schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-hfm2-fffh-v47v
2021-03-22T23:15:03Z
2021-03-29T20:58:01Z
null
['CVE-2019-1196']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:15:03Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}
1.4.0
GHSA-r577-4hq7-73qh
2021-09-15T18:29:18Z
2021-09-08T20:14:24Z
null
['CVE-2021-36162']
Remote Code Execution in Apache Dubbo
Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36162'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa351115a459e214b99ffcc52c35f33359f3370c547d9c6ba1a60037%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T17:55:48Z', 'nvd_published_at': '2021-09-07T10:15:00Z'}
1.4.0
GHSA-9j49-mfvp-vmhm
2021-08-25T19:28:31Z
2021-09-02T17:10:06Z
null
['CVE-2021-23406']
Code Injection in pac-resolver
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pac-resolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'degenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:28:31Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
1.4.0
GHSA-w873-xcqq-x922
2021-09-02T18:54:01Z
2021-09-01T18:37:24Z
null
['CVE-2020-19001']
Command Injection in Simiki
Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'simiki'}, 'ecosystem_specific': {'affected_functions': ['simiki.config.parse_config']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19001'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/issues/123'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/commit/45da0ab7c1e94b368cac22867e7ac9a42dbb9390'}, {'type': 'PACKAGE', 'url': 'https://github.com/tankywoo/simiki'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:13:07Z', 'nvd_published_at': '2021-08-27T19:15:00Z'}
1.4.0
GHSA-93q8-gq69-wqmw
2023-09-11T16:42:11Z
2021-09-20T20:20:09Z
null
['CVE-2021-3807']
Inefficient Regular Expression Complexity in chalk/ansi-regex
ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service when parsing invalid ANSI escape codes. **Proof of Concept** ```js import ansiRegex from 'ansi-regex'; for(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = "\u001B["+";".repeat(i*10000); ansiRegex().test(attack_str) var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms") } ``` The ReDOS is mainly due to the sub-patterns `[[\\]()#;?]*` and `(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8'}, {'type': 'WEB', 'url': 'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908'}, {'type': 'PACKAGE', 'url': 'https://github.com/chalk/ansi-regex'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221014-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T18:56:22Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
1.4.0
GHSA-28w5-j8xj-2xwc
2021-08-30T18:43:25Z
2021-09-01T18:36:44Z
null
['CVE-2021-36788']
Cross-site Scripting in the yoast_seo TYPO3 extension
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yoast-seo-for-typo3/yoast_seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'}, {'type': 'WEB', 'url': 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yoast/Yoast-SEO-for-TYPO3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:43:25Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
1.4.0
GHSA-3x4c-pq33-4w3q
2021-08-31T19:13:32Z
2021-09-01T18:25:27Z
null
['CVE-2021-39164']
Improper authorisation of members discloses room membership to non-members
### Impact Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. ### Patches Server administrators should upgrade to 1.41.1 or later. ### Workarounds Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the following endpoints: * `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter * `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39164'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/cb35df940a'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T19:13:32Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}
1.4.0
GHSA-whgm-jr23-g3j9
2021-09-07T21:02:12Z
2021-09-02T17:15:24Z
null
['CVE-2021-23424']
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ansi-html'}, 'ecosystem_specific': {'affected_functions': ['ansi-html.ansiHTML']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424'}, {'type': 'WEB', 'url': 'https://github.com/Tjatse/ansi-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tjatse/ansi-html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:50:45Z', 'nvd_published_at': '2021-08-18T17:15:00Z'}
1.4.0
GHSA-98vv-pw6r-q6q4
2023-09-04T16:54:28Z
2021-09-07T23:08:10Z
null
['CVE-2021-23437']
Uncontrolled Resource Consumption in pillow
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '8.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443'}]
{'cwe_ids': ['CWE-125', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T15:15:55Z', 'nvd_published_at': '2021-09-03T16:15:00Z'}
1.4.0
GHSA-q9mp-79cp-9g8j
2021-08-02T22:18:22Z
2021-09-02T22:00:09Z
null
['CVE-2019-20894']
Improper Authentication
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/issues/5312'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/7008'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}]
{'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:18:22Z', 'nvd_published_at': '2020-07-02T16:15:00Z'}
1.4.0
GHSA-4qw8-pgpr-p9mq
2021-09-15T18:30:14Z
2021-09-07T22:56:43Z
null
['CVE-2019-10095']
Bash command injection in Apache Zeppelin
bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd56389ba9cab30a6c976b9a4a6df0f85cbe8fba6a60a3cf6e3ba716b@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/1'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:11Z', 'nvd_published_at': '2021-09-02T17:15:00Z'}
1.4.0
GHSA-3c33-3465-fhx2
2021-07-26T19:20:01Z
2021-09-08T17:27:16Z
null
['CVE-2020-15877']
Exposure of Resource to Wrong Sphere in LibreNMS
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.65.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/11915'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}, {'type': 'WEB', 'url': 'https://community.librenms.org/c/announcements'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/compare/1.65...1.65.1'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/releases/tag/1.65.1'}, {'type': 'WEB', 'url': 'https://shielder.it/blog'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T19:20:01Z', 'nvd_published_at': '2020-07-21T17:15:00Z'}
1.4.0
GHSA-7xrj-f5rp-j55h
2021-08-25T19:32:59Z
2021-09-02T17:10:42Z
null
['CVE-2021-23429']
Uncontrolled Resource Consumption in transpile
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'transpile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23429'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/transpile'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774'}]
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:32:59Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
1.4.0
GHSA-f6jp-j6w3-w9hm
2022-08-15T20:07:11Z
2021-09-20T20:18:11Z
null
['CVE-2021-41303']
Apache Shiro vulnerable to a specially crafted HTTP request causing an authentication bypass
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41303'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T19:17:39Z', 'nvd_published_at': '2021-09-17T09:15:00Z'}
1.4.0
GHSA-32hw-3pvh-vcvc
2021-08-30T18:03:34Z
2021-09-01T18:40:56Z
null
['CVE-2021-27909']
XSS vulnerability on password reset page
### Impact For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-32hw-3pvh-vcvc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27909'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/942cb6992df619fdf1c181bfad9e25d5d4178b6f'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:03:34Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
1.4.0
GHSA-hw4v-5x4h-c3xm
2021-09-03T20:22:28Z
2021-09-01T18:22:48Z
null
['CVE-2021-39193']
Transaction validity oversight in pallet-ethereum
### Impact A bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. ### Patches Patches are applied in PR #465. ### Workarounds None. ### References Patch PR: https://github.com/paritytech/frontier/pull/465 ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Frontier repo](https://github.com/paritytech/frontier)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39193'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/465'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/dd112e'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}]
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:16:10Z', 'nvd_published_at': '2021-09-03T18:15:00Z'}
1.4.0
GHSA-g95p-88p4-76cm
2021-09-27T19:23:33Z
2021-09-27T20:17:39Z
null
['CVE-2021-28378']
Cross-site Scripting in Gitea
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28378'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/14898'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/14899'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/'}, {'type': 'WEB', 'url': 'https://github.com/PandatiX/CVE-2021-28378'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:23:33Z', 'nvd_published_at': '2021-03-15T06:15:00Z'}
1.4.0
GHSA-536p-4pcj-5mr9
2021-09-03T20:36:06Z
2021-09-02T17:10:52Z
null
['CVE-2021-38557']
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38557'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers'}, {'type': 'WEB', 'url': 'https://zerosecuritypenetrationtesting.com/?page_id=306'}]
{'cwe_ids': ['CWE-276', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:43:55Z', 'nvd_published_at': '2021-08-24T13:15:00Z'}
1.4.0
GHSA-25pr-6pr6-68v7
2021-09-02T16:35:00Z
2021-09-02T17:17:25Z
null
['CVE-2021-39109']
Path traversal in atlasboard
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.
