r336'}
null
GHSA
GHSA-jh37-772x-4hpw
Double free in algorithmica
An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. In the affected versions of this crate, `merge_sort::merge()` wildly duplicates and drops ownership of `T` without guarding against double-free. Due to such implementation, simply invoking `merge_sort::merge()` on `Vec<T: Drop>` can cause **double free** bugs.
{'CVE-2021-31996'}
2021-08-25T21:01:52Z
2021-08-25T21:01:52Z
HIGH
7.5
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31996', 'https://github.com/advisories/GHSA-jh37-772x-4hpw', 'https://github.com/AbrarNitk/algorithmica/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0053.html'}
null
GHSA
GHSA-v3r2-3fp4-rp46
Prototype pollution in paypal-adaptive
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2020-7643'}
2021-12-10T20:05:58Z
2021-12-10T20:05:57Z
MODERATE
4.2
{'CWE-400'}
{'https://github.com/advisories/GHSA-v3r2-3fp4-rp46', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31', 'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643'}
null
GHSA
GHSA-h2g5-2rhx-ffgj
Command injection in Weblate
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release.
{'CVE-2022-24727'}
2022-03-17T21:37:32Z
2022-03-05T00:00:44Z
HIGH
0
{'CWE-77'}
{'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/advisories/GHSA-h2g5-2rhx-ffgj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}
null
GHSA
GHSA-f3pc-c2gf-hvgw
Malicious Package in requets
All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:10:10Z
2020-09-02T21:13:14Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/868', 'https://github.com/advisories/GHSA-f3pc-c2gf-hvgw'}
null
GHSA
GHSA-x752-qjv4-c4hc
Remote code injection in dompdf/dompdf
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
{'CVE-2022-28368'}
2022-04-15T16:49:28Z
2022-04-04T00:00:55Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/dompdf/dompdf/pull/2808', 'https://github.com/advisories/GHSA-x752-qjv4-c4hc', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://github.com/dompdf/dompdf/issues/2598', 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://github.com/snyk-labs/php-goof', 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'}
null
GHSA
GHSA-j9h8-phrw-h4fh
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39144](https://x-stream.github.io/CVE-2021-39144.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39144'}
2022-04-22T15:43:41Z
2021-08-25T14:48:19Z
HIGH
8.5
{'CWE-94', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39144.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39144', 'https://github.com/advisories/GHSA-j9h8-phrw-h4fh', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-xm6r-4466-mr74
High severity vulnerability that affects com.orientechnologies:orientdb-core
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
{'CVE-2017-11467'}
2021-09-21T22:36:25Z
2018-10-18T17:40:56Z
CRITICAL
9.8
{'CWE-269'}
{'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467', 'http://www.heavensec.org/?p=1703', 'https://github.com/advisories/GHSA-xm6r-4466-mr74'}
null
GHSA
GHSA-r7q2-5gqg-6c7q
Moderate severity vulnerability that affects actionpack
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
{'CVE-2011-2929'}
2021-09-17T14:40:50Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929', 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'}
null
GHSA
GHSA-v6cj-r88p-92rm
Buffer Overflow in centra
## Denial of Service ### Impact Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources. ### Patches Version 2.4.0 resolves the issue by limiting the size of buffered response body. ### Workarounds Attempting workarounds isn't recommended. Updating is preferred. ### For more information If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra).
null
2021-09-20T15:40:54Z
2019-09-30T19:31:59Z
HIGH
7.3
{'CWE-119'}
{'https://snyk.io/vuln/SNYK-JS-CENTRA-536073', 'https://github.com/advisories/GHSA-v6cj-r88p-92rm', 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'}
null
GHSA
GHSA-xx8f-qf9f-5fgw
Remote code execution in zendframework and laminas-http
Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by the maintainer. However, not all Zend Framework 3.0.0 vulnerabilities exist in a Laminas Project release.
