ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-rch7-f4h5-x9rj | Identity Spoofing in libp2p-secio | Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability.
## Recommendation
Update to version 0.9.0 or later. | null | 2021-08-17T21:32:42Z | 2019-08-23T00:04:52Z | CRITICAL | 9.1 | {'CWE-290'} | {'https://github.com/advisories/GHSA-rch7-f4h5-x9rj', 'https://github.com/libp2p/js-libp2p-secio/pull/95', 'https://www.npmjs.com/advisories/558', 'https://nodesecurity.io/advisories/558', 'https://snyk.io/vuln/npm:libp2p-secio:20180115'} | null |
GHSA | GHSA-mm62-wxc8-cf7m | Code Execution Through IIFE in serialize-to-js | Affected versions of `serialize-to-js` may be vulnerable to arbitrary code execution through an Immediately Invoked Function Expression (IIFE).
## Proof of Concept
```
var payload = "{e: (function(){ eval('console.log(`exploited`)') })() }"
var serialize = require('serialize-to-js');
serialize.deserialize(payload);
```
## Recommendation
Update to version 1.0.0, or later, and review [this disclaimer](https://www.npmjs.com/package/serialize-to-js#deserialize) from the author. | {'CVE-2017-5954'} | 2021-09-15T20:28:23Z | 2018-07-18T18:27:41Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-5954', 'https://www.npmjs.com/package/serialize-to-js#deserialize', 'https://github.com/commenthol/serialize-to-js/issues/1', 'https://github.com/advisories/GHSA-mm62-wxc8-cf7m', 'https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/', 'http://www.securityfocus.com/bid/96223', 'https://www.npmjs.com/advisories/313'} | null |
GHSA | GHSA-9r27-994c-4xch | discord-html not escaping HTML code blocks when lacking a language identifier | ### Impact
Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed.
### Patches
This has been patched in version 2.3.1
### Workarounds
Escape the characters `<>&` before sending plain code blocks to discord-markdown.
### References
https://github.com/brussell98/discord-markdown/issues/13 | null | 2020-02-24T17:34:02Z | 2020-02-24T17:34:02Z | HIGH | 0 | null | {'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch', 'https://github.com/advisories/GHSA-9r27-994c-4xch', 'https://github.com/brussell98/discord-markdown/issues/13', 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'} | null |
GHSA | GHSA-h7pc-85cg-wmch | Downloads Resources over HTTP in kindlegen | Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`.
## Recommendation
Update to version 1.1.0 or greater. | {'CVE-2016-10575'} | 2021-01-08T18:42:36Z | 2019-02-18T23:35:10Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/251', 'https://github.com/advisories/GHSA-h7pc-85cg-wmch', 'https://www.npmjs.com/advisories/251', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10575'} | null |
GHSA | GHSA-2cpx-427x-q2c6 | CHECK-fail in AddManySparseToTensorsMap | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`:
```python
import tensorflow as tf
import numpy as np
sparse_indices = tf.constant(530, shape=[1, 1], dtype=tf.int64)
sparse_values = tf.ones([1], dtype=tf.int64)
shape = tf.Variable(tf.ones([55], dtype=tf.int64))
shape[:8].assign(np.array([855, 901, 429, 892, 892, 852, 93, 96], dtype=np.int64))
tf.raw_ops.AddManySparseToTensorsMap(sparse_indices=sparse_indices,
sparse_values=sparse_values,
sparse_shape=shape)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape:
```cc
TensorShape tensor_input_shape(input_shape->vec<int64>());
```
The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status.
```cc
template <class Shape>
TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) {
set_tag(REP16);
set_data_type(DT_INVALID);
TF_CHECK_OK(InitDims(dim_sizes));
}
```
In our scenario, this occurs when adding a dimension from the argument results in overflow:
```cc
template <class Shape>
Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) {
...
Status status = Status::OK();
for (int64 s : dim_sizes) {
status.Update(AddDimWithStatus(internal::SubtleMustCopy(s)));
if (!status.ok()) {
return status;
}
}
}
template <class Shape>
Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) {
...
int64 new_num_elements;
if (kIsPartial && (num_elements() < 0 || size < 0)) {
new_num_elements = -1;
} else {
new_num_elements = MultiplyWithoutOverflow(num_elements(), size);
if (TF_PREDICT_FALSE(new_num_elements < 0)) {
return errors::Internal("Encountered overflow when multiplying ",
num_elements(), " with ", size,
", result: ", new_num_elements);
}
}
...
}
```
This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows.
### Patches
We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29523'} | 2021-05-21T14:21:43Z | 2021-05-21T14:21:43Z | LOW | 2.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/advisories/GHSA-2cpx-427x-q2c6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29523', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'} | null |
GHSA | GHSA-w222-53c6-c86p | Remote Code Execution in electron | Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met:
1. The electron application is running on Windows.
2. The electron application registers as the default handler for a protocol, such as `nodeapp://`.
This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron.
MacOS and Linux are not vulnerable.
## Recommendation
Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance:
If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted.
```
app.setAsDefaultProtocolClient(protocol, process.execPath, [
'--your-switches-here',
'--'
])
``` | {'CVE-2018-1000006'} | 2021-06-10T19:55:45Z | 2018-01-23T03:57:44Z | HIGH | 8.8 | {'CWE-78'} | {'https://www.exploit-db.com/exploits/44357/', 'http://www.securityfocus.com/bid/102796', 'https://www.npmjs.com/advisories/563', 'https://electronjs.org/blog/protocol-handler-fix', 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4', 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374', 'https://github.com/advisories/GHSA-w222-53c6-c86p', 'https://www.exploit-db.com/exploits/43899/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006'} | null |
GHSA | GHSA-cv9j-78f7-w6v9 | Incorrect Authorization in TYPO3 extension | The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields). | {'CVE-2020-25025'} | 2021-07-28T19:21:32Z | 2021-07-26T21:41:22Z | MODERATE | 4.3 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25025', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016', 'https://github.com/advisories/GHSA-cv9j-78f7-w6v9'} | null |
GHSA | GHSA-9f5r-vqm5-m342 | Use of Uninitialized Resource in ms3d | An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read. | {'CVE-2021-26952'} | 2021-08-25T20:53:16Z | 2021-08-25T20:53:16Z | HIGH | 7.5 | {'CWE-908'} | {'https://github.com/andrewhickman/ms3d/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0016.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26952', 'https://github.com/advisories/GHSA-9f5r-vqm5-m342'} | null |
GHSA | GHSA-jp27-cwp2-5qqr | Hijacked Environment Variables in jquery.js | The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16045'} | 2021-01-08T18:32:55Z | 2018-07-23T20:54:24Z | MODERATE | 0 | {'CWE-506'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16045', 'https://www.npmjs.com/advisories/496', 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr', 'https://nodesecurity.io/advisories/496'} | null |
GHSA | GHSA-hqqv-9x3v-mp7w | Privilege Escalation Flaw in Elasticsearch | The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges. | {'CVE-2020-7014'} | 2021-03-18T19:27:20Z | 2021-03-18T19:27:20Z | MODERATE | 8.8 | {'CWE-269', 'CWE-266'} | {'https://github.com/advisories/GHSA-hqqv-9x3v-mp7w', 'https://security.netapp.com/advisory/ntap-20200619-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7014', 'https://www.elastic.co/community/security/'} | null |
GHSA | GHSA-582f-p4pg-xc74 | Regular Expression Denial of Service in csv-parse | Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.
