schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-hfm2-fffh-v47v
|
2021-03-22T23:15:03Z
|
2021-03-29T20:58:01Z
| null |
['CVE-2019-1196']
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:15:03Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}
|
1.4.0
|
GHSA-r577-4hq7-73qh
|
2021-09-15T18:29:18Z
|
2021-09-08T20:14:24Z
| null |
['CVE-2021-36162']
|
Remote Code Execution in Apache Dubbo
|
Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36162'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa351115a459e214b99ffcc52c35f33359f3370c547d9c6ba1a60037%40%3Cdev.dubbo.apache.org%3E'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T17:55:48Z', 'nvd_published_at': '2021-09-07T10:15:00Z'}
|
1.4.0
|
GHSA-9j49-mfvp-vmhm
|
2021-08-25T19:28:31Z
|
2021-09-02T17:10:06Z
| null |
['CVE-2021-23406']
|
Code Injection in pac-resolver
|
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'pac-resolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'degenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:28:31Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
|
1.4.0
|
GHSA-w873-xcqq-x922
|
2021-09-02T18:54:01Z
|
2021-09-01T18:37:24Z
| null |
['CVE-2020-19001']
|
Command Injection in Simiki
|
Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'simiki'}, 'ecosystem_specific': {'affected_functions': ['simiki.config.parse_config']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2.1'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19001'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/issues/123'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/commit/45da0ab7c1e94b368cac22867e7ac9a42dbb9390'}, {'type': 'PACKAGE', 'url': 'https://github.com/tankywoo/simiki'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:13:07Z', 'nvd_published_at': '2021-08-27T19:15:00Z'}
|
1.4.0
|
GHSA-93q8-gq69-wqmw
|
2023-09-11T16:42:11Z
|
2021-09-20T20:20:09Z
| null |
['CVE-2021-3807']
|
Inefficient Regular Expression Complexity in chalk/ansi-regex
|
ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service when parsing invalid ANSI escape codes.
**Proof of Concept**
```js
import ansiRegex from 'ansi-regex';
for(var i = 1; i <= 50000; i++) {
var time = Date.now();
var attack_str = "\u001B["+";".repeat(i*10000);
ansiRegex().test(attack_str)
var time_cost = Date.now() - time;
console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
}
```
The ReDOS is mainly due to the sub-patterns `[[\\]()#;?]*` and `(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ansi-regex'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8'}, {'type': 'WEB', 'url': 'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908'}, {'type': 'PACKAGE', 'url': 'https://github.com/chalk/ansi-regex'}, {'type': 'WEB', 'url': 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221014-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T18:56:22Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
|
1.4.0
|
GHSA-28w5-j8xj-2xwc
|
2021-08-30T18:43:25Z
|
2021-09-01T18:36:44Z
| null |
['CVE-2021-36788']
|
Cross-site Scripting in the yoast_seo TYPO3 extension
|
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'yoast-seo-for-typo3/yoast_seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'}, {'type': 'WEB', 'url': 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yoast/Yoast-SEO-for-TYPO3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:43:25Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
|
1.4.0
|
GHSA-3x4c-pq33-4w3q
|
2021-08-31T19:13:32Z
|
2021-09-01T18:25:27Z
| null |
['CVE-2021-39164']
|
Improper authorisation of members discloses room membership to non-members
|
### Impact
Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room.
### Patches
Server administrators should upgrade to 1.41.1 or later.
### Workarounds
Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the following endpoints:
* `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter
* `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39164'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/cb35df940a'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T19:13:32Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}
|
1.4.0
|
GHSA-whgm-jr23-g3j9
|
2021-09-07T21:02:12Z
|
2021-09-02T17:15:24Z
| null |
['CVE-2021-23424']
|
Uncontrolled Resource Consumption in ansi-html
|
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ansi-html'}, 'ecosystem_specific': {'affected_functions': ['ansi-html.ansiHTML']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424'}, {'type': 'WEB', 'url': 'https://github.com/Tjatse/ansi-html/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tjatse/ansi-html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:50:45Z', 'nvd_published_at': '2021-08-18T17:15:00Z'}
|
1.4.0
|
GHSA-98vv-pw6r-q6q4
|
2023-09-04T16:54:28Z
|
2021-09-07T23:08:10Z
| null |
['CVE-2021-23437']
|
Uncontrolled Resource Consumption in pillow
|
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '8.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443'}]
|
{'cwe_ids': ['CWE-125', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T15:15:55Z', 'nvd_published_at': '2021-09-03T16:15:00Z'}
|
1.4.0
|
GHSA-q9mp-79cp-9g8j
|
2021-08-02T22:18:22Z
|
2021-09-02T22:00:09Z
| null |
['CVE-2019-20894']
|
Improper Authentication
|
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/issues/5312'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/7008'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}]
|