[]
[{'package': {'ecosystem': 'npm', 'name': 'atlasboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/atlassian/atlasboard/src/master/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:35:00Z', 'nvd_published_at': '2021-09-01T06:15:00Z'}
1.4.0
GHSA-2rr5-8q37-2w7h
2021-09-28T18:46:02Z
2021-09-27T20:12:47Z
null
['CVE-2021-41098']
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
### Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.) ### Impact In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: - Nokogiri::XML::SAX::Parser - Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser - Nokogiri::XML::SAX::PushParser - Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser ### Mitigation JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.12.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-41098.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:20:23Z', 'nvd_published_at': '2021-09-27T20:15:00Z'}
1.4.0
GHSA-7f5c-rpf4-86p8
2021-08-26T17:12:06Z
2021-09-02T17:16:46Z
null
['CVE-2021-32822']
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hbs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32822'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillarjs/hbs'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/'}]
{'cwe_ids': ['CWE-200', 'CWE-538', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T17:12:06Z', 'nvd_published_at': '2021-08-16T19:15:00Z'}
1.4.0
GHSA-652h-xwhf-q4h6
2021-09-21T14:50:54Z
2021-09-21T16:50:46Z
null
['CVE-2020-26301']
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ssh2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}, {'type': 'PACKAGE', 'url': 'https://github.com/mscdex/ssh2'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ssh2'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:50:54Z', 'nvd_published_at': '2021-09-20T20:15:00Z'}
1.4.0
GHSA-rp65-9cf3-cjxr
2023-09-13T21:49:54Z
2021-09-20T20:47:31Z
null
['CVE-2021-3803']
Inefficient Regular Expression Complexity in nth-check
There is a Regular Expression Denial of Service (ReDoS) vulnerability in nth-check that causes a denial of service when parsing crafted invalid CSS nth-checks. The ReDoS vulnerabilities of the regex are mainly due to the sub-pattern `\s*(?:([+-]?)\s*(\d+))?` with quantified overlapping adjacency and can be exploited with the following code. **Proof of Concept** ```js // PoC.js var nthCheck = require("nth-check") for(var i = 1; i <= 50000; i++) { var time = Date.now(); var attack_str = '2n' + ' '.repeat(i*10000)+"!"; try { nthCheck.parse(attack_str) } catch(err) { var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms") } } ``` **The Output** ``` attack_str.length: 10003: 174 ms attack_str.length: 20003: 1427 ms attack_str.length: 30003: 2602 ms attack_str.length: 40003: 4378 ms attack_str.length: 50003: 7473 ms ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nth-check'}, 'ecosystem_specific': {'affected_functions': ['nth-check.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'}, {'type': 'WEB', 'url': 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/nth-check'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00023.html'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:15:09Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
1.4.0
GHSA-c8xp-8mf3-62h9
2021-09-03T21:40:39Z
2021-09-07T23:02:18Z
null
['CVE-2021-3761']
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values
Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues. ### Patches https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@cloudflare.com](security@cloudflare.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/pull/90'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0246'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'PACKAGE', 'url': 'github.com/cloudflare/cfrpki'}]
{'cwe_ids': ['CWE-295', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T21:40:39Z', 'nvd_published_at': '2021-09-09T14:15:00Z'}
1.4.0
GHSA-7q44-gfvq-6g93
2021-08-02T22:55:27Z
2021-09-08T17:27:45Z
null
['CVE-2020-18155']
SQL Injection in Subrion CMS
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18155'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/817'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/c29cd72d07ca8cf6eba6f6d4496ad97d0c4d2be9'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-16T17:37:00Z', 'nvd_published_at': '2021-07-14T20:15:00Z'}
1.4.0
GHSA-22gh-3r9q-xf38
2021-10-21T14:26:23Z
2021-09-20T19:53:30Z
null
['CVE-2021-39214']
Lacking Protection against HTTP Request Smuggling in mitmproxy
### Impact In mitmproxy 7.0.2 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless you use mitmproxy to protect an HTTP/1 service, no action is required. ### Patches The vulnerability has been fixed in mitmproxy 7.0.3 and above. ### Acknowledgements We thank João Sobral (@chinchila) for responsibly disclosing this vulnerability to the mitmproxy team. ### Timeline - **2021-09-08**: Received initial report for mitmproxy <= 6.0.2. - **2021-09-08**: Requested clarification if 7.x is affected. - **2021-09-10**: Received additional details, 7.x situation still unclear. - **2021-09-13**: Internally determined that 7.x is also affected. - **2021-09-13**: Shared initial fix with researcher. - **2021-09-14**: Received confirmation that fix is working, but H2.TE/H2.CL should also be looked at. - **2021-09-14**: Shared revised fix that includes additional H2.TE mitigations. - **2021-09-14**: Received confirmation that revised fix is working. - **2021-09-16**: Completed internal patch review. - **2021-09-16**: Published patch release and advisory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mitmproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39214'}, {'type': 'PACKAGE', 'url': 'https://github.com/mitmproxy/mitmproxy'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:30:53Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
1.4.0
GHSA-v9j4-cp63-qv62
2021-08-30T21:24:59Z
2021-09-01T18:32:02Z
null
['CVE-2021-38197']
Tarslip in go-unarr
unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gen2brain/go-unarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38197'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/issues/21'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/commit/239ec404d348280b50bbf671327709e8857fc5f4'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/releases/tag/v0.1.4'}, {'type': 'PACKAGE', 'url': 'github.com/gen2brain/go-unarr'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:24:59Z', 'nvd_published_at': '2021-08-08T16:15:00Z'}
1.4.0
GHSA-8r4g-cg4m-x23c
2021-12-20T22:16:43Z
2021-09-22T18:22:02Z
null
[]
Denial of Service in node-static
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudhead/node-static/pull/213'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudhead/node-static'}, {'type': 'WEB', 'url': 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1208'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-static'}]
{'cwe_ids': ['CWE-248', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T18:21:20Z', 'nvd_published_at': None}
1.4.0
GHSA-m9fq-c9hp-59g7
2021-09-24T13:08:49Z
2021-09-20T20:42:52Z
null
['CVE-2021-3785']
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:18:05Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
1.4.0
GHSA-2pfh-q76x-gwvm
2021-10-06T13:06:57Z
2021-09-23T23:16:38Z
null
['CVE-2021-3583']
Improper Input Validation and Command Injection in Ansible