## Recommendation
Upgrade to version 4.4.6 or later. | {'CVE-2019-17592'} | 2022-01-04T19:51:33Z | 2019-10-15T20:06:16Z | HIGH | 7.5 | {'CWE-20', 'CWE-400'} | {'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a', 'https://github.com/advisories/GHSA-582f-p4pg-xc74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://security.netapp.com/advisory/ntap-20191127-0002/', 'https://www.npmjs.com/advisories/1171'} | null |
GHSA | GHSA-xh8g-j88w-6v59 | Malicious Package in cionstring | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:57:23Z | 2020-09-03T19:42:16Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-xh8g-j88w-6v59', 'https://www.npmjs.com/advisories/1381'} | null |
GHSA | GHSA-x24j-87x9-jvv5 | Improper Authorization in Publify | In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only. | {'CVE-2021-25973'} | 2022-04-19T19:03:25Z | 2021-11-03T17:34:22Z | MODERATE | 6.5 | {'CWE-863', 'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e', 'https://github.com/advisories/GHSA-x24j-87x9-jvv5'} | null |
GHSA | GHSA-xmw9-q7x9-j5qc | Unbounded connection acceptance leads to file handle exhaustion | ### Impact
All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected.
Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections.
The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open.
### Patches
The issue is fixed in version 0.14.15 for `NIO1SocketServerGroup`. A `maxConnections` parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number.
The `NIO2SocketServerGroup` has no such setting and is now deprecated.
### Workarounds
* An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure.
* A similar sidecar strategy is viable for other non-HTTP services running on blaze-core.
* http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake.
* http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake.
* http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http4s/blaze](http://github.com/http4s/blaze)
* Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy) | {'CVE-2021-21293'} | 2021-02-09T18:51:29Z | 2021-02-02T21:42:49Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1', 'https://github.com/advisories/GHSA-xmw9-q7x9-j5qc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'} | null |
GHSA | GHSA-22gh-3r9q-xf38 | Lacking Protection against HTTP Request Smuggling in mitmproxy | ### Impact
In mitmproxy 7.0.2 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization.
Unless you use mitmproxy to protect an HTTP/1 service, no action is required.
### Patches
The vulnerability has been fixed in mitmproxy 7.0.3 and above.
### Acknowledgements
We thank João Sobral (@chinchila) for responsibly disclosing this vulnerability to the mitmproxy team.
### Timeline
- **2021-09-08**: Received initial report for mitmproxy <= 6.0.2.
- **2021-09-08**: Requested clarification if 7.x is affected.
- **2021-09-10**: Received additional details, 7.x situation still unclear.
- **2021-09-13**: Internally determined that 7.x is also affected.
- **2021-09-13**: Shared initial fix with researcher.
- **2021-09-14**: Received confirmation that fix is working, but H2.TE/H2.CL should also be looked at.
- **2021-09-14**: Shared revised fix that includes additional H2.TE mitigations.
- **2021-09-14**: Received confirmation that revised fix is working.
- **2021-09-16**: Completed internal patch review.
- **2021-09-16**: Published patch release and advisory. | {'CVE-2021-39214'} | 2022-04-19T19:03:08Z | 2021-09-20T19:53:30Z | HIGH | 8.1 | {'CWE-444'} | {'https://github.com/advisories/GHSA-22gh-3r9q-xf38', 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39214'} | null |
GHSA | GHSA-jp6h-mxhx-pgqh | Shopware guest session is shared between customers | ### Impact
Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
### Security Plugin
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
### Disable HTTP Cache
Disabling HTTP Cache is also a valid workaround | {'CVE-2022-24745'} | 2022-03-24T00:22:08Z | 2022-03-10T17:28:55Z | MODERATE | 4.8 | {'CWE-384'} | {'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.1646933116-1088482757.1646933116', 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh', 'https://github.com/advisories/GHSA-jp6h-mxhx-pgqh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24745'} | null |
GHSA | GHSA-vwpg-f6gw-rjvf | Incorrect Authorization in Spring Cloud Netflix Zuul | Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing. | {'CVE-2021-22113'} | 2021-05-10T15:18:50Z | 2021-05-10T15:18:50Z | MODERATE | 0 | {'CWE-863'} | {'https://github.com/advisories/GHSA-vwpg-f6gw-rjvf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113', 'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'} | null |
GHSA | GHSA-xgxc-v2qg-chmh | Directory Traversal in Django | In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. | {'CVE-2021-28658'} | 2021-05-29T00:14:17Z | 2021-04-08T18:11:48Z | MODERATE | 5.3 | {'CWE-22'} | {'https://security.netapp.com/advisory/ntap-20210528-0001/', 'https://pypi.org/project/Django/', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'https://www.djangoproject.com/weblog/2021/apr/06/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html', 'https://github.com/advisories/GHSA-xgxc-v2qg-chmh'} | null |
GHSA | GHSA-34r7-q49f-h37c | Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js | Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification.
## Recommendation
Upgrade UglifyJS to version >= 2.4.24. | {'CVE-2015-8857'} | 2021-10-29T14:15:03Z | 2017-10-24T18:33:36Z | CRITICAL | 9.8 | {'CWE-1254'} | {'https://github.com/mishoo/UglifyJS2/issues/751', 'https://nodesecurity.io/advisories/39', 'https://www.npmjs.com/advisories/39', 'http://www.securityfocus.com/bid/96410', 'https://github.com/advisories/GHSA-34r7-q49f-h37c', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857', 'https://zyan.scripts.mit.edu/blog/backdooring-js/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'} | null |
GHSA | GHSA-3cpj-mj3q-82wr | Malicious Package in bs58chek | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:49:46Z | 2020-09-04T16:49:43Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1376', 'https://github.com/advisories/GHSA-3cpj-mj3q-82wr'} | null |
GHSA | GHSA-5635-9mvj-r6hp | Malicious Package in vue-backbone | Version 0.1.2 of `vue-backbone` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2021-09-30T22:08:22Z | 2020-09-03T02:34:39Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/945', 'https://github.com/advisories/GHSA-5635-9mvj-r6hp'} | null |
GHSA | GHSA-69j6-29vr-p3j9 | Authentication bypass for viewing and deletions of snapshots | Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly.
## CVE-2021-39226 Snapshot authentication bypass
### Summary
CVSS Score: 9.8 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability.
### Impact
Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths:
* `/dashboard/snapshot/:key`, or
* `/api/snapshots/:key`
If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path:
* `/api/snapshots-delete/:deleteKey`
Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths:
* `/api/snapshots/:key`, or
* `/api/snapshots-delete/:deleteKey`
The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.
### Attack audit
While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment.
#### Through reverse proxy/load balancer logs
To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK).
For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`.
#### Through the Grafana Enterprise audit feature
If you enabled “Log web requests” in your configuration with `router_logging = true`, look for
`"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`.
### Patched versions
Release 8.1.6:
- [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/)
Release 7.5.11:
- [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/)
### Solutions and mitigations
Download and install the appropriate patch for your version of Grafana.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
### Workaround
If for some reason you cannot upgrade:
You can use a reverse proxy or similar to block access to the literal paths
* `/api/snapshots/:key`
* `/api/snapshots-delete/:deleteKey`
* `/dashboard/snapshot/:key`
* `/api/snapshots/:key`
They have no normal function and can be disabled without side effects.
### Timeline and postmortem
Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
* 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication
* 2021-09-15 15:56: Initial reproduction
* 2021-09-15 17:10: MEDIUM severity declared
* 2021-09-15 18:58: Workaround deployed on Grafana Cloud
* 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well
* 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud
* 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more.
* 2021-09-16 09:35: HIGH severity declared
* 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS
* 2021-09-16 11:19: CRITICAL declared
* 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited
* 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation
* 2021-09-23: Grafana Cloud instances updated
* 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo
* 2021-10-05 17:00: Public release
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index.
## Security announcements
We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements),
where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss).
## Acknowledgement
We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us. | {'CVE-2021-39226'} | 2022-04-19T19:03:09Z | 2021-10-05T20:24:02Z | HIGH | 7.3 | {'CWE-287'} | {'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/', 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9', 'http://www.openwall.com/lists/oss-security/2021/10/05/4', 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269', 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/', 'https://security.netapp.com/advisory/ntap-20211029-0008/', 'https://github.com/advisories/GHSA-69j6-29vr-p3j9'} | null |
GHSA | GHSA-h77f-xxx7-4858 | User impersonation due to incorrect handling of the login JWT | ### Impact
<!--_What kind of vulnerability is it? Who is impacted?_-->
This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still required to log in separately. If your credentials are saved, there is no risk of exposing your email or password.