{'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:18:22Z', 'nvd_published_at': '2020-07-02T16:15:00Z'}
|
1.4.0
|
GHSA-4qw8-pgpr-p9mq
|
2021-09-15T18:30:14Z
|
2021-09-07T22:56:43Z
| null |
['CVE-2019-10095']
|
Bash command injection in Apache Zeppelin
|
bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd56389ba9cab30a6c976b9a4a6df0f85cbe8fba6a60a3cf6e3ba716b@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/1'}]
|
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:11Z', 'nvd_published_at': '2021-09-02T17:15:00Z'}
|
1.4.0
|
GHSA-3c33-3465-fhx2
|
2021-07-26T19:20:01Z
|
2021-09-08T17:27:16Z
| null |
['CVE-2020-15877']
|
Exposure of Resource to Wrong Sphere in LibreNMS
|
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.65.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/11915'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}, {'type': 'WEB', 'url': 'https://community.librenms.org/c/announcements'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/compare/1.65...1.65.1'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/releases/tag/1.65.1'}, {'type': 'WEB', 'url': 'https://shielder.it/blog'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T19:20:01Z', 'nvd_published_at': '2020-07-21T17:15:00Z'}
|
1.4.0
|
GHSA-7xrj-f5rp-j55h
|
2021-08-25T19:32:59Z
|
2021-09-02T17:10:42Z
| null |
['CVE-2021-23429']
|
Uncontrolled Resource Consumption in transpile
|
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'transpile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23429'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/transpile'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774'}]
|
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:32:59Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
|
1.4.0
|
GHSA-f6jp-j6w3-w9hm
|
2022-08-15T20:07:11Z
|
2021-09-20T20:18:11Z
| null |
['CVE-2021-41303']
|
Apache Shiro vulnerable to a specially crafted HTTP request causing an authentication bypass
|
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41303'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T19:17:39Z', 'nvd_published_at': '2021-09-17T09:15:00Z'}
|
1.4.0
|
GHSA-32hw-3pvh-vcvc
|
2021-08-30T18:03:34Z
|
2021-09-01T18:40:56Z
| null |
['CVE-2021-27909']
|
XSS vulnerability on password reset page
|
### Impact
For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-32hw-3pvh-vcvc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27909'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/942cb6992df619fdf1c181bfad9e25d5d4178b6f'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:03:34Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
|
1.4.0
|
GHSA-hw4v-5x4h-c3xm
|
2021-09-03T20:22:28Z
|
2021-09-01T18:22:48Z
| null |
['CVE-2021-39193']
|
Transaction validity oversight in pallet-ethereum
|
### Impact
A bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints.
### Patches
Patches are applied in PR #465.
### Workarounds
None.
### References
Patch PR: https://github.com/paritytech/frontier/pull/465
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Frontier repo](https://github.com/paritytech/frontier)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39193'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/465'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/dd112e'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}]
|
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:16:10Z', 'nvd_published_at': '2021-09-03T18:15:00Z'}
|
1.4.0
|
GHSA-g95p-88p4-76cm
|
2021-09-27T19:23:33Z
|
2021-09-27T20:17:39Z
| null |
['CVE-2021-28378']
|
Cross-site Scripting in Gitea
|
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28378'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/14898'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/14899'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/'}, {'type': 'WEB', 'url': 'https://github.com/PandatiX/CVE-2021-28378'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:23:33Z', 'nvd_published_at': '2021-03-15T06:15:00Z'}
|
1.4.0
|
GHSA-536p-4pcj-5mr9
|
2021-09-03T20:36:06Z
|
2021-09-02T17:10:52Z
| null |
['CVE-2021-38557']
|
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.
|
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38557'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers'}, {'type': 'WEB', 'url': 'https://zerosecuritypenetrationtesting.com/?page_id=306'}]
|
{'cwe_ids': ['CWE-276', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:43:55Z', 'nvd_published_at': '2021-08-24T13:15:00Z'}
|
1.4.0
|
GHSA-25pr-6pr6-68v7
|
2021-09-02T16:35:00Z
|
2021-09-02T17:17:25Z
| null |
['CVE-2021-39109']
|
Path traversal in atlasboard
|
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'atlasboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/atlassian/atlasboard/src/master/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:35:00Z', 'nvd_published_at': '2021-09-01T06:15:00Z'}
|
1.4.0
|
GHSA-2rr5-8q37-2w7h
|
2021-09-28T18:46:02Z
|
2021-09-27T20:12:47Z
| null |
['CVE-2021-41098']
|
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
|
### Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.)
### Impact
In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default.
Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:
- Nokogiri::XML::SAX::Parser
- Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser
- Nokogiri::XML::SAX::PushParser
- Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser
### Mitigation
JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.