{'CVE-2021-3007'}
2021-06-08T20:11:19Z
2021-06-08T20:11:19Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/laminas/laminas-http/pull/48', 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md', 'https://github.com/advisories/GHSA-xx8f-qf9f-5fgw', 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/', 'https://github.com/laminas/laminas-http/releases/tag/2.14.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007', 'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'}
null
GHSA
GHSA-788m-pj96-7w2c
Cross-Site Scripting in fomantic-ui
Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text. ## Recommendation Upgrade to version 2.7.0 or later.
null
2021-09-27T21:41:41Z
2020-09-02T21:23:51Z
HIGH
0
{'CWE-79'}
{'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0', 'https://github.com/advisories/GHSA-788m-pj96-7w2c', 'https://www.npmjs.com/advisories/885'}
null
GHSA
GHSA-ghqm-pgxj-37gq
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
{'CVE-2015-7580'}
2021-09-10T21:50:09Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2016/01/25/15', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://github.com/advisories/GHSA-ghqm-pgxj-37gq', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}
null
GHSA
GHSA-8f9f-pc5v-9r5h
Malicious takeover of previously owned ENS names
### Impact A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness. ### Patches A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly deployed at [0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e](https://etherscan.io/address/0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e). ### Workarounds Do not accept transfers of ENS domains from other users on the old registrar.
{'CVE-2020-5232'}
2021-01-08T20:31:47Z
2020-01-30T23:55:04Z
CRITICAL
8.7
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/advisories/GHSA-8f9f-pc5v-9r5h'}
null
GHSA
GHSA-334p-wv2m-w3vp
Denial of service in Apache Xerces2
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
{'CVE-2009-2625'}
2021-08-30T14:20:43Z
2020-06-15T18:51:30Z
MODERATE
0
null
{'http://www.us-cert.gov/cas/techalerts/TA09-294A.html', 'https://rhn.redhat.com/errata/RHSA-2009-1637.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1', 'http://www.debian.org/security/2010/dsa-1984', 'http://secunia.com/advisories/37754', 'http://www.openwall.com/lists/oss-security/2009/10/26/3', 'http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html', 'http://www.us-cert.gov/cas/techalerts/TA10-012A.html', 'http://www.vupen.com/english/advisories/2009/3316', 'http://www.codenomicon.com/labs/xml/', 'http://www.mandriva.com/security/advisories?name=MDVSA-2009:209', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html', 'http://secunia.com/advisories/36180', 'http://secunia.com/advisories/37460', 'https://rhn.redhat.com/errata/RHSA-2009-1650.html', 'http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b', 'http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1', 'http://www.vupen.com/english/advisories/2009/2543', 'http://secunia.com/advisories/50549', 'https://rhn.redhat.com/errata/RHSA-2009-1200.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2625', 'https://rhn.redhat.com/errata/RHSA-2009-1201.html', 'http://secunia.com/advisories/38231', 'http://www.openwall.com/lists/oss-security/2009/10/23/6', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'http://www.ubuntu.com/usn/USN-890-1', 'https://snyk.io/vuln/SNYK-JAVA-XERCES-32014', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1', 'http://secunia.com/advisories/38342', 'http://secunia.com/advisories/37300', 'https://bugzilla.redhat.com/show_bug.cgi?id=512921', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html', 'http://secunia.com/advisories/36176', 'https://github.com/advisories/GHSA-334p-wv2m-w3vp', 'http://www.openwall.com/lists/oss-security/2009/10/22/9', 'http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html', 'https://rhn.redhat.com/errata/RHSA-2009-1649.html', 'http://secunia.com/advisories/43300', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'https://rhn.redhat.com/errata/RHSA-2009-1199.html', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520', 'http://www.vupen.com/english/advisories/2011/0359', 'http://rhn.redhat.com/errata/RHSA-2012-1232.html', 'http://www.redhat.com/support/errata/RHSA-2011-0858.html', 'http://www.securityfocus.com/archive/1/507985/100/0/threaded', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html', 'http://www.redhat.com/support/errata/RHSA-2009-1615.html', 'http://secunia.com/advisories/36199', 'https://rhn.redhat.com/errata/RHSA-2009-1636.html', 'http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html', 'http://marc.info/?l=bugtraq&m=125787273209737&w=2', 'http://www.cert.fi/en/reports/2009/vulnerability2009085.html', 'http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html', 'http://www.securityfocus.com/bid/35958', 'http://www.securitytracker.com/id?1022680', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://secunia.com/advisories/37671', 'http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h', 'http://rhn.redhat.com/errata/RHSA-2012-1537.html', 'http://www.networkworld.com/columnists/2009/080509-xml-flaw.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1', 'http://secunia.com/advisories/36162', 'http://www.openwall.com/lists/oss-security/2009/09/06/1'}
null
GHSA
GHSA-gpvv-69j7-gwj8
Path Traversal in pip
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.