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3583'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/74960'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://pypi.org/project/ansible/4.2.0/'}]
{'cwe_ids': ['CWE-20', 'CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T17:11:22Z', 'nvd_published_at': '2021-09-22T12:15:00Z'}
1.4.0
GHSA-qwpp-fgrj-h78q
2021-06-25T15:32:28Z
2021-09-08T17:59:46Z
null
['CVE-2021-32712']
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32712'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021'}]
{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:32:28Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
1.4.0
GHSA-rwh9-8xx8-4wfm
2021-09-30T18:31:21Z
2021-09-30T20:50:21Z
null
['CVE-2021-25959']
Cross-site Scripting in OpenCRX
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core-models'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencrx/opencrx'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T18:31:21Z', 'nvd_published_at': '2021-09-29T14:15:00Z'}
1.4.0
GHSA-cpq8-x35g-m439
2021-09-16T18:19:29Z
2021-09-20T20:43:15Z
null
['CVE-2021-3783']
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:19:29Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
1.4.0
GHSA-gjcg-vrxg-xmgv
2021-09-10T16:32:16Z
2021-09-10T17:54:01Z
null
['CVE-2021-39162']
Incorrect handling of H2 GOAWAY + SETTINGS frames
Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. ### Impact This can lead to a DoS in the presence of untrusted *upstream* servers. ### Patches 0.15.1 contains an upgraded envoy binary with this vulnerability patched. ### Workarounds If only trusted upstreams are configured, there is not substantial risk of this condition being triggered. ### References [envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8) [envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32780) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39162'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:32:16Z', 'nvd_published_at': '2021-09-09T22:15:00Z'}
1.4.0
GHSA-8c3f-x5f9-6h62
2021-08-26T14:39:22Z
2021-09-02T17:08:20Z
null
['CVE-2021-32830']
Command injection in @diez/generation
The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@diez/generation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32830'}, {'type': 'PACKAGE', 'url': 'https://github.com/diez/diez'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@diez/generation'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:09:43Z', 'nvd_published_at': '2021-08-17T18:15:00Z'}
1.4.0
GHSA-hv5f-73mr-7vvj
2021-10-06T13:08:14Z
2021-09-23T23:11:06Z
null
['CVE-2021-37860']
Cross-site Scripting in Mattermost
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.39.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37860'}, {'type': 'WEB', 'url': 'https://docs.mattermost.com/install/self-managed-changelog.html#release-v5-39-quality-release'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server/'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:23:33Z', 'nvd_published_at': '2021-09-22T17:15:00Z'}
1.4.0
GHSA-x6jv-5vfg-gm7x
2023-04-24T19:05:13Z
2021-09-01T18:35:52Z
null
['CVE-2021-21501']
Path traversal in ServiceCenter
Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/servicecomb-service-center'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21501'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-service-center/pull/788'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-service-center/commit/f4f44fe5d4a7e530ca8ee7c6f2c9e891ae8353c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/servicecomb-service-center'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/08/10/3'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:32:48Z', 'nvd_published_at': '2021-08-10T10:15:00Z'}
1.4.0
GHSA-jp7f-grcv-6mjf
2021-09-17T18:37:10Z
2021-09-20T19:53:42Z
null
['CVE-2021-39208']
Partial path traversal in sharpcompress
SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash: ```csharp public static void WriteEntryToDirectory(IEntry entry, string destinationDirectory, ExtractionOptions? options, Action<string, ExtractionOptions?> write) { string destinationFileName; string file = Path.GetFileName(entry.Key); string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory); ... throw new ExtractionException("Entry is trying to write a file outside of the destination directory."); } ``` If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. #### Impact Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SharpCompress'}, 'ecosystem_specific': {'affected_functions': ['WriteEntryToDirectory']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.29'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208'}, {'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/pull/614'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamhathcock/sharpcompress'}, {'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:37:10Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
1.4.0
GHSA-3jmw-c69h-426c
2021-08-30T22:03:39Z
2021-09-01T18:26:48Z
null
['CVE-2021-39133']
Cross-Site Request Forgery (CSRF) can run untrusted code on Rundeck server
### Impact A user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. ### Patches Available in Rundeck 3.4.3 and 3.3.14 ### Workarounds Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds. ### For more information If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39133'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T22:03:39Z', 'nvd_published_at': '2021-08-30T20:15:00Z'}
1.4.0
GHSA-j85q-whc9-g4p9
2021-08-16T23:13:12Z
2021-09-02T17:07:48Z
null
['CVE-2021-3678']
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-16T23:13:12Z', 'nvd_published_at': '2021-08-04T14:15:00Z'}
1.4.0
GHSA-2j58-pwwv-x666
2021-09-09T13:38:52Z
2021-09-09T17:10:35Z
null
['CVE-2021-23404']
Cross-Site Request Forgery in sqlite-web
This affects all versions of package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23404'}, {'type': 'PACKAGE', 'url': 'https://github.com/coleifer/sqlite-web'}, {'type': 'WEB', 'url': 'https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:38:52Z', 'nvd_published_at': '2021-09-08T11:15:00Z'}
1.4.0
GHSA-jf9v-q8vh-3fmc
2021-09-09T14:17:19Z
2021-09-09T17:11:11Z
null
['CVE-2021-32106']
Cross-site scripting in ICEcoder
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32106'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/ICEcoder'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/icecoder/c/xcAc8_1UPxQ'}, {'type': 'WEB', 'url': 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:32:36Z', 'nvd_published_at': '2021-06-08T13:15:00Z'}
1.4.0
GHSA-fgxq-p49f-qw99
2021-08-31T21:02:23Z
2021-09-02T22:00:20Z
null
['CVE-2021-30483']
Directory Traversal in isomorphic-git
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'isomorphic-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30483'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/isomorphic-git/pull/1339'}, {'type': 'PACKAGE', 'url': 'https://github.com/isomorphic-git/isomorphic-git'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/28'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:05:52Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}
1.4.0
GHSA-h97f-5258-5593
2023-09-05T23:13:23Z
2021-09-01T18:32:22Z
null
['CVE-2021-38384']
Incorrect Authorization in serverless-offline
Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing `/` character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greater than expected permissions).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'serverless-offline'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38384'}, {'type': 'WEB', 'url': 'https://github.com/dherault/serverless-offline/issues/1259'}, {'type': 'PACKAGE', 'url': 'https://github.com/dherault/serverless-offline'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:31:00Z', 'nvd_published_at': '2021-08-10T18:15:00Z'}
1.4.0
GHSA-hf66-r44g-p7j9
2023-09-05T23:21:06Z
2021-09-30T17:10:46Z
null
['CVE-2021-23446']
Inefficient Regular Expression Complexity in handsontable
The package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in `Handsontable.helper.isNumeric` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'handsontable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/handsontable/issues/8752'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/handsontable/pull/8742'}, {'type': 'PACKAGE', 'url': 'https://github.com/handsontable/handsontable'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:50:57Z', 'nvd_published_at': '2021-09-29T17:15:00Z'}
1.4.0
GHSA-92v9-xh2q-fq9f
2022-12-03T04:00:48Z
2021-09-20T20:12:38Z
null
['CVE-2021-23442']
Prototype Pollution in cookiex/deep
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@cookiex/deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'}, {'type': 'WEB', 'url': 'https://github.com/tony-tsx/cookiex-deep/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'}, {'type': 'PACKAGE', 'url': 'https://github.com/tony-tsx/cookiex-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T19:26:16Z', 'nvd_published_at': '2021-09-17T10:15:00Z'}
1.4.0
GHSA-4hpq-rjcx-7vj9
2023-08-25T20:56:57Z
2021-09-13T20:05:09Z
null
['CVE-2021-23435']
Clearance Gem Open Redirect Vulnerability
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of `session[:return_to]`. If the value used for return_to contains multiple leading slashes (`/////example.com`) the user ends up being redirected to the external domain that comes after the slashes (`http://example.com`).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'clearance'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23435'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/clearance/pull/945'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4hpq-rjcx-7vj9'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/clearance/CVE-2021-23435.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/clearance'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:07:07Z', 'nvd_published_at': None}
1.4.0
GHSA-cfc2-wjcm-c8fm
2021-09-10T16:40:43Z
2021-09-10T17:54:25Z
null
['CVE-2021-39206']
Incorrect Authorization with specially crafted requests
Envoy, which Pomerium is based on, contains two authorization related vulnerabilities: - [CVE-2021-32777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32779): incorrectly transform a URL containing a `#fragment` element, causing a mismatch in path-prefix based authorization decisions. - [CVE-2021-32779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32777): incorrectly handle duplicate headers, dropping all but the last. This may lead to incorrect routing or authorization policy decisions. ### Impact With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. ### Patches Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. ### Workarounds - This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation. ### References [envoy GSA CVE-2021-32777](https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9) [envoy GSA CVE-2021-32779](https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.14.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.1'}]}], 'versions': ['0.15.0']}]
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h'}, {'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39206'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:40:43Z', 'nvd_published_at': '2021-09-09T23:15:00Z'}
1.4.0
GHSA-6hw5-6gcx-phmw
2021-09-16T18:57:24Z
2021-09-08T20:14:56Z
null
['CVE-2021-38698']
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic.
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.1'}, {'fixed': '1.10.2'}]}], 'versions': ['1.10.1']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38698'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/10824'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-24-consul-missing-authorization-check-on-txn-apply-endpoint/29026'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:00Z', 'nvd_published_at': '2021-09-07T12:15:00Z'}
1.4.0
GHSA-38fc-wpqx-33j7
2021-08-26T14:52:19Z
2021-09-02T17:15:42Z
null
['CVE-2021-23425']
Uncontrolled Resource Consumption in trim-off-newlines
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'trim-off-newlines'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23425'}, {'type': 'WEB', 'url': 'https://github.com/stevemao/trim-off-newlines/pull/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/stevemao/trim-off-newlines'}, {'type': 'WEB', 'url': 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:52:19Z', 'nvd_published_at': '2021-08-18T17:15:00Z'}
1.4.0
GHSA-838r-hvwh-24h8
2021-09-24T13:10:05Z
2021-09-13T20:06:31Z
null
['CVE-2021-38555']
XML Injection in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38555'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:31:01Z', 'nvd_published_at': '2021-09-11T11:15:00Z'}
1.4.0
GHSA-hhfg-6hfc-rvxm
2022-05-04T03:39:38Z
2021-09-29T17:15:55Z
null
['CVE-2021-3822']
Regular Expression Denial of Service in jsoneditor
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ecosystem_specific': {'affected_functions': ['getInnerText']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.5.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73'}]
{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:52:54Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
1.4.0
GHSA-68v9-3jjq-rvp4
2021-06-25T15:30:08Z
2021-09-08T18:00:40Z
null
['CVE-2021-32716']
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}]
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:30:08Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
1.4.0
GHSA-f794-r6xc-hf3v
2021-10-06T13:23:09Z
2021-09-29T17:18:32Z
null
['CVE-2021-41580']
Improper Access Control in passport-oauth2
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/pull/144'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredhanson/passport-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1'}, {'type': 'WEB', 'url': 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:14:20Z', 'nvd_published_at': '2021-09-27T07:15:00Z'}
1.4.0
GHSA-65p7-pjj8-ggmr
2021-09-23T21:14:22Z
2021-09-23T23:18:42Z
null
[]
Member account takeover
### Impact An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address. Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled. ### Patches Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible. Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible. ### Workarounds The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution. As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.18.0'}, {'fixed': '3.42.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.15.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:14:22Z', 'nvd_published_at': None}
1.4.0
GHSA-h73q-5wmj-q8pj
2023-08-15T18:54:22Z
2021-09-29T17:11:28Z
null
['CVE-2021-23445']
Cross site scripting in datatables.net