CRuby users are not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.12.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-41098.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:20:23Z', 'nvd_published_at': '2021-09-27T20:15:00Z'}
|
1.4.0
|
GHSA-7f5c-rpf4-86p8
|
2021-08-26T17:12:06Z
|
2021-09-02T17:16:46Z
| null |
['CVE-2021-32822']
|
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
|
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'hbs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32822'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillarjs/hbs'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/'}]
|
{'cwe_ids': ['CWE-200', 'CWE-538', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T17:12:06Z', 'nvd_published_at': '2021-08-16T19:15:00Z'}
|
1.4.0
|
GHSA-652h-xwhf-q4h6
|
2021-09-21T14:50:54Z
|
2021-09-21T16:50:46Z
| null |
['CVE-2020-26301']
|
OS Command Injection in ssh2
|
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ssh2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301'}, {'type': 'WEB', 'url': 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}, {'type': 'PACKAGE', 'url': 'https://github.com/mscdex/ssh2'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ssh2'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:50:54Z', 'nvd_published_at': '2021-09-20T20:15:00Z'}
|
1.4.0
|
GHSA-rp65-9cf3-cjxr
|
2023-09-13T21:49:54Z
|
2021-09-20T20:47:31Z
| null |
['CVE-2021-3803']
|
Inefficient Regular Expression Complexity in nth-check
|
There is a Regular Expression Denial of Service (ReDoS) vulnerability in nth-check that causes a denial of service when parsing crafted invalid CSS nth-checks.
The ReDoS vulnerabilities of the regex are mainly due to the sub-pattern `\s*(?:([+-]?)\s*(\d+))?` with quantified overlapping adjacency and can be exploited with the following code.
**Proof of Concept**
```js
// PoC.js
var nthCheck = require("nth-check")
for(var i = 1; i <= 50000; i++) {
var time = Date.now();
var attack_str = '2n' + ' '.repeat(i*10000)+"!";
try {
nthCheck.parse(attack_str)
}
catch(err) {
var time_cost = Date.now() - time;
console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
}
}
```
**The Output**
```
attack_str.length: 10003: 174 ms
attack_str.length: 20003: 1427 ms
attack_str.length: 30003: 2602 ms
attack_str.length: 40003: 4378 ms
attack_str.length: 50003: 7473 ms
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nth-check'}, 'ecosystem_specific': {'affected_functions': ['nth-check.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'}, {'type': 'WEB', 'url': 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/nth-check'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00023.html'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:15:09Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
|
1.4.0
|
GHSA-c8xp-8mf3-62h9
|
2021-09-03T21:40:39Z
|
2021-09-07T23:02:18Z
| null |
['CVE-2021-3761']
|
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values
|
Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate.
### Impact
An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.
### Patches
https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422
https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@cloudflare.com](security@cloudflare.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3761'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/pull/90'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0246'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'PACKAGE', 'url': 'github.com/cloudflare/cfrpki'}]
|
{'cwe_ids': ['CWE-295', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T21:40:39Z', 'nvd_published_at': '2021-09-09T14:15:00Z'}
|
1.4.0
|
GHSA-7q44-gfvq-6g93
|
2021-08-02T22:55:27Z
|
2021-09-08T17:27:45Z
| null |
['CVE-2020-18155']
|
SQL Injection in Subrion CMS
|
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18155'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/817'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/c29cd72d07ca8cf6eba6f6d4496ad97d0c4d2be9'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-16T17:37:00Z', 'nvd_published_at': '2021-07-14T20:15:00Z'}
|
1.4.0
|
GHSA-22gh-3r9q-xf38
|
2021-10-21T14:26:23Z
|
2021-09-20T19:53:30Z
| null |
['CVE-2021-39214']
|
Lacking Protection against HTTP Request Smuggling in mitmproxy
|
### Impact
In mitmproxy 7.0.2 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization.
Unless you use mitmproxy to protect an HTTP/1 service, no action is required.
### Patches
The vulnerability has been fixed in mitmproxy 7.0.3 and above.
### Acknowledgements
We thank João Sobral (@chinchila) for responsibly disclosing this vulnerability to the mitmproxy team.
### Timeline
- **2021-09-08**: Received initial report for mitmproxy <= 6.0.2.
- **2021-09-08**: Requested clarification if 7.x is affected.
- **2021-09-10**: Received additional details, 7.x situation still unclear.
- **2021-09-13**: Internally determined that 7.x is also affected.
- **2021-09-13**: Shared initial fix with researcher.
- **2021-09-14**: Received confirmation that fix is working, but H2.TE/H2.CL should also be looked at.
- **2021-09-14**: Shared revised fix that includes additional H2.TE mitigations.
- **2021-09-14**: Received confirmation that revised fix is working.
- **2021-09-16**: Completed internal patch review.