{'CVE-2019-20916'}
2022-04-21T15:43:34Z
2021-06-09T17:35:04Z
HIGH
7.5
{'CWE-22'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html', 'https://github.com/advisories/GHSA-gpvv-69j7-gwj8', 'https://github.com/pypa/pip/issues/6413', 'https://github.com/pypa/pip/compare/19.1.1...19.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20916', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html'}
null
GHSA
GHSA-pp74-39w2-v4w9
Permissions bypass in pleaser
pleaseedit in pleaser before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.
{'CVE-2021-31154'}
2021-08-25T21:01:44Z
2021-08-25T21:01:44Z
HIGH
7.8
{'CWE-59', 'CWE-340'}
{'https://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://github.com/advisories/GHSA-pp74-39w2-v4w9', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31154', 'https://gitlab.com/edneville/please', 'https://crates.io/crates/pleaser'}
null
GHSA
GHSA-r628-mhmh-qjhw
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. ### Patches 3.2.3 || 4.4.15 || 5.0.7 || 6.1.2 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{'CVE-2021-32803'}
2022-03-11T21:27:16Z
2021-08-03T19:00:40Z
HIGH
8.2
{'CWE-23', 'CWE-22'}
{'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/package/tar', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://github.com/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/advisories/1771', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'}
null
GHSA
GHSA-563h-697m-j7x5
Malicious Package in device-mqtt
Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:18:58Z
2020-09-03T19:18:58Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-563h-697m-j7x5', 'https://www.npmjs.com/advisories/1109'}
null
GHSA
GHSA-62gr-4qp9-h98f
Regular Expression Denial of Service in Handlebars
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
{'CVE-2019-20922'}
2022-02-10T20:38:22Z
2022-02-10T20:38:22Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/package/handlebars', 'https://www.npmjs.com/advisories/1300', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://github.com/advisories/GHSA-62gr-4qp9-h98f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922'}
null
GHSA
GHSA-g6ww-v8xp-vmwg
Prototype pollution in pathval
A prototype pollution vulnerability affects all versions of package pathval under 1.1.1.
{'CVE-2020-7751'}
2022-04-18T21:58:50Z
2022-02-10T20:21:24Z
HIGH
7.2
{'CWE-20', 'CWE-1321'}
{'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7751', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926', 'https://github.com/advisories/GHSA-g6ww-v8xp-vmwg', 'https://github.com/chaijs/pathval/pull/58/files'}
null
GHSA
GHSA-46c4-8wrp-j99v
Improper Validation and Sanitization in url-parse
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
{'CVE-2020-8124'}
2022-01-06T20:30:34Z
2022-01-06T20:30:34Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-46c4-8wrp-j99v', 'https://hackerone.com/reports/496293', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'}
null
GHSA
GHSA-c32w-3cqh-f6jx
Weak Password Recovery Mechanism for Forgotten Password
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
{'CVE-2021-25957'}
2021-10-21T14:15:19Z
2021-09-02T17:08:33Z
HIGH
8.8
{'CWE-640'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://github.com/advisories/GHSA-c32w-3cqh-f6jx', 'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'}
null
GHSA
GHSA-rh6c-q938-3r9q
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
{'CVE-2013-7452'}
2021-09-17T18:17:08Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-rh6c-q938-3r9q', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'}
null
GHSA
GHSA-j3ff-xp6c-6gcc
Failure to validate signature during handshake
### Impact `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. ### Patches Users should upgrade to 4.1.2 or 5.0.3 ### Workarounds No workarounds, just patch upgrade ### References https://github.com/ChainSafe/js-libp2p-noise/pull/130
{'CVE-2022-24759'}
2022-03-21T22:01:28Z
2022-03-18T18:57:53Z
HIGH
8.1
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24759', 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3', 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc', 'https://github.com/advisories/GHSA-j3ff-xp6c-6gcc', 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'}
null
GHSA
GHSA-c7m7-4257-h698
Prototype Pollution in templ8
All versions of package templ8 up to and including 0.0.44 are vulnerable to Prototype Pollution via the parse function.