### Patches
<!--_Has the problem been patched? What versions should users upgrade to?_-->
This was patched as part of https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 and https://github.com/GeyserMC/Geyser/commit/ab2f5b326fe590e09167e8b45b4b165ac06ecd13. if your Geyser version is `1.4.2-SNAPSHOT` or later, the issue has been addressed on your build.
### Workarounds
<!--_Is there a way for users to fix or remediate the vulnerability without upgrading?_-->
Geyser strongly recommends updating to fix this issue. If this isn't possible:
- Use online mode and don't save credentials in your Geyser configuration
- Use an additional authentication method on the Java server
### References
<!--_Are there any links users can visit to find out more?_-->
This was disclosed to us by a staff member over at Hive; you can read their disclosure here: https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY
### For more information
If you have any questions or comments about this advisory:
* Come talk to us over on our [Discord](https://discord.gg/geysermc) server in the [#development](https://discord.com/channels/613163671870242838/613170125696270357) channel
| {'CVE-2021-39177'} | 2022-04-19T19:03:07Z | 2021-09-07T23:04:04Z | HIGH | 7.4 | {'CWE-287'} | {'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858', 'https://github.com/advisories/GHSA-h77f-xxx7-4858', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY'} | null |
GHSA | GHSA-793h-6f7r-6qvm | Authenticated users can read data from other sources than intended | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. | {'CVE-2021-26920'} | 2021-09-27T18:52:58Z | 2021-08-13T15:21:50Z | MODERATE | 6.5 | {'CWE-863'} | {'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/02/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26920', 'https://github.com/advisories/GHSA-793h-6f7r-6qvm', 'https://lists.apache.org/thread.html/r29e45561343cc5cf7d3290ee0b0e94e565faab19c20d022df9b5e29c%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d@%3Cdev.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/24/1', 'https://lists.apache.org/thread.html/r61aab724cf97d80da7f02d50e9af6de5c7c40dd92dab7518746fbaa2@%3Cannounce.apache.org%3E'} | null |
GHSA | GHSA-3wj8-vp9h-rm6m | Remote Code Execution (RCE) | The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | {'CVE-2021-23344'} | 2021-03-19T21:32:20Z | 2021-03-19T21:32:20Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04', 'https://github.com/advisories/GHSA-3wj8-vp9h-rm6m'} | null |
GHSA | GHSA-3fw4-4h3m-892h | OS Command Injection in serial-number | serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation. | {'CVE-2019-10804'} | 2021-04-13T15:22:19Z | 2021-04-13T15:22:19Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-3fw4-4h3m-892h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10804', 'https://github.com/es128/serial-number/blob/master/index.js#L106', 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010'} | null |
GHSA | GHSA-x4qx-4fjv-hmw6 | Integer overflow leading to crash in Tensorflow | ### Impact
The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseCountSparseOutput(
indices=[[1,1]],
values=[2],
dense_shape=[2 ** 31, 2 ** 32],
weights=[1],
binary_output=True,
minlength=-1,
maxlength=-1,
name=None)
```
### Patches
We have patched the issue in GitHub commit [6f4d3e8139ec724dbbcb40505891c81dd1052c4a](https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia. | {'CVE-2022-21738'} | 2022-02-11T16:22:50Z | 2022-02-09T23:45:09Z | MODERATE | 6.5 | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21738', 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a', 'https://github.com/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273'} | null |
GHSA | GHSA-99cv-8cvv-666c | High severity vulnerability that affects apache-airflow | In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. | {'CVE-2018-20244'} | 2021-09-07T21:12:56Z | 2019-03-06T17:35:58Z | MODERATE | 5.5 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20244', 'https://lists.apache.org/thread.html/f656fddf9c49293b3ec450437c46709eb01a12d1645136b2f1b8573b@%3Cdev.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-99cv-8cvv-666c', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'} | null |
GHSA | GHSA-xhv5-w9c5-2r2w | Unbounded connection acceptance in http4s-blaze-server | ### Impact
blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections.
http4s provides a general `MaxActiveRequests` middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open.
### Patches
In 0.21.18, 0.22.0-M3, and 1.0.0-M16, a new`maxConnections` property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended.
The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22.
The connections are bounded in 0.21.17, 0.22.0-M2, and 1.0.0-M14, but the `maxConnections` parameter was passed incorrectly, making it impossible to change the Blaze default of 512.
### Workarounds
* An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure.
* http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake.
* http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake.
* http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake.
### References
See [the Blaze GHSA](https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc) for more on the underlying issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http4s/http4s](http://github.com/http4s/http4s)
* Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy) | {'CVE-2021-21294'} | 2021-02-09T18:51:45Z | 2021-02-02T21:42:56Z | HIGH | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/advisories/GHSA-xhv5-w9c5-2r2w', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'} | null |
GHSA | GHSA-mq76-m7gv-xhfm | Downloads Resources over HTTP in sauce-connect | Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`.
## Recommendation
No patch is currently available for this vulnerability, and this package has not been updated since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10599'} | 2021-01-08T18:26:42Z | 2019-02-18T23:34:00Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/186', 'https://www.npmjs.com/advisories/186', 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599'} | null |
GHSA | GHSA-g4rf-pc26-6hmr | OMERO webclient does not validate URL redirects on login or switching group. | ### Background
OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.redirect_allowed_hosts`` setting.
### Impact
OMERO.web before 5.9.0
### Patches
5.9.0
### Workarounds
No workaround
### References
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [omero-web](https://github.com/ome/omero-web)
* Email us at [security](mailto:security@openmicroscopy.org.uk) | {'CVE-2021-21377'} | 2021-03-29T17:37:03Z | 2021-03-23T15:26:49Z | MODERATE | 0 | {'CWE-601'} | {'https://www.openmicroscopy.org/security/advisories/2021-SV2/', 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21377'} | null |
GHSA | GHSA-cr3q-pqgq-m8c2 | Spoofing attack in swagger-ui | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | {'CVE-2018-25031'} | 2022-04-12T15:06:16Z | 2022-03-12T00:00:36Z | MODERATE | 4.3 | {'CWE-20'} | {'https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://github.com/swagger-api/swagger-ui/pull/7697', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/advisories/GHSA-cr3q-pqgq-m8c2'} | null |
GHSA | GHSA-8hrq-9wm7-v3jw | Malicious Package in btffer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T20:53:27Z | 2020-09-03T21:39:41Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1231', 'https://github.com/advisories/GHSA-8hrq-9wm7-v3jw'} | null |
GHSA | GHSA-vh5w-fg69-rc8m | Improper Input Validation in Google Closure Library | A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315. | {'CVE-2020-8910'} | 2021-05-07T16:06:34Z | 2021-05-07T16:06:34Z | MODERATE | 6.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://github.com/google/closure-library/releases/tag/v20200315', 'https://github.com/advisories/GHSA-vh5w-fg69-rc8m'} | null |
GHSA | GHSA-3v3c-r5v2-68ph | High severity vulnerability that affects private_address_check | The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery. | {'CVE-2017-0909'} | 2021-01-08T20:00:19Z | 2017-11-30T23:14:55Z | HIGH | 0 | {'CWE-184'} | {'https://github.com/jtdowney/private_address_check/pull/3', 'https://hackerone.com/reports/288950', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909', 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'} | null |
GHSA | GHSA-9frf-r7c7-j2vg | Out of bounds write in stackvector | An issue was discovered in the stackvector crate before 1.0.9 for Rust. There is an out-of-bounds write in StackVec::extend if size_hint provides certain anomalous data. | {'CVE-2021-29939'} | 2021-08-25T20:54:14Z | 2021-08-25T20:54:14Z | HIGH | 7.3 | {'CWE-787'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0048.html', 'https://github.com/Alexhuszagh/rust-stackvector/issues/2', 'https://github.com/advisories/GHSA-9frf-r7c7-j2vg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29939'} | null |
GHSA | GHSA-hph2-m3g5-xxv4 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39151](https://x-stream.github.io/CVE-2021-39151.html).