- **2021-09-16**: Published patch release and advisory.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mitmproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-22gh-3r9q-xf38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39214'}, {'type': 'PACKAGE', 'url': 'https://github.com/mitmproxy/mitmproxy'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:30:53Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
|
1.4.0
|
GHSA-v9j4-cp63-qv62
|
2021-08-30T21:24:59Z
|
2021-09-01T18:32:02Z
| null |
['CVE-2021-38197']
|
Tarslip in go-unarr
|
unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gen2brain/go-unarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38197'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/issues/21'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/commit/239ec404d348280b50bbf671327709e8857fc5f4'}, {'type': 'WEB', 'url': 'https://github.com/gen2brain/go-unarr/releases/tag/v0.1.4'}, {'type': 'PACKAGE', 'url': 'github.com/gen2brain/go-unarr'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:24:59Z', 'nvd_published_at': '2021-08-08T16:15:00Z'}
|
1.4.0
|
GHSA-8r4g-cg4m-x23c
|
2021-12-20T22:16:43Z
|
2021-09-22T18:22:02Z
| null |
[]
|
Denial of Service in node-static
|
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudhead/node-static/pull/213'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudhead/node-static'}, {'type': 'WEB', 'url': 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1208'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-static'}]
|
{'cwe_ids': ['CWE-248', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T18:21:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m9fq-c9hp-59g7
|
2021-09-24T13:08:49Z
|
2021-09-20T20:42:52Z
| null |
['CVE-2021-3785']
|
Cross-site Scripting in yourls
|
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:18:05Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
|
1.4.0
|
GHSA-2pfh-q76x-gwvm
|
2021-10-06T13:06:57Z
|
2021-09-23T23:16:38Z
| null |
['CVE-2021-3583']
|
Improper Input Validation and Command Injection in Ansible
|
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3583'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/74960'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://pypi.org/project/ansible/4.2.0/'}]
|
{'cwe_ids': ['CWE-20', 'CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T17:11:22Z', 'nvd_published_at': '2021-09-22T12:15:00Z'}
|
1.4.0
|
GHSA-qwpp-fgrj-h78q
|
2021-06-25T15:32:28Z
|
2021-09-08T17:59:46Z
| null |
['CVE-2021-32712']
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32712'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021'}]
|
{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:32:28Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
|
1.4.0
|
GHSA-rwh9-8xx8-4wfm
|
2021-09-30T18:31:21Z
|
2021-09-30T20:50:21Z
| null |
['CVE-2021-25959']
|
Cross-site Scripting in OpenCRX
|
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core-models'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-core-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencrx/opencrx'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T18:31:21Z', 'nvd_published_at': '2021-09-29T14:15:00Z'}
|
1.4.0
|
GHSA-cpq8-x35g-m439
|
2021-09-16T18:19:29Z
|
2021-09-20T20:43:15Z
| null |
['CVE-2021-3783']
|
Cross-site Scripting in yourls
|
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:19:29Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
|
1.4.0
|
GHSA-gjcg-vrxg-xmgv
|
2021-09-10T16:32:16Z
|
2021-09-10T17:54:01Z
| null |
['CVE-2021-39162']
|
Incorrect handling of H2 GOAWAY + SETTINGS frames
|
Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event.
### Impact
This can lead to a DoS in the presence of untrusted *upstream* servers.
### Patches
0.15.1 contains an upgraded envoy binary with this vulnerability patched.
### Workarounds
If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.
### References
[envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8)
[envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32780)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39162'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
|
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:32:16Z', 'nvd_published_at': '2021-09-09T22:15:00Z'}
|
1.4.0
|
GHSA-8c3f-x5f9-6h62
|
2021-08-26T14:39:22Z
|
2021-09-02T17:08:20Z
| null |
['CVE-2021-32830']
|
Command injection in @diez/generation
|
The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@diez/generation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32830'}, {'type': 'PACKAGE', 'url': 'https://github.com/diez/diez'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@diez/generation'}]
|
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:09:43Z', 'nvd_published_at': '2021-08-17T18:15:00Z'}
|
1.4.0
|
GHSA-hv5f-73mr-7vvj
|
2021-10-06T13:08:14Z
|
2021-09-23T23:11:06Z
| null |
['CVE-2021-37860']
|
Cross-site Scripting in Mattermost
|
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.39.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37860'}, {'type': 'WEB', 'url': 'https://docs.mattermost.com/install/self-managed-changelog.html#release-v5-39-quality-release'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server/'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:23:33Z', 'nvd_published_at': '2021-09-22T17:15:00Z'}
|
1.4.0
|
GHSA-x6jv-5vfg-gm7x
|
2023-04-24T19:05:13Z
|
2021-09-01T18:35:52Z
| null |
['CVE-2021-21501']
|
Path traversal in ServiceCenter
|
Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/servicecomb-service-center'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21501'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-service-center/pull/788'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-service-center/commit/f4f44fe5d4a7e530ca8ee7c6f2c9e891ae8353c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/servicecomb-service-center'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/08/10/3'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:32:48Z', 'nvd_published_at': '2021-08-10T10:15:00Z'}
|
1.4.0
|
GHSA-jp7f-grcv-6mjf
|
2021-09-17T18:37:10Z
|
2021-09-20T19:53:42Z
| null |
['CVE-2021-39208']
|
Partial path traversal in sharpcompress
|
SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash:
```csharp
public static void WriteEntryToDirectory(IEntry entry,
string destinationDirectory,
ExtractionOptions? options,
Action<string, ExtractionOptions?> write)
{
string destinationFileName;
string file = Path.GetFileName(entry.Key);
string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory);
...
throw new ExtractionException("Entry is trying to write a file outside of the destination directory.");
}
```
If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh.
#### Impact
Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'SharpCompress'}, 'ecosystem_specific': {'affected_functions': ['WriteEntryToDirectory']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.29'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208'}, {'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/pull/614'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamhathcock/sharpcompress'}, {'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:37:10Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
|
1.4.0
|
GHSA-3jmw-c69h-426c
|
2021-08-30T22:03:39Z
|
2021-09-01T18:26:48Z
| null |
['CVE-2021-39133']
|
Cross-Site Request Forgery (CSRF) can run untrusted code on Rundeck server
|
### Impact
A user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions.