{'CVE-2020-7702'}
2021-07-29T21:53:38Z
2021-05-06T17:29:13Z
CRITICAL
9.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-TEMPL8-598770', 'https://github.com/advisories/GHSA-c7m7-4257-h698', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7702'}
null
DWF
GSD-2021-1000001
Denial of service in tsMuxer version 2.6.16
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-26805. Reason: This candidate is a duplicate of CVE-2021-26805. Notes: All CVE users should reference CVE-2021-26805 instead of this candidate.
null
2021-06-24T22:55:39.024188Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://github.com/justdan96/tsMuxer/issues/395'}
null
DWF
GSD-2021-1000040
update freeze attack in DroidScript version all versions
DroidScript, all versions, were removed from the Google store after allegations of malware and ad fraud surfaced from Google. It is reported that ad clicking activity did take place but that it was not as a direct result from DriodScript themselves. However due to the removal of DroidScript it is unlikely that many DroidScript based applications will receive security updates, creating a significant vulnerability (effectively an update freeze attack).
null
2021-06-24T22:55:39.059064Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://groups.google.com/g/androidscript/c/Mbh5TZ6YYnA/m/GflwflqaDAAJ', 'https://twitter.com/droidscript/status/1385956513433456640?ref_src=twsrc%5Etfw%7Ctwcamp%5Eembeddedtimeline%7Ctwterm%5Eprofile%3Adroidscript%7Ctwgr%5EeyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfX0%3D%7Ctwcon%5Etimelinechrome&ref_url=https%3A%2F%2Fdroidscript.org%2Fnews-2%2F', 'https://droidscript.org/'}
null
DWF
GSD-2021-1000000
Denial of service(DoS) in GPAC version 0.8.0
In GPAC GPAC version 0.8.0 a Denial of service(DoS) exists in the GPAC 0.8.0-e10d39d-master branch that can be attacked via a malicious image file resulting in DoS. An attacker can exploit this vulnerability by submitting a malicious media file that exploits this issue. This will result in a Denial of Service (DoS) when the application attempts to process the file..
null
2021-06-24T22:55:38.996515Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://github.com/gpac/gpac/issues/1485'}
null
DWF
GSD-2021-1000007
denial of service in parse_duration version up to 2.1.0
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29932. Reason: This candidate is a duplicate of CVE-2021-29932. Notes: All CVE users should reference CVE-2021-29932 instead of this candidate.
null
2021-06-24T22:55:39.042010Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://github.com/zeta12ti/parse_duration/issues/21'}
null
DWF
GSD-2021-1000010
temporary file creation (CWE-379) in fabric-samples version Prior to commit 6bccc138887b3dbd9dc920bad200068b11066ef7
In Hyperledger fabric-samples version Prior to commit 6bccc138887b3dbd9dc920bad200068b11066ef7 a temporary file creation (CWE-379) exists in the digibank.sh and magnetocorp.sh that can be attacked via Local resulting in Information disclosure of all environmental variables
null
2021-06-24T22:55:39.043586Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://hackerone.com/bugs?report_id=1124005&subject=user', 'https://github.com/hyperledger/fabric-samples/pull/434', 'https://github.com/hyperledger/fabric-samples/pull/440'}
null
DWF
GSD-2021-1000006
Denial of Service in varnish-modules version 0.18.0
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-28543. Reason: This candidate is a duplicate of CVE-2021-28543. Notes: All CVE users should reference CVE-2021-28543 instead of this candidate.