### Credits
Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39151'} | 2022-04-22T15:42:56Z | 2021-08-25T14:47:09Z | HIGH | 8.5 | {'CWE-434', 'CWE-502'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39151.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://github.com/advisories/GHSA-hph2-m3g5-xxv4', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-jj9h-mwhq-8vhm | Moderate severity vulnerability that affects org.apache.qpid:qpid-broker | PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception. | {'CVE-2016-3094'} | 2021-09-14T19:44:50Z | 2018-10-16T19:50:13Z | MODERATE | 5.9 | {'CWE-287', 'CWE-20'} | {'https://github.com/advisories/GHSA-jj9h-mwhq-8vhm', 'https://issues.apache.org/jira/browse/QPID-7271', 'http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html', 'http://www.securityfocus.com/archive/1/538507/100/0/threaded', 'https://svn.apache.org/viewvc?view=revision&revision=1744403', 'http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html', 'http://www.securitytracker.com/id/1035982', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3094', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E'} | null |
GHSA | GHSA-4rm3-4mq4-mfwr | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful. | {'CVE-2018-20595'} | 2021-09-01T18:36:40Z | 2019-01-04T17:43:22Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20595', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr'} | null |
GHSA | GHSA-4jhw-2p6j-5wmp | Open Redirection in Login Handling |
### Problem
It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability.
### Solution
Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001) | {'CVE-2021-21338'} | 2022-04-19T19:02:51Z | 2021-03-23T01:53:35Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-4jhw-2p6j-5wmp', 'https://typo3.org/security/advisory/typo3-core-sa-2021-001', 'https://packagist.org/packages/typo3/cms-core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21338', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'} | null |
GHSA | GHSA-5xjx-4xcm-hpcm | Prototype Pollution in ts-nodash | `ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input. | {'CVE-2021-23403'} | 2021-12-10T18:53:42Z | 2021-12-10T18:53:42Z | HIGH | 7.3 | {'CWE-1321', 'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://github.com/advisories/GHSA-5xjx-4xcm-hpcm'} | null |
GHSA | GHSA-rf6r-2c4q-2vwg | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). | {'CVE-2020-10968'} | 2021-10-21T21:10:55Z | 2020-05-15T18:58:54Z | HIGH | 8.8 | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-rf6r-2c4q-2vwg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10968', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2662', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
GHSA | GHSA-c6c4-jmqx-3r33 | Open Redirect in xdLocalStorage | An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends. | {'CVE-2020-11611'} | 2022-04-19T19:03:27Z | 2021-12-09T19:30:14Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-c6c4-jmqx-3r33', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11611', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client'} | null |
GHSA | GHSA-mwp6-j9wf-968c | Critical severity vulnerability that affects generator-jhipster | Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html
| null | 2022-04-19T19:02:30Z | 2019-09-13T21:33:25Z | CRITICAL | 9.8 | {'CWE-338'} | {'https://github.com/advisories/GHSA-j3rh-8vwq-wh84', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/advisories/GHSA-mwp6-j9wf-968c'} | null |
GHSA | GHSA-g7mw-5cq6-fv82 | Cross-Site Scripting in wangeditor | All versions of `wangeditor` are vulnerable to Cross-Site Scripting. The package fails to properly encode output, allowing arbitrary JavaScript to be inserted in links and executed by browsers.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-27T21:00:39Z | 2020-09-02T21:20:40Z | HIGH | 0 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-WANGEDITOR-174536', 'https://www.npmjs.com/advisories/876', 'https://github.com/advisories/GHSA-g7mw-5cq6-fv82', 'https://github.com/wangfupeng1988/wangEditor/issues/1945'} | null |
GHSA | GHSA-c6rp-xvqv-mwmf | Cross-site Scripting in epubjs | managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS. | {'CVE-2021-33040'} | 2022-01-21T23:52:17Z | 2022-01-21T23:52:17Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e', 'https://github.com/advisories/GHSA-c6rp-xvqv-mwmf', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'} | null |
GHSA | GHSA-952m-m83c-3xm6 | Open redirect in direct_mail | The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl. | {'CVE-2020-12699'} | 2021-05-24T16:58:37Z | 2021-05-24T16:58:37Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-952m-m83c-3xm6', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12699'} | null |
GHSA | GHSA-74xw-82v7-hmrm | Improper Input Validation in python-dbusmock | python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file. | {'CVE-2015-1326'} | 2021-08-03T17:42:37Z | 2019-04-23T16:04:36Z | HIGH | 8.8 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-1326', 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093', 'https://github.com/advisories/GHSA-74xw-82v7-hmrm'} | null |
GHSA | GHSA-rwg6-3fmj-w4wx | Hijacked Environment Variables in tkinter | The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16061'} | 2021-09-16T20:58:23Z | 2018-11-01T14:47:21Z | CRITICAL | 0 | {'CWE-506', 'CWE-433'} | {'https://www.npmjs.com/advisories/500', 'https://nodesecurity.io/advisories/500', 'https://github.com/advisories/GHSA-rwg6-3fmj-w4wx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061'} | null |
GHSA | GHSA-rrfw-hg9m-j47h | Signature Validation Bypass | ### Impact
An authentication bypass exists in the [goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) this library uses to determine if SAML assertions are genuine. An attacker could craft a SAML response that would appear to be valid but would not have been genuinely issued by the IDP.
### Patches
Version 0.4.2 bumps the dependency which should fix the issue.
### For more information
Please see [the advisory in goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7)
## Credits
The original vulnerability was discovered by @jupenur. Thanks to @russellhaering for the heads up. | null | 2022-04-19T19:02:35Z | 2021-05-24T16:59:42Z | CRITICAL | 0 | {'CWE-347'} | {'https://github.com/advisories/GHSA-rrfw-hg9m-j47h', 'https://github.com/crewjam/saml/security/advisories/GHSA-rrfw-hg9m-j47h'} | null |
GHSA | GHSA-q26w-wjj2-22vv | Cross-site scripting in Joplin | Joplin allows XSS via a LINK element in a note. | {'CVE-2020-28249'} | 2021-05-10T18:47:36Z | 2021-05-10T18:47:36Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/fhlip0/JopinXSS', 'https://github.com/advisories/GHSA-q26w-wjj2-22vv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'} | null |
GHSA | GHSA-5vcm-3xc3-w7x3 | Response Splitting from unsanitized headers | ### Impact
http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields:
* Header names (`Header.name`å
* Header values (`Header.value`)
* Status reason phrases (`Status.reason`)
* URI paths (`Uri.Path`)
* URI authority registered names (`URI.RegName`) (through 0.21)
The following backends render invalid carriage return, newline, or null characters in an unsafe fashion.
| | blaze-server | ember-server | blaze-client | ember-client | jetty-client |
|:---------------|:-------------|:-------------|:-------------|--------------|--------------|
| header names | ⚠ | ⚠ | ⚠ | ⚠ | ⚠ |
| header values | ⚠ | ⚠ | ⚠ | ⚠ | |
| status reasons | ⚠ | ⚠ | | | |
| URI paths | | | ⚠ | ⚠ | |
| URI regnames | | | ⚠ < 0.22 | ⚠ < 0.22 | |
For example, given the following service:
```scala
import cats.effect._
import org.http4s._
import org.http4s.dsl.io._
import org.http4s.server.blaze.BlazeServerBuilder
import scala.concurrent.ExecutionContext.global
object ResponseSplit extends IOApp {
override def run(args: List[String]): IO[ExitCode] =
BlazeServerBuilder[IO](global)
.bindHttp(8080)
.withHttpApp(httpApp)
.resource
.use(_ => IO.never)
val httpApp: HttpApp[IO] =
HttpApp[IO] { req =>
req.params.get("author") match {
case Some(author) =>
Ok("The real content")
.map(_.putHeaders(Header("Set-Cookie", s"author=${author}")))
case None =>
BadRequest("No author parameter")
}
}
}
```
A clean `author` parameter returns a clean response:
```sh
curl -i 'http://localhost:8080/?author=Ross'
```
```http
HTTP/1.1 200 OK
Content-Type: text/plain; charset=UTF-8
Set-Cookie: author=Ross
Date: Mon, 20 Sep 2021 04:12:10 GMT
Content-Length: 16
The real content
```
A malicious `author` parameter allows a user-agent to hijack the response from our server and return different content:
```sh
curl -i 'http://localhost:8080/?author=hax0r%0d%0aContent-Length:+13%0d%0a%0aI+hacked+you'
```
```http
HTTP/1.1 200 OK
Content-Type: text/plain; charset=UTF-8
Set-Cookie: author=hax0r
Content-Length: 13
I hacked you
```
### Patches
Versions 0.21.29, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following:
* If a status reasoon phrase is invalid, it is dropped. Rendering is optional per spec.