### Patches
Available in Rundeck 3.4.3 and 3.3.14
### Workarounds
Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.14'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39133'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T22:03:39Z', 'nvd_published_at': '2021-08-30T20:15:00Z'}
|
1.4.0
|
GHSA-j85q-whc9-g4p9
|
2021-08-16T23:13:12Z
|
2021-09-02T17:07:48Z
| null |
['CVE-2021-3678']
|
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc
|
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'}]
|
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-16T23:13:12Z', 'nvd_published_at': '2021-08-04T14:15:00Z'}
|
1.4.0
|
GHSA-2j58-pwwv-x666
|
2021-09-09T13:38:52Z
|
2021-09-09T17:10:35Z
| null |
['CVE-2021-23404']
|
Cross-Site Request Forgery in sqlite-web
|
This affects all versions of package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23404'}, {'type': 'PACKAGE', 'url': 'https://github.com/coleifer/sqlite-web'}, {'type': 'WEB', 'url': 'https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:38:52Z', 'nvd_published_at': '2021-09-08T11:15:00Z'}
|
1.4.0
|
GHSA-jf9v-q8vh-3fmc
|
2021-09-09T14:17:19Z
|
2021-09-09T17:11:11Z
| null |
['CVE-2021-32106']
|
Cross-site scripting in ICEcoder
|
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32106'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/ICEcoder'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/icecoder/c/xcAc8_1UPxQ'}, {'type': 'WEB', 'url': 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:32:36Z', 'nvd_published_at': '2021-06-08T13:15:00Z'}
|
1.4.0
|
GHSA-fgxq-p49f-qw99
|
2021-08-31T21:02:23Z
|
2021-09-02T22:00:20Z
| null |
['CVE-2021-30483']
|
Directory Traversal in isomorphic-git
|
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'isomorphic-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30483'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/isomorphic-git/pull/1339'}, {'type': 'PACKAGE', 'url': 'https://github.com/isomorphic-git/isomorphic-git'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/28'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:05:52Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}
|
1.4.0
|
GHSA-h97f-5258-5593
|
2023-09-05T23:13:23Z
|
2021-09-01T18:32:22Z
| null |
['CVE-2021-38384']
|
Incorrect Authorization in serverless-offline
|
Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing `/` character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greater than expected permissions).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'serverless-offline'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38384'}, {'type': 'WEB', 'url': 'https://github.com/dherault/serverless-offline/issues/1259'}, {'type': 'PACKAGE', 'url': 'https://github.com/dherault/serverless-offline'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:31:00Z', 'nvd_published_at': '2021-08-10T18:15:00Z'}
|
1.4.0
|
GHSA-hf66-r44g-p7j9
|
2023-09-05T23:21:06Z
|
2021-09-30T17:10:46Z
| null |
['CVE-2021-23446']
|
Inefficient Regular Expression Complexity in handsontable
|
The package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in `Handsontable.helper.isNumeric` function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'handsontable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/handsontable/issues/8752'}, {'type': 'WEB', 'url': 'https://github.com/handsontable/handsontable/pull/8742'}, {'type': 'PACKAGE', 'url': 'https://github.com/handsontable/handsontable'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:50:57Z', 'nvd_published_at': '2021-09-29T17:15:00Z'}
|
1.4.0
|
GHSA-92v9-xh2q-fq9f
|
2022-12-03T04:00:48Z
|
2021-09-20T20:12:38Z
| null |
['CVE-2021-23442']
|
Prototype Pollution in cookiex/deep
|
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@cookiex/deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'}, {'type': 'WEB', 'url': 'https://github.com/tony-tsx/cookiex-deep/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'}, {'type': 'PACKAGE', 'url': 'https://github.com/tony-tsx/cookiex-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793'}]
|
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T19:26:16Z', 'nvd_published_at': '2021-09-17T10:15:00Z'}
|
1.4.0
|
GHSA-4hpq-rjcx-7vj9
|
2023-08-25T20:56:57Z
|
2021-09-13T20:05:09Z
| null |
['CVE-2021-23435']
|
Clearance Gem Open Redirect Vulnerability
|
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of `session[:return_to]`. If the value used for return_to contains multiple leading slashes (`/////example.com`) the user ends up being redirected to the external domain that comes after the slashes (`http://example.com`).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'clearance'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23435'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/clearance/pull/945'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4hpq-rjcx-7vj9'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/clearance/CVE-2021-23435.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/clearance'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:07:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cfc2-wjcm-c8fm
|
2021-09-10T16:40:43Z
|
2021-09-10T17:54:25Z
| null |
['CVE-2021-39206']
|
Incorrect Authorization with specially crafted requests
|
Envoy, which Pomerium is based on, contains two authorization related vulnerabilities:
- [CVE-2021-32777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32779): incorrectly transform a URL containing a `#fragment` element, causing a mismatch in path-prefix based authorization decisions.