null
2021-06-24T22:55:39.041520Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://varnish-cache.org/security/VSV00006.html'}
null
DWF
GSD-2021-1000051
malware in "RotaJakiro" version all
A new Linux malware labeled "RotaJakiro" has been found for 64bit Linux. When run as a root user the program creates entries in systems to run binaries labeled: /bin/systemd/systemd-daemon /usr/lib/systemd/systemd-daemon When run as a non root user it creates an autostart script$HOME/.config/au-tostart/gnomehelper.desktop to run binaries labeled as: $HOME/.dbus/sessions/session-dbus $HOME/.gvfsd/.profile/gvfsd-helper MD5 hashes of the binaries involved include: MD5:1d45cd2c1283f927940c099b8fab593b MD5:11ad1e9b74b144d564825d65d7fb37d6 MD5:5c0f375e92f551e8f2321b141c15c48f MD5:64f6cfe44ba08b0babdd3904233c4857 The "RotaJakiro" malware interacts with command and control servers at the following domains on port 443, but using a custom protocol: news.thaprior.net:443 blog.eduelects.com:443 cdn.mirror-codes.net:443 status.sublineover.net:443 For more details please see the Qihoo 360 Netlab blog posting.
null
2021-06-24T22:55:39.065366Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/', 'https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/', 'https://news.ycombinator.com/item?id=26981886'}
null
DWF
GSD-2021-1000005
Buffer Overflow in VoIPmonitor sniffer version 27.5
In VoIPmonitor VoIPmonitor sniffer version 27.5 a Buffer Overflow exists in the live sniffer feature that can be attacked via SIP resulting in RCE, DoS.
null
2021-06-24T22:55:39.041024Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://www.voipmonitor.org/changelog-sniffer', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-03-voipmonitor-livesniffer-buffer-overflow', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-04-voipmonitor-staticbuild-memory-corruption-protection'}
null
DWF
GSD-2021-1000009
Replacement of bash script by an attacker to one that includes malicious commands in Codecov Bash uploader version All versions downloaded from Jan 2021 through April 2021. Because the attacker had control of the script the version # included in it cannot be trusted.
In Codecov Codecov Bash uploader version All versions downloaded from Jan 2021 through April 2021. Because the attacker had control of the script the version # included in it cannot be trusted. a Replacement of bash script by an attacker to one that includes malicious commands exists in the The Bash uploader script that can be attacked via Numerous victims downloaded and executed this script, resulting in Information disclosure is known, other impacts may have occurred (it is not clear if the script was only replaced once or multiple times)
null
2021-06-24T22:55:39.042955Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://www.securityweek.com/codecov-bash-uploader-dev-tool-compromised-supply-chain-hack', 'https://about.codecov.io/security-update/', 'https://mobile.twitter.com/_fel1x/status/1383050036397871108', 'https://docs.codecov.io/docs/about-the-codecov-bash-uploader', 'https://www.reuters.com/technology/us-investigators-probing-breach-san-francisco-code-testing-company-firm-2021-04-16/'}
null
DWF
GSD-2021-1000008
Denial of Service in Leaf EV (car) version 2018 SV
In Nissan Leaf EV (car) version 2018 SV a Denial of Service exists in the Head Unit Display that can be attacked via Local Access resulting in Denial of Service (HUD being disabled).
null
2021-06-24T22:55:39.042484Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://wwws.nightwatchcybersecurity.com/2021/03/14/local-denial-of-service-in-nissan-leaf-ev-2018-head-unit-display/'}
null
DWF
GSD-2021-1000004
Cross Site Scripting (XSS) in VoIPmonitor GUI version 24.55
In VoIPmonitor VoIPmonitor GUI version 24.55 a Cross Site Scripting (XSS) exists in the VoIPmonitor GUI that can be attacked via SIP resulting in Privilege escalation.