* If a header name is invalid in a request or response, the header is dropped. There is no way to generically sanitize a header without potentially shadowing a correct one.
* If a header value is invalid in a request or response, it is sanitized by replacing null (`\u0000`), carriage return (`\r`), and newline (`\n`) with space (` `) characters per spec.
* If a URI path or registered name is invalid in a request line, the client raises an `IllegalArgumentException`.
* If a URI registered name is invalid in a host header, the client raises an `IllegalArgumentException`.
### Workarounds
http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening.
Not all backends were affected: jetty-server, tomcat-server, armeria, and netty on the server; async-http-client, okhttp-client, armeria, and netty as clients.
### References
* https://owasp.org/www-community/attacks/HTTP_Response_Splitting
* https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](http://github.com/http4s/http4s)
* Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
| {'CVE-2021-41084'} | 2021-10-21T14:31:25Z | 2021-09-22T19:18:41Z | HIGH | 8.7 | {'CWE-918'} | {'https://github.com/advisories/GHSA-5vcm-3xc3-w7x3', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8', 'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084'} | null |
GHSA | GHSA-94m7-w873-6wwf | Malicious Package in modlibrary | Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-01T20:28:56Z | 2020-09-01T20:28:56Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/631', 'https://github.com/advisories/GHSA-94m7-w873-6wwf'} | null |
GHSA | GHSA-33h2-69j3-r336 | Out-of-bounds Read in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the cv::RBaseStream::readBlock function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 8-opencv-invalid-read-fread test case. | {'CVE-2017-12598'} | 2021-11-18T00:07:17Z | 2021-10-12T22:00:51Z | HIGH | 8.8 | {'CWE-125'} | {'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv-python/releases/tag/11', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12598', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/advisories/GHSA-33h2-69j3-r336'} | null |
GHSA | GHSA-jh37-772x-4hpw | Double free in algorithmica | An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. In the affected versions of this crate, `merge_sort::merge()` wildly duplicates and drops ownership of `T` without guarding against double-free. Due to such implementation, simply invoking `merge_sort::merge()` on `Vec<T: Drop>` can cause **double free** bugs.
| {'CVE-2021-31996'} | 2021-08-25T21:01:52Z | 2021-08-25T21:01:52Z | HIGH | 7.5 | {'CWE-415'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31996', 'https://github.com/advisories/GHSA-jh37-772x-4hpw', 'https://github.com/AbrarNitk/algorithmica/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0053.html'} | null |
GHSA | GHSA-v3r2-3fp4-rp46 | Prototype pollution in paypal-adaptive | paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | {'CVE-2020-7643'} | 2021-12-10T20:05:58Z | 2021-12-10T20:05:57Z | MODERATE | 4.2 | {'CWE-400'} | {'https://github.com/advisories/GHSA-v3r2-3fp4-rp46', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31', 'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643'} | null |
GHSA | GHSA-h2g5-2rhx-ffgj | Command injection in Weblate | Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release. | {'CVE-2022-24727'} | 2022-03-17T21:37:32Z | 2022-03-05T00:00:44Z | HIGH | 0 | {'CWE-77'} | {'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/advisories/GHSA-h2g5-2rhx-ffgj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'} | null |
GHSA | GHSA-f3pc-c2gf-hvgw | Malicious Package in requets | All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:10:10Z | 2020-09-02T21:13:14Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/868', 'https://github.com/advisories/GHSA-f3pc-c2gf-hvgw'} | null |
GHSA | GHSA-x752-qjv4-c4hc | Remote code injection in dompdf/dompdf | Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file). | {'CVE-2022-28368'} | 2022-04-15T16:49:28Z | 2022-04-04T00:00:55Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://github.com/dompdf/dompdf/pull/2808', 'https://github.com/advisories/GHSA-x752-qjv4-c4hc', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://github.com/dompdf/dompdf/issues/2598', 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://github.com/snyk-labs/php-goof', 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'} | null |
GHSA | GHSA-j9h8-phrw-h4fh | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39144](https://x-stream.github.io/CVE-2021-39144.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39144'} | 2022-04-22T15:43:41Z | 2021-08-25T14:48:19Z | HIGH | 8.5 | {'CWE-94', 'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39144.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39144', 'https://github.com/advisories/GHSA-j9h8-phrw-h4fh', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-xm6r-4466-mr74 | High severity vulnerability that affects com.orientechnologies:orientdb-core | OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request. | {'CVE-2017-11467'} | 2021-09-21T22:36:25Z | 2018-10-18T17:40:56Z | CRITICAL | 9.8 | {'CWE-269'} | {'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467', 'http://www.heavensec.org/?p=1703', 'https://github.com/advisories/GHSA-xm6r-4466-mr74'} | null |
GHSA | GHSA-r7q2-5gqg-6c7q | Moderate severity vulnerability that affects actionpack | The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | {'CVE-2011-2929'} | 2021-09-17T14:40:50Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929', 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'} | null |
GHSA | GHSA-v6cj-r88p-92rm | Buffer Overflow in centra | ## Denial of Service
### Impact
Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources.
### Patches
Version 2.4.0 resolves the issue by limiting the size of buffered response body.
### Workarounds
Attempting workarounds isn't recommended. Updating is preferred.
### For more information
If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra).
| null | 2021-09-20T15:40:54Z | 2019-09-30T19:31:59Z | HIGH | 7.3 | {'CWE-119'} | {'https://snyk.io/vuln/SNYK-JS-CENTRA-536073', 'https://github.com/advisories/GHSA-v6cj-r88p-92rm', 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'} | null |
GHSA | GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http | Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by the maintainer. However, not all Zend Framework 3.0.0 vulnerabilities exist in a Laminas Project release. | {'CVE-2021-3007'} | 2021-06-08T20:11:19Z | 2021-06-08T20:11:19Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/laminas/laminas-http/pull/48', 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md', 'https://github.com/advisories/GHSA-xx8f-qf9f-5fgw', 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/', 'https://github.com/laminas/laminas-http/releases/tag/2.14.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007', 'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'} | null |
GHSA | GHSA-788m-pj96-7w2c | Cross-Site Scripting in fomantic-ui | Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text.
## Recommendation
Upgrade to version 2.7.0 or later. | null | 2021-09-27T21:41:41Z | 2020-09-02T21:23:51Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0', 'https://github.com/advisories/GHSA-788m-pj96-7w2c', 'https://www.npmjs.com/advisories/885'} | null |
GHSA | GHSA-ghqm-pgxj-37gq | Moderate severity vulnerability that affects rails-html-sanitizer | Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | {'CVE-2015-7580'} | 2021-09-10T21:50:09Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2016/01/25/15', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://github.com/advisories/GHSA-ghqm-pgxj-37gq', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'} | null |
GHSA | GHSA-8f9f-pc5v-9r5h | Malicious takeover of previously owned ENS names | ### Impact
A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness.
### Patches
A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly deployed at [0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e](https://etherscan.io/address/0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e).