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'datatables.net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445'}, {'type': 'WEB', 'url': 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'}, {'type': 'WEB', 'url': 'https://cdn.datatables.net/1.11.3/'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataTables/Dist-DataTables'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00018.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T18:53:31Z', 'nvd_published_at': '2021-09-27T17:15:00Z'}
1.4.0
GHSA-cg3q-59w7-rvc2
2021-09-28T20:32:37Z
2021-09-29T17:12:51Z
null
['CVE-2021-3818']
Reliance on Cookies without Validation and Integrity Checking in getgrav/grav
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'}]
{'cwe_ids': ['CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:32:37Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
1.4.0
GHSA-9q5w-79cv-947m
2021-09-07T19:05:40Z
2021-09-07T23:10:56Z
null
['CVE-2021-39199']
Unsafe defaults in `remark-html`
### Impact The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks. ### Patches The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. ### Workarounds On older affected versions, pass `sanitize: true`, like so: ```diff - .use(remarkHtml) + .use(remarkHtml, {sanitize: true}) ``` ### References n/a ### For more information If you have any questions or comments about this advisory: * Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html) * Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'remark-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'remark-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.0.1'}]}], 'versions': ['14.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199'}, {'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/remarkjs/remark-html'}, {'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/remark-html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T19:05:40Z', 'nvd_published_at': '2021-09-07T19:15:00Z'}
1.4.0
GHSA-8v63-cqqc-6r2c
2022-08-11T21:52:14Z
2021-09-20T20:46:43Z
null
['CVE-2021-3805']
Prototype Pollution in object-path
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). The `del()` function fails to validate which Object properties it deletes. This allows attackers to modify the prototype of Object, causing the modification of default properties like `toString` on all objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['object-path.del']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:13:12Z', 'nvd_published_at': '2021-09-17T06:15:00Z'}
1.4.0
GHSA-7rp6-w7mg-h8rw
2021-09-17T18:29:23Z
2021-09-20T20:22:05Z
null
['CVE-2021-39239']
XML External Entity Reference in Apache Jena
A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239'}, {'type': 'PACKAGE', 'url': 'https://gitbox.apache.org/repos/asf?p=jena.git'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:29:23Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
1.4.0
GHSA-v39p-96qg-c8rf
2023-09-08T21:25:42Z
2021-09-01T18:37:11Z
null
['CVE-2021-23434']
Prototype Pollution in object-path
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition `currentPath === '__proto__'` returns false if `currentPath` is `['__proto__']`. This is because the `===` operator returns always false when the type of the operands is different.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path#0116'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path%230116'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453'}]
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:16:08Z', 'nvd_published_at': '2021-08-27T17:15:00Z'}
1.4.0
GHSA-grj5-8x6q-hc9q
2021-09-08T18:11:29Z
2021-09-02T22:00:40Z
null
['CVE-2021-36156']
Path traversal in Grafana Loki
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/loki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36156'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/pull/4020'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/pull/4020#issue-694377133'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/loki'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/releases/tag/v2.3.0'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:52:20Z', 'nvd_published_at': '2021-08-03T15:15:00Z'}
1.4.0
GHSA-vw47-mr44-3jf9
2021-09-21T14:54:49Z
2021-09-21T18:28:30Z
null
['CVE-2021-25740']
Confused Deputy in Kubernetes
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25740'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/103675'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211014-0001/'}]
{'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:54:49Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
1.4.0
GHSA-p9wf-3xpg-c9g5
2021-09-07T17:16:00Z
2021-09-02T17:11:13Z
null
['CVE-2021-39371']
XML External Entity Injection in PyWPS
An XML external entity (XXE) injection in PyWPS before 4.5.0 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pywps'}, 'ecosystem_specific': {'affected_functions': ['pywps.app.WPSRequest.WPSRequest._post_request', 'pywps.app.WPSRequest._get_dataelement_value', 'pywps.validator.complexvalidator.validategml', 'pywps.validator.complexvalidator.validategpx', 'pywps.validator.complexvalidator.validatexml', 'pywps.xml_util.fromstring', 'pywps.xml_util.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39371'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/issues/790'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pywps/pull/616'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pywps/commit/7d6b26a2e931df2feca0b7fb24f4d01610825aee'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/pywps'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html'}]
{'cwe_ids': ['CWE-611', 'CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:48:42Z', 'nvd_published_at': '2021-08-23T01:15:00Z'}
1.4.0
GHSA-7h6j-2268-fhcm
2022-07-16T04:16:14Z
2021-09-02T22:00:01Z
null
['CVE-2020-9321']
Improper Certificate Handling
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9321'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/6281'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.1.4'}]
{'cwe_ids': ['CWE-200', 'CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:19:23Z', 'nvd_published_at': '2020-03-16T19:15:00Z'}
1.4.0
GHSA-c77f-4rgj-jfr4
2021-09-27T18:58:23Z
2021-09-15T20:23:28Z
null
['CVE-2021-39391']
Cross-site Scripting in Beego
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'github.com/beego/beego/v2/nuget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4727'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}]
{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-15T18:12:59Z', 'nvd_published_at': '2021-09-14T18:15:00Z'}
1.4.0
GHSA-8vh3-29mr-m9xg
2021-08-30T21:53:31Z
2021-09-01T18:31:23Z
null
['CVE-2021-3680']
Inadequate Encryption Strength in showdoc
showdoc makes use of a hardcoded salt in its user password hash function
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3680'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/blob/fd1740234a12804b45af9cac3563567d83ba414d/server/Application/Home/Model/UserModel.class.php#L20'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2'}]
{'cwe_ids': ['CWE-326', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:53:31Z', 'nvd_published_at': '2021-08-04T13:15:00Z'}
1.4.0
GHSA-4jqc-8m5r-9rpr
2022-03-30T21:18:05Z
2021-09-13T20:09:36Z
null
['CVE-2021-23440']
Prototype Pollution in set-value
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value.validateKey']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'set-value-nuget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/pull/33'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/pull/33/commits/383b72d47c74a55ae8b6e231da548f9280a4296a'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/set-value'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:33:18Z', 'nvd_published_at': '2021-09-12T13:15:00Z'}