null
2021-06-24T22:55:39.040339Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://www.voipmonitor.org/changelog-gui?major=5', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-02-voipmonitor-gui-xss'}
null
DWF
GSD-2021-1000189
takeover by external entity in IRC Network version all current freenode hosts
The Freenode IRC Network, specifically freenode hosts, DNS name, etc. ("freenode ltd"), was sold to a third party, Andrew Lee. Recent operational changes have resulted in the majority (possibly all) of staff resigning and leaving due to concerns around data leakage and potential denial of service in the form of "you can ban your enemies" via line being offered to at least one individual (who refused it). The Freenode staff have formed a new IRC network called "libera.chat" (https://libera.chat/) that is effectively a replacement of Freenode.
null
2021-06-24T22:55:39.130529Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://find-and-update.company-information.service.gov.uk/company/10308021/officers', 'https://twitter.com/ariadneconill/status/1392995496403341313', 'https://mastodon.sdf.org/@kline/106299403921451814', 'https://news.ycombinator.com/item?id=27286628', 'https://developers.slashdot.org/story/21/05/29/0224246/freenode-apologizes-as-prominent-open-source-projects-switch-to-libera-chat', 'https://news.ycombinator.com/item?id=14102030', 'https://freenode.net/news/post-mortem-may21', 'https://fuchsnet.ch/freenode-resign-letter.txt', 'https://www.kline.sh/', 'https://distfiles.dereferenced.org/stuff/rasengan-log.txt', 'https://news.ycombinator.com/item?id=14101538', 'https://distfiles.dereferenced.org/stuff/nirvana-log.txt', 'https://www.gentoo.org/news/2021/05/26/gentoo-freenode-channels-hijacked.html', 'https://gist.github.com/pushcx/ab2a1d5b1d18e964c581ef18ccb3a79f', 'https://lwn.net/Articles/857252/', 'https://archive.is/uHw1g', 'https://news.ycombinator.com/item?id=27207440'}
null
DWF
GSD-2021-1000003
CWE-379 in fabric-sdk-rest version All released versions (project is now archived)
In Hyperledger fabric-sdk-rest version All released versions (project is now archived) a CWE-379 exists in the packages/fabric-rest/fabric-rest-server script that can be attacked via Local resulting in File overwrite from a privileged user.
null
2021-06-24T22:55:39.038758Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://jira.hyperledger.org/browse/FABR-10', 'https://github.com/hyperledger-archives/fabric-sdk-rest/blob/master/packages/fabric-rest/fabric-rest-server'}
null
DWF
GSD-2021-1000002
Local DoS in Velop version 2.1.13.200506 - unknown
In Linksys Velop version 2.1.13.200506 - unknown a Local DoS exists in the MQTT stack that can be attacked via Local network access resulting in Denial of Service.
null
2021-06-24T22:55:39.025070Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://mjg59.dreamwidth.org/56106.html'}
null
DWF
GSD-2021-1000188
default search paths use Terraform Registry for custom providers in Terraform version 0.15.3
In Hashicorp Terraform version 0.15.3 the default search paths use Terraform Registry for custom providers if they exist in the terraform plan which can be attacked via code processed by the CI/CD pipeline using "terraform plan" resulting in Remote code Execution, exfiltration of environmental variables, etc.
null
2021-06-24T22:55:39.129915Z
2021-05-31T15:39:45.031586Z
null
null
null
{'https://www.terraform.io/docs/language/modules/sources.html', 'https://alex.kaskaso.li/post/terraform-plan-rce', 'https://www.reddit.com/r/netsec/comments/nbj5m7/terraform_plan_rce/'}
null
Go
GO-2020-0027
null
After dropping and then elevating process privileges euid, guid, and groups are not properly restored to their original values, allowing an unprivileged user to gain membership in the root group.