### Workarounds
Do not accept transfers of ENS domains from other users on the old registrar. | {'CVE-2020-5232'} | 2021-01-08T20:31:47Z | 2020-01-30T23:55:04Z | CRITICAL | 8.7 | {'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/advisories/GHSA-8f9f-pc5v-9r5h'} | null |
GHSA | GHSA-334p-wv2m-w3vp | Denial of service in Apache Xerces2 | XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework. | {'CVE-2009-2625'} | 2021-08-30T14:20:43Z | 2020-06-15T18:51:30Z | MODERATE | 0 | null | {'http://www.us-cert.gov/cas/techalerts/TA09-294A.html', 'https://rhn.redhat.com/errata/RHSA-2009-1637.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1', 'http://www.debian.org/security/2010/dsa-1984', 'http://secunia.com/advisories/37754', 'http://www.openwall.com/lists/oss-security/2009/10/26/3', 'http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html', 'http://www.us-cert.gov/cas/techalerts/TA10-012A.html', 'http://www.vupen.com/english/advisories/2009/3316', 'http://www.codenomicon.com/labs/xml/', 'http://www.mandriva.com/security/advisories?name=MDVSA-2009:209', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html', 'http://secunia.com/advisories/36180', 'http://secunia.com/advisories/37460', 'https://rhn.redhat.com/errata/RHSA-2009-1650.html', 'http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b', 'http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1', 'http://www.vupen.com/english/advisories/2009/2543', 'http://secunia.com/advisories/50549', 'https://rhn.redhat.com/errata/RHSA-2009-1200.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2625', 'https://rhn.redhat.com/errata/RHSA-2009-1201.html', 'http://secunia.com/advisories/38231', 'http://www.openwall.com/lists/oss-security/2009/10/23/6', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'http://www.ubuntu.com/usn/USN-890-1', 'https://snyk.io/vuln/SNYK-JAVA-XERCES-32014', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1', 'http://secunia.com/advisories/38342', 'http://secunia.com/advisories/37300', 'https://bugzilla.redhat.com/show_bug.cgi?id=512921', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html', 'http://secunia.com/advisories/36176', 'https://github.com/advisories/GHSA-334p-wv2m-w3vp', 'http://www.openwall.com/lists/oss-security/2009/10/22/9', 'http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html', 'https://rhn.redhat.com/errata/RHSA-2009-1649.html', 'http://secunia.com/advisories/43300', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'https://rhn.redhat.com/errata/RHSA-2009-1199.html', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520', 'http://www.vupen.com/english/advisories/2011/0359', 'http://rhn.redhat.com/errata/RHSA-2012-1232.html', 'http://www.redhat.com/support/errata/RHSA-2011-0858.html', 'http://www.securityfocus.com/archive/1/507985/100/0/threaded', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html', 'http://www.redhat.com/support/errata/RHSA-2009-1615.html', 'http://secunia.com/advisories/36199', 'https://rhn.redhat.com/errata/RHSA-2009-1636.html', 'http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html', 'http://marc.info/?l=bugtraq&m=125787273209737&w=2', 'http://www.cert.fi/en/reports/2009/vulnerability2009085.html', 'http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html', 'http://www.securityfocus.com/bid/35958', 'http://www.securitytracker.com/id?1022680', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://secunia.com/advisories/37671', 'http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h', 'http://rhn.redhat.com/errata/RHSA-2012-1537.html', 'http://www.networkworld.com/columnists/2009/080509-xml-flaw.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1', 'http://secunia.com/advisories/36162', 'http://www.openwall.com/lists/oss-security/2009/09/06/1'} | null |
GHSA | GHSA-gpvv-69j7-gwj8 | Path Traversal in pip | The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace. | {'CVE-2019-20916'} | 2022-04-21T15:43:34Z | 2021-06-09T17:35:04Z | HIGH | 7.5 | {'CWE-22'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html', 'https://github.com/advisories/GHSA-gpvv-69j7-gwj8', 'https://github.com/pypa/pip/issues/6413', 'https://github.com/pypa/pip/compare/19.1.1...19.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20916', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html'} | null |
GHSA | GHSA-pp74-39w2-v4w9 | Permissions bypass in pleaser | pleaseedit in pleaser before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack. | {'CVE-2021-31154'} | 2021-08-25T21:01:44Z | 2021-08-25T21:01:44Z | HIGH | 7.8 | {'CWE-59', 'CWE-340'} | {'https://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://github.com/advisories/GHSA-pp74-39w2-v4w9', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31154', 'https://gitlab.com/edneville/please', 'https://crates.io/crates/pleaser'} | null |
GHSA | GHSA-r628-mhmh-qjhw | Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning | ### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.
This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur.
By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite.
This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.
### Patches
3.2.3 || 4.4.15 || 5.0.7 || 6.1.2
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links.
```js
const tar = require('tar')
tar.x({
file: 'archive.tgz',
filter: (file, entry) => {
if (entry.type === 'SymbolicLink') {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves. | {'CVE-2021-32803'} | 2022-03-11T21:27:16Z | 2021-08-03T19:00:40Z | HIGH | 8.2 | {'CWE-23', 'CWE-22'} | {'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/package/tar', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://github.com/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/advisories/1771', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'} | null |
GHSA | GHSA-563h-697m-j7x5 | Malicious Package in device-mqtt | Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T19:18:58Z | 2020-09-03T19:18:58Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-563h-697m-j7x5', 'https://www.npmjs.com/advisories/1109'} | null |
GHSA | GHSA-62gr-4qp9-h98f | Regular Expression Denial of Service in Handlebars | Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. | {'CVE-2019-20922'} | 2022-02-10T20:38:22Z | 2022-02-10T20:38:22Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.npmjs.com/package/handlebars', 'https://www.npmjs.com/advisories/1300', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://github.com/advisories/GHSA-62gr-4qp9-h98f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922'} | null |
GHSA | GHSA-g6ww-v8xp-vmwg | Prototype pollution in pathval | A prototype pollution vulnerability affects all versions of package pathval under 1.1.1. | {'CVE-2020-7751'} | 2022-04-18T21:58:50Z | 2022-02-10T20:21:24Z | HIGH | 7.2 | {'CWE-20', 'CWE-1321'} | {'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7751', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926', 'https://github.com/advisories/GHSA-g6ww-v8xp-vmwg', 'https://github.com/chaijs/pathval/pull/58/files'} | null |
GHSA | GHSA-46c4-8wrp-j99v | Improper Validation and Sanitization in url-parse | Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks. | {'CVE-2020-8124'} | 2022-01-06T20:30:34Z | 2022-01-06T20:30:34Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-46c4-8wrp-j99v', 'https://hackerone.com/reports/496293', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'} | null |
GHSA | GHSA-c32w-3cqh-f6jx | Weak Password Recovery Mechanism for Forgotten Password | In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. | {'CVE-2021-25957'} | 2021-10-21T14:15:19Z | 2021-09-02T17:08:33Z | HIGH | 8.8 | {'CWE-640'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://github.com/advisories/GHSA-c32w-3cqh-f6jx', 'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'} | null |
GHSA | GHSA-rh6c-q938-3r9q | Moderate severity vulnerability that affects validator | The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI. | {'CVE-2013-7452'} | 2021-09-17T18:17:08Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-rh6c-q938-3r9q', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'} | null |
GHSA | GHSA-j3ff-xp6c-6gcc | Failure to validate signature during handshake | ### Impact
`@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process.
This may allow a man-in-the-middle to pose as other peers and get those peers banned.