1.4.0
GHSA-jjcx-999m-35hc
2021-07-22T21:50:38Z
2021-09-08T17:27:07Z
null
['CVE-2019-14671']
Improper Input Validation in Firefly III
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.17.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.17.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/issues/2367'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T21:50:38Z', 'nvd_published_at': '2019-08-05T20:15:00Z'}
1.4.0
GHSA-4574-qv3w-fcmg
2021-08-30T19:17:39Z
2021-09-01T18:36:15Z
null
['CVE-2021-23420']
Deserialization of Untrusted Data in codeception/codeception
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeception/codeception'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'codeception/codeception'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/pull/6241'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codeception/Codeception'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52'}, {'type': 'WEB', 'url': 'https://github.com/JinYiTong/poc'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:17:39Z', 'nvd_published_at': '2021-08-11T13:15:00Z'}
1.4.0
GHSA-jphm-g89m-v42p
2021-08-30T23:21:48Z
2021-09-02T21:59:50Z
null
['CVE-2021-36157']
Path traversal in Grafana Cortex
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36157'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/pull/4375'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/commit/d9e1f81f40c607b9e97c2fc6db70ae54679917c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:31:56Z', 'nvd_published_at': '2021-08-03T15:15:00Z'}
1.4.0
GHSA-hqhp-5p83-hx96
2022-08-10T23:38:25Z
2021-09-20T20:44:48Z
null
['CVE-2021-3801']
prismjs Regular Expression Denial of Service vulnerability
Prism is a syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801'}, {'type': 'WEB', 'url': 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/prismjs/prism'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:29:46Z', 'nvd_published_at': '2021-09-15T13:15:00Z'}
1.4.0
GHSA-663j-rjcr-789f
2021-10-21T14:31:42Z
2021-09-30T20:50:07Z
null
['CVE-2021-25962']
CSV injection in shuup
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'shuup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'fixed': '2.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25962'}, {'type': 'WEB', 'url': 'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'}, {'type': 'PACKAGE', 'url': 'https://github.com/shuup/shuup'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'}]
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T18:33:24Z', 'nvd_published_at': '2021-09-29T14:15:00Z'}
1.4.0
GHSA-c32w-3cqh-f6jx
2021-10-21T14:15:19Z
2021-09-02T17:08:33Z
null
['CVE-2021-25957']
Weak Password Recovery Mechanism for Forgotten Password
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'}]
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:13:49Z', 'nvd_published_at': '2021-08-17T15:15:00Z'}
1.4.0
GHSA-wfrj-qqc2-83cm
2021-09-17T17:48:56Z
2021-09-20T19:52:41Z
null
[]
Remote command injection when using sendmail email transport
### Impact Sites using the `sendmail` transport as part of their `mail` config are vulnerable to remote command injection due to a [vulnerability](https://github.com/advisories/GHSA-48ww-j4fc-435p) in the `nodemailer` dependency. Ghost defaults to the `direct` transport so this is only exploitable if the `sendmail` transport is explicitly used. ### Patches Fixed in 4.15.0, all sites should upgrade as soon as possible. ### Workarounds * Use an alternative email transport as described in the [docs](https://ghost.org/docs/config/#mail). ### For more information If you have any questions or comments about this advisory: * email us at security@ghost.org
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.15.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-wfrj-qqc2-83cm'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/93e4b2eafd18bc8e4c17924e0824e73617e7940c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-48ww-j4fc-435p'}]
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:48:56Z', 'nvd_published_at': None}
1.4.0
GHSA-mf7q-gw5f-q8jj
2021-09-10T16:49:52Z
2021-09-07T22:55:56Z
null
['CVE-2021-27578']
Cross-site Scripting in Apache Zeppelin
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:10Z', 'nvd_published_at': '2021-09-02T17:15:00Z'}
1.4.0
GHSA-74j8-88mm-7496
2021-09-21T14:53:38Z
2021-09-21T18:28:21Z
null
['CVE-2020-8561']
Confused Deputy in Kubernetes
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8561'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/104720'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211014-0002/'}]
{'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:53:38Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
1.4.0
GHSA-jpwx-ffjq-wr4w
2021-09-03T20:10:38Z
2021-09-07T22:54:23Z
null
[]
Content object state fetch functions open to SQL injection
### Impact This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible. ### Patches The fix is distributed via Composer, see "Patched versions".
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-legacy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2018.06.0'}, {'fixed': '2019.03.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2019.03.5.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-legacy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2017.12.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2017.12.7.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-legacy'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:10:38Z', 'nvd_published_at': None}
1.4.0
GHSA-5wjf-62hw-q78r
2021-09-10T16:33:46Z
2021-09-10T17:54:13Z
null
['CVE-2021-39204']
Excessive CPU usage
Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. ### Impact This can result in a DoS condition. ### Patches Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched. ### Workarounds N/A ### References [envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc) [envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32778) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.1'}]}], 'versions': ['0.15.0']}]
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39204'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
{'cwe_ids': ['CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:33:46Z', 'nvd_published_at': '2021-09-09T22:15:00Z'}
1.4.0
GHSA-gh8j-2pgf-x458
2021-09-24T13:10:56Z
2021-09-13T20:05:51Z
null
['CVE-2021-40839']
Infinite Loop in rencode
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rencode'}, 'ecosystem_specific': {'affected_functions': ['rencode.dumps']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40839'}, {'type': 'WEB', 'url': 'https://github.com/aresch/rencode/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gh8j-2pgf-x458'}, {'type': 'PACKAGE', 'url': 'https://github.com/aresch/rencode'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/rencode/PYSEC-2021-345.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/rencode/#history'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2021/Sep/16'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0001/'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:11:37Z', 'nvd_published_at': '2021-09-10T02:15:00Z'}
1.4.0
GHSA-jj53-8fmw-f2w2
2021-08-31T17:46:08Z
2021-09-01T18:25:44Z
null
['CVE-2021-39163']
Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner.