- [CVE-2021-32779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32777): incorrectly handle duplicate headers, dropping all but the last. This may lead to incorrect routing or authorization policy decisions.
### Impact
With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium.
### Patches
Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched.
### Workarounds
- This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.
### References
[envoy GSA CVE-2021-32777](https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9)
[envoy GSA CVE-2021-32779](https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.14.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.1'}]}], 'versions': ['0.15.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h'}, {'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39206'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:40:43Z', 'nvd_published_at': '2021-09-09T23:15:00Z'}
|
1.4.0
|
GHSA-6hw5-6gcx-phmw
|
2021-09-16T18:57:24Z
|
2021-09-08T20:14:56Z
| null |
['CVE-2021-38698']
|
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic.
|
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.1'}, {'fixed': '1.10.2'}]}], 'versions': ['1.10.1']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38698'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/10824'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-24-consul-missing-authorization-check-on-txn-apply-endpoint/29026'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]
|
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:00Z', 'nvd_published_at': '2021-09-07T12:15:00Z'}
|
1.4.0
|
GHSA-38fc-wpqx-33j7
|
2021-08-26T14:52:19Z
|
2021-09-02T17:15:42Z
| null |
['CVE-2021-23425']
|
Uncontrolled Resource Consumption in trim-off-newlines
|
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'trim-off-newlines'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23425'}, {'type': 'WEB', 'url': 'https://github.com/stevemao/trim-off-newlines/pull/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/stevemao/trim-off-newlines'}, {'type': 'WEB', 'url': 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:52:19Z', 'nvd_published_at': '2021-08-18T17:15:00Z'}
|
1.4.0
|
GHSA-838r-hvwh-24h8
|
2021-09-24T13:10:05Z
|
2021-09-13T20:06:31Z
| null |
['CVE-2021-38555']
|
XML Injection in Any23
|
An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38555'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:31:01Z', 'nvd_published_at': '2021-09-11T11:15:00Z'}
|
1.4.0
|
GHSA-hhfg-6hfc-rvxm
|
2022-05-04T03:39:38Z
|
2021-09-29T17:15:55Z
| null |
['CVE-2021-3822']
|
Regular Expression Denial of Service in jsoneditor
|
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ecosystem_specific': {'affected_functions': ['getInnerText']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.5.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:52:54Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
|
1.4.0
|
GHSA-68v9-3jjq-rvp4
|
2021-06-25T15:30:08Z
|
2021-09-08T18:00:40Z
| null |
['CVE-2021-32716']
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}]
|
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:30:08Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
|
1.4.0
|
GHSA-f794-r6xc-hf3v
|
2021-10-06T13:23:09Z
|
2021-09-29T17:18:32Z
| null |
['CVE-2021-41580']
|
Improper Access Control in passport-oauth2
|
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'passport-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/pull/144'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredhanson/passport-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1'}, {'type': 'WEB', 'url': 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:14:20Z', 'nvd_published_at': '2021-09-27T07:15:00Z'}
|
1.4.0
|
GHSA-65p7-pjj8-ggmr
|
2021-09-23T21:14:22Z
|
2021-09-23T23:18:42Z
| null |
[]
|
Member account takeover
|
### Impact
An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address.
Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled.
### Patches
Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible.
Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible.
### Workarounds
The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution.
As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.18.0'}, {'fixed': '3.42.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.15.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:14:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h73q-5wmj-q8pj
|
2023-08-15T18:54:22Z
|
2021-09-29T17:11:28Z
| null |
['CVE-2021-23445']
|
Cross site scripting in datatables.net
|
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'datatables.net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445'}, {'type': 'WEB', 'url': 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'}, {'type': 'WEB', 'url': 'https://cdn.datatables.net/1.11.3/'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataTables/Dist-DataTables'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00018.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T18:53:31Z', 'nvd_published_at': '2021-09-27T17:15:00Z'}
|
1.4.0
|
GHSA-cg3q-59w7-rvc2
|
2021-09-28T20:32:37Z
|
2021-09-29T17:12:51Z
| null |
['CVE-2021-3818']
|
Reliance on Cookies without Validation and Integrity Checking in getgrav/grav
|
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'}]
|
{'cwe_ids': ['CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:32:37Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
|
1.4.0
|
GHSA-9q5w-79cv-947m
|
2021-09-07T19:05:40Z
|
2021-09-07T23:10:56Z
| null |
['CVE-2021-39199']
|
Unsafe defaults in `remark-html`
|
### Impact
The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
### Patches
The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation.