{'CVE-2018-6558'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/google/fscrypt/issues/77', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}
null
Go
GHSA-9m95-8hx6-7p9v
Improper input validation in umoci
### Impact umoci 0.4.6 and earlier can be tricked into modifying host files by creating a malicious layer that has a symlink with the name "." (or "/"). Because umoci deletes inodes if they change types, this results in the rootfs directory being replaced with an attacker-controlled symlink. Subsequent image layers will then be applied on top of the target of the symlink (which could be any directory on the host filesystem the user running umoci has access to). While umoci does have defences against symlink-based attacks, they are all implemented by resolving things relative to the rootfs directory -- if the rootfs itself is a symlink, umoci resolves it first. This vulnerability affects both "umoci unpack" and "umoci raw unpack". ### Patches This issue has been patched in umoci 0.4.7, see the references section for the specific commit which fixed this vulnerability. ### Workarounds Note that if you use umoci as an unprivileged user (using the --rootless flag) then umoci will not be able to overwrite any files that your user doesn't have access to. Other possible mitigations are to run umoci under an LSM profile such as AppArmor or SELinux to restrict the level of access it has outside of container image directories. ### References * [oss-security public disclosure](https://www.openwall.com/lists/oss-security/2021/04/06/2) * [patch](https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57) ### Credits Thanks to Robin Peraglie from Cure53 for discovering and reporting this vulnerability. ### For more information If you have any questions or comments about this advisory * Open an issue in <https://github.com/opencontainers/umoci>. * Email us at <security@opencontainers.org>.
{'CVE-2021-29136'}
2022-03-15T21:39:42Z
2022-02-15T01:17:37Z
MODERATE
null
{'CWE-20'}
{'https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29136', 'http://www.openwall.com/lists/oss-security/2021/04/06/2', 'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'}
null
Go
GHSA-4999-659w-mq36
Authentication bypass issue in the Operator Console
During an internal security audit, we detected an authentication bypass issue in the Operator Console when an external IDP is enabled. The security issue has been reported internally. We have not observed this exploit in the wild or reported elsewhere in the community at large. All users are advised to upgrade ASAP. ### Impact All users on release v0.12.2 and before are affected. ### Patches This issue was fixed by PR https://github.com/minio/console/pull/1217, users should upgrade to latest release. ### Workarounds Add `automountServiceAccountToken: false` to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the `CONSOLE_IDP_URL`, `CONSOLE_IDP_CLIENT_ID`, `CONSOLE_IDP_SECRET` and `CONSOLE_IDP_CALLBACK` environment variable and instead use the Kubernetes service account token. ### References #1217 for more information on the fix and how it was fixed. ### For more information If you have any questions or comments about this advisory: * Open an issue in [console issues](https://github.com/minio/console/issues) * Email us at [security@minio.io](mailto:security@minio.io)
{'CVE-2021-41266'}
2021-11-15T20:27:39Z
2021-11-15T23:16:49Z
HIGH
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41266', 'https://github.com/minio/console/security/advisories/GHSA-4999-659w-mq36', 'https://github.com/minio/console/pull/1217', 'https://github.com/minio/console'}
null
Go
GHSA-v9j4-cp63-qv62
Tarslip in go-unarr
unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.
{'CVE-2021-38197'}
2021-08-30T21:24:59Z
2021-09-01T18:32:02Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/gen2brain/go-unarr/issues/21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38197', 'github.com/gen2brain/go-unarr'}
null
Go
GO-2021-0083
null
TLS certificate verification is skipped when connecting to a MQTT server. This allows an attacker who can MITM the connection to read, or forge, messages passed between the client and server.
{'CVE-2019-12496'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/hybridgroup/gobot/releases/tag/v1.13.0', 'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'}
null
Go
GHSA-grfp-q2mm-hfp6
Redirect URL matching ignores character casing
### Impact Before version v0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using `strings.ToLower` while they should have been compared with a simple string match: 1. Registering a client with allowed redirect URL `https://example.com/callback` 2. Performing OAuth2 flow and requesting redirect URL `https://example.com/CALLBACK` 3. Instead of an error (invalid redirect URL), the browser is redirected to `https://example.com/CALLBACK` with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example).
{'CVE-2020-15234'}
2021-11-19T14:43:47Z
2021-05-24T17:00:05Z
MODERATE
null
{'CWE-20', 'CWE-601', 'CWE-178'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15234', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-grfp-q2mm-hfp6', 'https://github.com/ory/fosite'}
null