### Impact Unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where: - the vulnerable homeserver is in the room; and - untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. ### Patches Server administrators should upgrade to 1.41.1 or higher. ### Workarounds Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the following endpoints: * `/_matrix/client/r0/groups/{group_id}/rooms` * `/_matrix/client/unstable/groups/{group_id}/rooms` ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39163'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/cb35df940a'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T17:46:08Z', 'nvd_published_at': '2021-08-31T16:15:00Z'}
1.4.0
GHSA-6675-wwqr-jhmf
2021-10-04T13:52:08Z
2021-09-30T17:12:56Z
null
['CVE-2020-20695']
Cross-site Scripting in GilaCMS
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20695'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/52'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:07Z', 'nvd_published_at': '2021-09-27T22:15:00Z'}
1.4.0
GHSA-2ghc-6v89-pw9j
2022-08-10T23:37:49Z
2021-09-14T20:25:35Z
null
['CVE-2021-3666']
body-parser-xml vulnerable to Prototype Pollution
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'body-parser-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666'}, {'type': 'WEB', 'url': 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}, {'type': 'PACKAGE', 'url': 'https://github.com/fiznool/body-parser-xml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:39:31Z', 'nvd_published_at': '2021-09-13T18:15:00Z'}
1.4.0
GHSA-6q3p-36f4-cwxv
2021-09-16T18:52:16Z
2021-09-20T20:45:21Z
null
['CVE-2020-21122']
Server-Side Request Forgery in UReport
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21122'}, {'type': 'WEB', 'url': 'https://github.com/youseries/ureport/issues/483'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:52:16Z', 'nvd_published_at': '2021-09-15T17:15:00Z'}
1.4.0
GHSA-xqp8-w826-hh6x
2022-08-11T16:55:01Z
2021-09-02T16:51:14Z
null
['CVE-2021-39187']
Parse Server crashes with query parameter
### Impact Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. ### Patches Upgrade to Parse Server 4.10.3
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/4.10.3'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3463'}]
{'cwe_ids': ['CWE-20', 'CWE-74', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:25:16Z', 'nvd_published_at': '2021-09-02T16:15:00Z'}
1.4.0
GHSA-fmm9-3gv8-58f4
2021-09-08T14:47:32Z
2021-09-07T23:08:40Z
null
['CVE-2021-39194']
Improper Handling of Missing Values in kaml
### Impact Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected. YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example: ```yaml !<x> ``` The following is a sample application that demonstrates this issue: ```kotlin import com.charleskorn.kaml.Yaml import kotlinx.serialization.SerialName import kotlinx.serialization.Serializable @Serializable private sealed class K { @Serializable @SerialName("x") data class X( val property: String? = null, ) : K() } const val s = """ !<x> """ fun main() { println("Started.") val result = Yaml.default.decodeFromString(K.serializer(), s) println("Finished, result is $result") } ``` On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns. ### Patches Version 0.35.3 or later contain the fix for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.charleskorn.kaml:kaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.35.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/issues/179'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/charleskorn/kaml/'}]
{'cwe_ids': ['CWE-230', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:02:13Z', 'nvd_published_at': '2021-09-07T20:15:00Z'}
1.4.0
GHSA-5vcm-3xc3-w7x3
2022-10-25T20:24:37Z
2021-09-22T19:18:41Z
null
['CVE-2021-41084']
Response Splitting from unsanitized headers
### Impact http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: * Header names (`Header.name`å * Header values (`Header.value`) * Status reason phrases (`Status.reason`) * URI paths (`Uri.Path`) * URI authority registered names (`URI.RegName`) (through 0.21) The following backends render invalid carriage return, newline, or null characters in an unsafe fashion. | | blaze-server | ember-server | blaze-client | ember-client | jetty-client | |:---------------|:-------------|:-------------|:-------------|--------------|--------------| | header names | ⚠ | ⚠ | ⚠ | ⚠ | ⚠ | | header values | ⚠ | ⚠ | ⚠ | ⚠ | | | status reasons | ⚠ | ⚠ | | | | | URI paths | | | ⚠ | ⚠ | | | URI regnames | | | ⚠ < 0.22 | ⚠ < 0.22 | | For example, given the following service: ```scala import cats.effect._ import org.http4s._ import org.http4s.dsl.io._ import org.http4s.server.blaze.BlazeServerBuilder import scala.concurrent.ExecutionContext.global object ResponseSplit extends IOApp { override def run(args: List[String]): IO[ExitCode] = BlazeServerBuilder[IO](global) .bindHttp(8080) .withHttpApp(httpApp) .resource .use(_ => IO.never) val httpApp: HttpApp[IO] = HttpApp[IO] { req => req.params.get("author") match { case Some(author) => Ok("The real content") .map(_.putHeaders(Header("Set-Cookie", s"author=${author}"))) case None => BadRequest("No author parameter") } } } ``` A clean `author` parameter returns a clean response: ```sh curl -i 'http://localhost:8080/?author=Ross' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=Ross Date: Mon, 20 Sep 2021 04:12:10 GMT Content-Length: 16 The real content ``` A malicious `author` parameter allows a user-agent to hijack the response from our server and return different content: ```sh curl -i 'http://localhost:8080/?author=hax0r%0d%0aContent-Length:+13%0d%0a%0aI+hacked+you' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=hax0r Content-Length: 13 I hacked you ``` ### Patches Versions 0.21.29, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following: * If a status reasoon phrase is invalid, it is dropped. Rendering is optional per spec. * If a header name is invalid in a request or response, the header is dropped. There is no way to generically sanitize a header without potentially shadowing a correct one. * If a header value is invalid in a request or response, it is sanitized by replacing null (`\u0000`), carriage return (`\r`), and newline (`\n`) with space (` `) characters per spec. * If a URI path or registered name is invalid in a request line, the client raises an `IllegalArgumentException`. * If a URI registered name is invalid in a host header, the client raises an `IllegalArgumentException`. ### Workarounds http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening. Not all backends were affected: jetty-server, tomcat-server, armeria, and netty on the server; async-http-client, okhttp-client, armeria, and netty as clients. ### References * https://owasp.org/www-community/attacks/HTTP_Response_Splitting * https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}, {'type': 'WEB', 'url': 'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}]
{'cwe_ids': ['CWE-74', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T16:10:13Z', 'nvd_published_at': '2021-09-21T18:15:00Z'}
1.4.0
GHSA-w6j8-jc36-x5q9
2021-09-01T18:19:02Z
2021-09-01T18:22:09Z
null
['CVE-2021-39166']
Improper Neutralization of Text-Values in Object Version Preview
Text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.1.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39166'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10170'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:19:02Z', 'nvd_published_at': '2021-09-01T14:15:00Z'}
1.4.0
GHSA-qhmp-h54x-38qr
2021-10-06T20:37:36Z
2021-09-20T20:57:02Z
null
['CVE-2021-39229']
CWE-730 Regex injection with IFTTT Plugin