### Patches
Users should upgrade to 4.1.2 or 5.0.3
### Workarounds
No workarounds, just patch upgrade
### References
https://github.com/ChainSafe/js-libp2p-noise/pull/130
| {'CVE-2022-24759'} | 2022-03-21T22:01:28Z | 2022-03-18T18:57:53Z | HIGH | 8.1 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24759', 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3', 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc', 'https://github.com/advisories/GHSA-j3ff-xp6c-6gcc', 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'} | null |
GHSA | GHSA-c7m7-4257-h698 | Prototype Pollution in templ8 | All versions of package templ8 up to and including 0.0.44 are vulnerable to Prototype Pollution via the parse function. | {'CVE-2020-7702'} | 2021-07-29T21:53:38Z | 2021-05-06T17:29:13Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-TEMPL8-598770', 'https://github.com/advisories/GHSA-c7m7-4257-h698', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7702'} | null |
DWF | GSD-2021-1000001 | Denial of service in tsMuxer version 2.6.16 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-26805. Reason: This candidate is a duplicate of CVE-2021-26805. Notes: All CVE users should reference CVE-2021-26805 instead of this candidate. | null | 2021-06-24T22:55:39.024188Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://github.com/justdan96/tsMuxer/issues/395'} | null |
DWF | GSD-2021-1000040 | update freeze attack in DroidScript version all versions | DroidScript, all versions, were removed from the Google store after allegations of malware and ad fraud surfaced from Google. It is reported that ad clicking activity did take place but that it was not as a direct result from DriodScript themselves. However due to the removal of DroidScript it is unlikely that many DroidScript based applications will receive security updates, creating a significant vulnerability (effectively an update freeze attack). | null | 2021-06-24T22:55:39.059064Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://groups.google.com/g/androidscript/c/Mbh5TZ6YYnA/m/GflwflqaDAAJ', 'https://twitter.com/droidscript/status/1385956513433456640?ref_src=twsrc%5Etfw%7Ctwcamp%5Eembeddedtimeline%7Ctwterm%5Eprofile%3Adroidscript%7Ctwgr%5EeyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfX0%3D%7Ctwcon%5Etimelinechrome&ref_url=https%3A%2F%2Fdroidscript.org%2Fnews-2%2F', 'https://droidscript.org/'} | null |
DWF | GSD-2021-1000000 | Denial of service(DoS) in GPAC version 0.8.0 | In GPAC GPAC version 0.8.0 a Denial of service(DoS) exists in the GPAC 0.8.0-e10d39d-master branch that can be attacked via a malicious image file resulting in DoS. An attacker can exploit this vulnerability by submitting a malicious media file that exploits this issue. This will result in a Denial of Service (DoS) when the application attempts to process the file.. | null | 2021-06-24T22:55:38.996515Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://github.com/gpac/gpac/issues/1485'} | null |
DWF | GSD-2021-1000007 | denial of service in parse_duration version up to 2.1.0 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29932. Reason: This candidate is a duplicate of CVE-2021-29932. Notes: All CVE users should reference CVE-2021-29932 instead of this candidate. | null | 2021-06-24T22:55:39.042010Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://github.com/zeta12ti/parse_duration/issues/21'} | null |
DWF | GSD-2021-1000010 | temporary file creation (CWE-379) in fabric-samples version Prior to commit 6bccc138887b3dbd9dc920bad200068b11066ef7 | In Hyperledger fabric-samples version Prior to commit 6bccc138887b3dbd9dc920bad200068b11066ef7 a temporary file creation (CWE-379) exists in the digibank.sh and magnetocorp.sh that can be attacked via Local resulting in Information disclosure of all environmental variables | null | 2021-06-24T22:55:39.043586Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://hackerone.com/bugs?report_id=1124005&subject=user', 'https://github.com/hyperledger/fabric-samples/pull/434', 'https://github.com/hyperledger/fabric-samples/pull/440'} | null |
DWF | GSD-2021-1000006 | Denial of Service in varnish-modules version 0.18.0 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-28543. Reason: This candidate is a duplicate of CVE-2021-28543. Notes: All CVE users should reference CVE-2021-28543 instead of this candidate. | null | 2021-06-24T22:55:39.041520Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://varnish-cache.org/security/VSV00006.html'} | null |
DWF | GSD-2021-1000051 | malware in "RotaJakiro" version all | A new Linux malware labeled "RotaJakiro" has been found for 64bit Linux. When run as a root user the program creates entries in systems to run binaries labeled:
/bin/systemd/systemd-daemon
/usr/lib/systemd/systemd-daemon
When run as a non root user it creates an autostart script$HOME/.config/au-tostart/gnomehelper.desktop
to run binaries labeled as:
$HOME/.dbus/sessions/session-dbus
$HOME/.gvfsd/.profile/gvfsd-helper
MD5 hashes of the binaries involved include:
MD5:1d45cd2c1283f927940c099b8fab593b
MD5:11ad1e9b74b144d564825d65d7fb37d6
MD5:5c0f375e92f551e8f2321b141c15c48f
MD5:64f6cfe44ba08b0babdd3904233c4857
The "RotaJakiro" malware interacts with command and control servers at the following domains on port 443, but using a custom protocol:
news.thaprior.net:443
blog.eduelects.com:443
cdn.mirror-codes.net:443
status.sublineover.net:443
For more details please see the Qihoo 360 Netlab blog posting. | null | 2021-06-24T22:55:39.065366Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/', 'https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/', 'https://news.ycombinator.com/item?id=26981886'} | null |
DWF | GSD-2021-1000005 | Buffer Overflow in VoIPmonitor sniffer version 27.5 | In VoIPmonitor VoIPmonitor sniffer version 27.5 a Buffer Overflow exists in the live sniffer feature that can be attacked via SIP resulting in RCE, DoS. | null | 2021-06-24T22:55:39.041024Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://www.voipmonitor.org/changelog-sniffer', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-03-voipmonitor-livesniffer-buffer-overflow', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-04-voipmonitor-staticbuild-memory-corruption-protection'} | null |
DWF | GSD-2021-1000009 | Replacement of bash script by an attacker to one that includes malicious commands in Codecov Bash uploader version All versions downloaded from Jan 2021 through April 2021. Because the attacker had control of the script the version # included in it cannot be trusted. | In Codecov Codecov Bash uploader version All versions downloaded from Jan 2021 through April 2021. Because the attacker had control of the script the version # included in it cannot be trusted. a Replacement of bash script by an attacker to one that includes malicious commands exists in the The Bash uploader script that can be attacked via Numerous victims downloaded and executed this script, resulting in Information disclosure is known, other impacts may have occurred (it is not clear if the script was only replaced once or multiple times) | null | 2021-06-24T22:55:39.042955Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://www.securityweek.com/codecov-bash-uploader-dev-tool-compromised-supply-chain-hack', 'https://about.codecov.io/security-update/', 'https://mobile.twitter.com/_fel1x/status/1383050036397871108', 'https://docs.codecov.io/docs/about-the-codecov-bash-uploader', 'https://www.reuters.com/technology/us-investigators-probing-breach-san-francisco-code-testing-company-firm-2021-04-16/'} | null |
DWF | GSD-2021-1000008 | Denial of Service in Leaf EV (car) version 2018 SV | In Nissan Leaf EV (car) version 2018 SV a Denial of Service exists in the Head Unit Display that can be attacked via Local Access resulting in Denial of Service (HUD being disabled). | null | 2021-06-24T22:55:39.042484Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://wwws.nightwatchcybersecurity.com/2021/03/14/local-denial-of-service-in-nissan-leaf-ev-2018-head-unit-display/'} | null |
DWF | GSD-2021-1000004 | Cross Site Scripting (XSS) in VoIPmonitor GUI version 24.55 | In VoIPmonitor VoIPmonitor GUI version 24.55 a Cross Site Scripting (XSS) exists in the VoIPmonitor GUI that can be attacked via SIP resulting in Privilege escalation. | null | 2021-06-24T22:55:39.040339Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://www.voipmonitor.org/changelog-gui?major=5', 'https://github.com/EnableSecurity/advisories/tree/master/ES2021-02-voipmonitor-gui-xss'} | null |