### Workarounds
On older affected versions, pass `sanitize: true`, like so:
```diff
- .use(remarkHtml)
+ .use(remarkHtml, {sanitize: true})
```
### References
n/a
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html)
* Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'remark-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'remark-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.0.1'}]}], 'versions': ['14.0.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199'}, {'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/remarkjs/remark-html'}, {'type': 'WEB', 'url': 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/remark-html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T19:05:40Z', 'nvd_published_at': '2021-09-07T19:15:00Z'}
|
1.4.0
|
GHSA-8v63-cqqc-6r2c
|
2022-08-11T21:52:14Z
|
2021-09-20T20:46:43Z
| null |
['CVE-2021-3805']
|
Prototype Pollution in object-path
|
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). The `del()` function fails to validate which Object properties it deletes. This allows attackers to modify the prototype of Object, causing the modification of default properties like `toString` on all objects.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['object-path.del']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html'}]
|
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:13:12Z', 'nvd_published_at': '2021-09-17T06:15:00Z'}
|
1.4.0
|
GHSA-7rp6-w7mg-h8rw
|
2021-09-17T18:29:23Z
|
2021-09-20T20:22:05Z
| null |
['CVE-2021-39239']
|
XML External Entity Reference in Apache Jena
|
A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239'}, {'type': 'PACKAGE', 'url': 'https://gitbox.apache.org/repos/asf?p=jena.git'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:29:23Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
|
1.4.0
|
GHSA-v39p-96qg-c8rf
|
2023-09-08T21:25:42Z
|
2021-09-01T18:37:11Z
| null |
['CVE-2021-23434']
|
Prototype Pollution in object-path
|
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition `currentPath === '__proto__'` returns false if `currentPath` is `['__proto__']`. This is because the `===` operator returns always false when the type of the operands is different.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path#0116'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path%230116'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453'}]
|
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:16:08Z', 'nvd_published_at': '2021-08-27T17:15:00Z'}
|
1.4.0
|
GHSA-grj5-8x6q-hc9q
|
2021-09-08T18:11:29Z
|
2021-09-02T22:00:40Z
| null |
['CVE-2021-36156']
|
Path traversal in Grafana Loki
|
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/loki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36156'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/pull/4020'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/pull/4020#issue-694377133'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/loki'}, {'type': 'WEB', 'url': 'https://github.com/grafana/loki/releases/tag/v2.3.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:52:20Z', 'nvd_published_at': '2021-08-03T15:15:00Z'}
|
1.4.0
|
GHSA-vw47-mr44-3jf9
|
2021-09-21T14:54:49Z
|
2021-09-21T18:28:30Z
| null |
['CVE-2021-25740']
|
Confused Deputy in Kubernetes
|
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25740'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/103675'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211014-0001/'}]
|
{'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:54:49Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
|
1.4.0
|
GHSA-p9wf-3xpg-c9g5
|
2021-09-07T17:16:00Z
|
2021-09-02T17:11:13Z
| null |
['CVE-2021-39371']
|
XML External Entity Injection in PyWPS
|
An XML external entity (XXE) injection in PyWPS before 4.5.0 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pywps'}, 'ecosystem_specific': {'affected_functions': ['pywps.app.WPSRequest.WPSRequest._post_request', 'pywps.app.WPSRequest._get_dataelement_value', 'pywps.validator.complexvalidator.validategml', 'pywps.validator.complexvalidator.validategpx', 'pywps.validator.complexvalidator.validatexml', 'pywps.xml_util.fromstring', 'pywps.xml_util.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39371'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/issues/790'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pywps/pull/616'}, {'type': 'WEB', 'url': 'https://github.com/geopython/pywps/commit/7d6b26a2e931df2feca0b7fb24f4d01610825aee'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/pywps'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html'}]
|
{'cwe_ids': ['CWE-611', 'CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:48:42Z', 'nvd_published_at': '2021-08-23T01:15:00Z'}
|
1.4.0
|
GHSA-7h6j-2268-fhcm
|
2022-07-16T04:16:14Z
|
2021-09-02T22:00:01Z
| null |
['CVE-2020-9321']
|
Improper Certificate Handling
|
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9321'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/6281'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.1.4'}]
|
{'cwe_ids': ['CWE-200', 'CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:19:23Z', 'nvd_published_at': '2020-03-16T19:15:00Z'}
|
1.4.0
|
GHSA-c77f-4rgj-jfr4
|
2021-09-27T18:58:23Z
|
2021-09-15T20:23:28Z
| null |
['CVE-2021-39391']
|
Cross-site Scripting in Beego
|
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'github.com/beego/beego/v2/nuget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4727'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}]
|
{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-15T18:12:59Z', 'nvd_published_at': '2021-09-14T18:15:00Z'}
|
1.4.0
|
GHSA-8vh3-29mr-m9xg
|
2021-08-30T21:53:31Z
|
2021-09-01T18:31:23Z
| null |
['CVE-2021-3680']
|
Inadequate Encryption Strength in showdoc
|
showdoc makes use of a hardcoded salt in its user password hash function
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3680'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/blob/fd1740234a12804b45af9cac3563567d83ba414d/server/Application/Home/Model/UserModel.class.php#L20'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2'}]
|