### Impact Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service. ### Patches Update to Apprise v0.9.5.1 ```bash # Install Apprise v0.9.5.1 from PyPI pip install apprise==0.9.5.1 ``` The patch to the problem was performed [here](https://github.com/caronc/apprise/pull/436/files). ### Workarounds Alternatively, if upgrading is not an option, you can safely remove the following file: - `apprise/plugins/NotifyIFTTT.py` The above will eliminate the ability to use IFTTT, but everything else will work smoothly. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Apprise](https://github.com/caronc/apprise/issues) * Email me at [lead2gold@gmail.com](mailto:lead2gold@gmail.com) ### Additional Credit Github would not allow me to additionally credit **Rasmus Petersen**, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited ## Additional Notes: - Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39229'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/pull/436'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831'}, {'type': 'PACKAGE', 'url': 'https://github.com/caronc/apprise'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/releases/tag/v0.9.5.1'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:30:36Z', 'nvd_published_at': '2021-09-20T22:15:00Z'}
1.4.0
GHSA-jgrx-mgxx-jf9v
2022-08-10T23:37:11Z
2021-09-20T20:27:52Z
null
['CVE-2021-3777']
tmpl vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tmpl'}, 'ecosystem_specific': {'affected_functions': ['tmpl.tmpl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3777'}, {'type': 'WEB', 'url': 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/daaku/nodejs-tmpl'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:05:45Z', 'nvd_published_at': '2021-09-15T08:15:00Z'}
1.4.0
GHSA-p5w8-wqhj-9hhf
2021-09-21T14:51:46Z
2021-09-10T17:56:06Z
null
['CVE-2021-32839']
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)
### Impact The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. ### Patches The issues has been fixed in sqlparse 0.4.2. ### Workarounds Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool. ### References This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/). ### For more information If you have any questions or comments about this advisory: * Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues) * Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32839'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'}, {'type': 'PACKAGE', 'url': 'https://github.com/andialbrecht/sqlparse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2021-333.yaml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T17:13:29Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
1.4.0
GHSA-748f-wv76-x9hg
2021-07-13T15:53:15Z
2021-09-08T17:26:26Z
null
['CVE-2021-28931']
Arbitrary file upload in Fork CMS
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.9.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28931'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3351'}, {'type': 'WEB', 'url': 'https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/releases/tag/5.9.2'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T13:59:31Z', 'nvd_published_at': '2021-07-07T15:15:00Z'}
1.4.0
GHSA-xv7v-rf6g-xwrc
2021-09-30T16:49:05Z
2021-09-30T17:10:14Z
null
['CVE-2019-11831']
Directory Traversal in typo3/phar-stream-wrapper
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/phar-stream-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/36'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-psa-2019-007/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4445'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-007'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_22'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108302'}]
{'cwe_ids': ['CWE-22', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:49:05Z', 'nvd_published_at': '2019-05-09T04:29:00Z'}
1.4.0
GHSA-gqcf-83rq-gpfr
2021-09-14T18:35:35Z
2021-09-14T20:24:44Z
null
[]
Any storage file can be downloaded from p.sh if full server path is known
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/post-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/post-install/security/advisories/GHSA-gqcf-83rq-gpfr'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/post-install'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:35:35Z', 'nvd_published_at': None}
1.4.0
GHSA-x38q-xg2h-rxgx
2021-09-30T18:35:48Z
2021-09-23T23:14:28Z
null
['CVE-2020-23478']
Regular Expression Denial of Service in Leo Editor
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'leo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23478'}, {'type': 'WEB', 'url': 'https://github.com/leo-editor/leo-editor/issues/1597'}, {'type': 'PACKAGE', 'url': 'https://github.com/leo-editor/leo-editor/'}]
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:37:27Z', 'nvd_published_at': '2021-09-22T20:15:00Z'}
1.4.0
GHSA-5vp3-v4hc-gx76
2021-11-16T21:44:47Z
2021-09-15T20:23:17Z
null
['CVE-2021-41264']
UUPSUpgradeable vulnerability in @openzeppelin/contracts
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References [Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}, {'type': 'WEB', 'url': 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]
{'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T22:17:42Z', 'nvd_published_at': '2021-11-12T18:15:00Z'}
1.4.0
GHSA-wmpm-fq7r-jq56
2022-07-13T19:09:43Z
2021-09-02T22:05:17Z
null
['CVE-2021-23427']
Imporoper path validation in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.NetCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23427'}, {'type': 'PACKAGE', 'url': 'https://github.com/gordon-matt/elFinder.NetCore'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T18:03:43Z', 'nvd_published_at': '2021-09-01T15:15:00Z'}
1.4.0
GHSA-vpw5-grxx-v396
2022-07-13T18:55:15Z
2021-09-02T17:16:56Z
null
['CVE-2021-36793']
CSRF token exposure in TYPO3 extension
When using the CsrfTokenViewHelper the extension discloses the user's session identifier to HTML output without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance Cross Site Scripting in the frontend output.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lms/routes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36793'}, {'type': 'PACKAGE', 'url': 'https://github.com/Lacr1ma/routes'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-008'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:23:15Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
1.4.0
GHSA-36mj-6r7r-mqhf
2021-09-28T21:21:08Z
2021-09-29T17:09:23Z
null
[]
User can obtain JWT token even if account is disabled
Users can authenticate this way even if their user account is disabled. This is a high risk vulnerability when account disabling is used to block users' access to the system. (Someone who never had an account cannot exploit this vulnerability.) The fix ensures tokens are generated only for enabled user accounts, and is distributed via Composer as ezsystems/ezplatform-rest v1.3.8
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-36mj-6r7r-mqhf'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-007-jwt-auth-possible-for-disabled-users.-username-login-handler-can-t-be-disabled'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-rest'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:21:08Z', 'nvd_published_at': None}
1.4.0
GHSA-qh7x-j4v8-qw5w
2021-10-21T14:19:54Z
2021-09-22T20:39:26Z
null
['CVE-2021-41086']
Clipboard-based XSS
### Impact XSS against the user. ### Details jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS. ### References The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsuites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsuites/jsuites/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jsuites'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T21:50:39Z', 'nvd_published_at': '2021-09-21T21:15:00Z'}