DWF | GSD-2021-1000189 | takeover by external entity in IRC Network version all current freenode hosts | The Freenode IRC Network, specifically freenode hosts, DNS name, etc. ("freenode ltd"), was sold to a third party, Andrew Lee. Recent operational changes have resulted in the majority (possibly all) of staff resigning and leaving due to concerns around data leakage and potential denial of service in the form of "you can ban your enemies" via line being offered to at least one individual (who refused it). The Freenode staff have formed a new IRC network called "libera.chat" (https://libera.chat/) that is effectively a replacement of Freenode. | null | 2021-06-24T22:55:39.130529Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://find-and-update.company-information.service.gov.uk/company/10308021/officers', 'https://twitter.com/ariadneconill/status/1392995496403341313', 'https://mastodon.sdf.org/@kline/106299403921451814', 'https://news.ycombinator.com/item?id=27286628', 'https://developers.slashdot.org/story/21/05/29/0224246/freenode-apologizes-as-prominent-open-source-projects-switch-to-libera-chat', 'https://news.ycombinator.com/item?id=14102030', 'https://freenode.net/news/post-mortem-may21', 'https://fuchsnet.ch/freenode-resign-letter.txt', 'https://www.kline.sh/', 'https://distfiles.dereferenced.org/stuff/rasengan-log.txt', 'https://news.ycombinator.com/item?id=14101538', 'https://distfiles.dereferenced.org/stuff/nirvana-log.txt', 'https://www.gentoo.org/news/2021/05/26/gentoo-freenode-channels-hijacked.html', 'https://gist.github.com/pushcx/ab2a1d5b1d18e964c581ef18ccb3a79f', 'https://lwn.net/Articles/857252/', 'https://archive.is/uHw1g', 'https://news.ycombinator.com/item?id=27207440'} | null |
DWF | GSD-2021-1000003 | CWE-379 in fabric-sdk-rest version All released versions (project is now archived) | In Hyperledger fabric-sdk-rest version All released versions (project is now archived) a CWE-379 exists in the packages/fabric-rest/fabric-rest-server script that can be attacked via Local resulting in File overwrite from a privileged user. | null | 2021-06-24T22:55:39.038758Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://jira.hyperledger.org/browse/FABR-10', 'https://github.com/hyperledger-archives/fabric-sdk-rest/blob/master/packages/fabric-rest/fabric-rest-server'} | null |
DWF | GSD-2021-1000002 | Local DoS in Velop version 2.1.13.200506 - unknown | In Linksys Velop version 2.1.13.200506 - unknown a Local DoS exists in the MQTT stack that can be attacked via Local network access resulting in Denial of Service. | null | 2021-06-24T22:55:39.025070Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://mjg59.dreamwidth.org/56106.html'} | null |
DWF | GSD-2021-1000188 | default search paths use Terraform Registry for custom providers in Terraform version 0.15.3 | In Hashicorp Terraform version 0.15.3 the default search paths use Terraform Registry for custom providers if they exist in the terraform plan which can be attacked via code processed by the CI/CD pipeline using "terraform plan" resulting in Remote code Execution, exfiltration of environmental variables, etc. | null | 2021-06-24T22:55:39.129915Z | 2021-05-31T15:39:45.031586Z | null | null | null | {'https://www.terraform.io/docs/language/modules/sources.html', 'https://alex.kaskaso.li/post/terraform-plan-rce', 'https://www.reddit.com/r/netsec/comments/nbj5m7/terraform_plan_rce/'} | null |
Go | GO-2020-0027 | null | After dropping and then elevating process privileges euid, guid, and groups
are not properly restored to their original values, allowing an unprivileged
user to gain membership in the root group.
| {'CVE-2018-6558'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/google/fscrypt/issues/77', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'} | null |
Go | GHSA-9m95-8hx6-7p9v | Improper input validation in umoci | ### Impact
umoci 0.4.6 and earlier can be tricked into modifying host files by
creating a malicious layer that has a symlink with the name "." (or
"/"). Because umoci deletes inodes if they change types, this results in
the rootfs directory being replaced with an attacker-controlled symlink.
Subsequent image layers will then be applied on top of the target of the
symlink (which could be any directory on the host filesystem the user
running umoci has access to).
While umoci does have defences against symlink-based attacks, they are
all implemented by resolving things relative to the rootfs directory --
if the rootfs itself is a symlink, umoci resolves it first.
This vulnerability affects both "umoci unpack" and "umoci raw unpack".
### Patches
This issue has been patched in umoci 0.4.7, see the references section
for the specific commit which fixed this vulnerability.
### Workarounds
Note that if you use umoci as an unprivileged user (using the --rootless
flag) then umoci will not be able to overwrite any files that your user
doesn't have access to. Other possible mitigations are to run umoci
under an LSM profile such as AppArmor or SELinux to restrict the level
of access it has outside of container image directories.
### References
* [oss-security public disclosure](https://www.openwall.com/lists/oss-security/2021/04/06/2)
* [patch](https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57)
### Credits
Thanks to Robin Peraglie from Cure53 for discovering and reporting this
vulnerability.
### For more information
If you have any questions or comments about this advisory
* Open an issue in <https://github.com/opencontainers/umoci>.
* Email us at <security@opencontainers.org>. | {'CVE-2021-29136'} | 2022-03-15T21:39:42Z | 2022-02-15T01:17:37Z | MODERATE | null | {'CWE-20'} | {'https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29136', 'http://www.openwall.com/lists/oss-security/2021/04/06/2', 'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'} | null |
Go | GHSA-4999-659w-mq36 | Authentication bypass issue in the Operator Console | During an internal security audit, we detected an authentication bypass issue in the Operator Console when an external IDP is enabled. The security issue has been reported internally. We have not observed this exploit in the wild or reported elsewhere in the community at large. All users are advised to upgrade ASAP.
### Impact
All users on release v0.12.2 and before are affected.
### Patches
This issue was fixed by PR https://github.com/minio/console/pull/1217, users should upgrade to latest release.
### Workarounds
Add `automountServiceAccountToken: false` to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the `CONSOLE_IDP_URL`, `CONSOLE_IDP_CLIENT_ID`, `CONSOLE_IDP_SECRET` and `CONSOLE_IDP_CALLBACK` environment variable and instead use the Kubernetes service account token.
### References
#1217 for more information on the fix and how it was fixed.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [console issues](https://github.com/minio/console/issues)
* Email us at [security@minio.io](mailto:security@minio.io)
| {'CVE-2021-41266'} | 2021-11-15T20:27:39Z | 2021-11-15T23:16:49Z | HIGH | null | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41266', 'https://github.com/minio/console/security/advisories/GHSA-4999-659w-mq36', 'https://github.com/minio/console/pull/1217', 'https://github.com/minio/console'} | null |
Go | GHSA-v9j4-cp63-qv62 | Tarslip in go-unarr | unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive. | {'CVE-2021-38197'} | 2021-08-30T21:24:59Z | 2021-09-01T18:32:02Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/gen2brain/go-unarr/issues/21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38197', 'github.com/gen2brain/go-unarr'} | null |
Go | GO-2021-0083 | null | TLS certificate verification is skipped when connecting to a MQTT server.
This allows an attacker who can MITM the connection to read, or forge,
messages passed between the client and server.
| {'CVE-2019-12496'} | 2021-04-14T12:00:00Z | 2021-04-14T12:00:00Z | null | null | null | {'https://github.com/hybridgroup/gobot/releases/tag/v1.13.0', 'https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f'} | null |
Go | GHSA-grfp-q2mm-hfp6 | Redirect URL matching ignores character casing | ### Impact
Before version v0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using `strings.ToLower` while they should have been compared with a simple string match:
1. Registering a client with allowed redirect URL `https://example.com/callback`
2. Performing OAuth2 flow and requesting redirect URL `https://example.com/CALLBACK`
3. Instead of an error (invalid redirect URL), the browser is redirected to `https://example.com/CALLBACK` with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). | {'CVE-2020-15234'} | 2021-11-19T14:43:47Z | 2021-05-24T17:00:05Z | MODERATE | null | {'CWE-20', 'CWE-601', 'CWE-178'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15234', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-grfp-q2mm-hfp6', 'https://github.com/ory/fosite'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.