{'cwe_ids': ['CWE-326', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:53:31Z', 'nvd_published_at': '2021-08-04T13:15:00Z'}
|
1.4.0
|
GHSA-4jqc-8m5r-9rpr
|
2022-03-30T21:18:05Z
|
2021-09-13T20:09:36Z
| null |
['CVE-2021-23440']
|
Prototype Pollution in set-value
|
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value.validateKey']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'set-value-nuget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/pull/33'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/pull/33/commits/383b72d47c74a55ae8b6e231da548f9280a4296a'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/set-value'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
|
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:33:18Z', 'nvd_published_at': '2021-09-12T13:15:00Z'}
|
1.4.0
|
GHSA-jjcx-999m-35hc
|
2021-07-22T21:50:38Z
|
2021-09-08T17:27:07Z
| null |
['CVE-2019-14671']
|
Improper Input Validation in Firefly III
|
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.17.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.17.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/issues/2367'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T21:50:38Z', 'nvd_published_at': '2019-08-05T20:15:00Z'}
|
1.4.0
|
GHSA-4574-qv3w-fcmg
|
2021-08-30T19:17:39Z
|
2021-09-01T18:36:15Z
| null |
['CVE-2021-23420']
|
Deserialization of Untrusted Data in codeception/codeception
|
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codeception/codeception'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'codeception/codeception'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/pull/6241'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codeception/Codeception'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122'}, {'type': 'WEB', 'url': 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52'}, {'type': 'WEB', 'url': 'https://github.com/JinYiTong/poc'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:17:39Z', 'nvd_published_at': '2021-08-11T13:15:00Z'}
|
1.4.0
|
GHSA-jphm-g89m-v42p
|
2021-08-30T23:21:48Z
|
2021-09-02T21:59:50Z
| null |
['CVE-2021-36157']
|
Path traversal in Grafana Cortex
|
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36157'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/pull/4375'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/commit/d9e1f81f40c607b9e97c2fc6db70ae54679917c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T18:31:56Z', 'nvd_published_at': '2021-08-03T15:15:00Z'}
|
1.4.0
|
GHSA-hqhp-5p83-hx96
|
2022-08-10T23:38:25Z
|
2021-09-20T20:44:48Z
| null |
['CVE-2021-3801']
|
prismjs Regular Expression Denial of Service vulnerability
|
Prism is a syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801'}, {'type': 'WEB', 'url': 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/prismjs/prism'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:29:46Z', 'nvd_published_at': '2021-09-15T13:15:00Z'}
|
1.4.0
|
GHSA-663j-rjcr-789f
|
2021-10-21T14:31:42Z
|
2021-09-30T20:50:07Z
| null |
['CVE-2021-25962']
|
CSV injection in shuup
|
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'shuup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'fixed': '2.11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25962'}, {'type': 'WEB', 'url': 'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'}, {'type': 'PACKAGE', 'url': 'https://github.com/shuup/shuup'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'}]
|
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T18:33:24Z', 'nvd_published_at': '2021-09-29T14:15:00Z'}
|
1.4.0
|
GHSA-c32w-3cqh-f6jx
|
2021-10-21T14:15:19Z
|
2021-09-02T17:08:33Z
| null |
['CVE-2021-25957']
|
Weak Password Recovery Mechanism for Forgotten Password
|
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'}]
|
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:13:49Z', 'nvd_published_at': '2021-08-17T15:15:00Z'}
|
1.4.0
|
GHSA-wfrj-qqc2-83cm
|
2021-09-17T17:48:56Z
|
2021-09-20T19:52:41Z
| null |
[]
|
Remote command injection when using sendmail email transport
|
### Impact
Sites using the `sendmail` transport as part of their `mail` config are vulnerable to remote command injection due to a [vulnerability](https://github.com/advisories/GHSA-48ww-j4fc-435p) in the `nodemailer` dependency.
Ghost defaults to the `direct` transport so this is only exploitable if the `sendmail` transport is explicitly used.
### Patches
Fixed in 4.15.0, all sites should upgrade as soon as possible.
### Workarounds
* Use an alternative email transport as described in the [docs](https://ghost.org/docs/config/#mail).
### For more information
If you have any questions or comments about this advisory:
* email us at security@ghost.org
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.15.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-wfrj-qqc2-83cm'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/93e4b2eafd18bc8e4c17924e0824e73617e7940c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-48ww-j4fc-435p'}]
|
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:48:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mf7q-gw5f-q8jj
|
2021-09-10T16:49:52Z
|
2021-09-07T22:55:56Z
| null |
['CVE-2021-27578']
|
Cross-site Scripting in Apache Zeppelin
|
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:10Z', 'nvd_published_at': '2021-09-02T17:15:00Z'}
|
1.4.0
|
GHSA-74j8-88mm-7496
|
2021-09-21T14:53:38Z
|
2021-09-21T18:28:21Z
| null |
['CVE-2020-8561']
|
Confused Deputy in Kubernetes
|
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8561'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/104720'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211014-0002/'}]
|
{'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T14:53:38Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
|
1.4.0
|
GHSA-jpwx-ffjq-wr4w
|
2021-09-03T20:10:38Z
|
2021-09-07T22:54:23Z
| null |
[]
|
Content object state fetch functions open to SQL injection
|
### Impact
This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible.
### Patches
The fix is distributed via Composer, see "Patched versions".
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-legacy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2018.06.0'}, {'fixed': '2019.03.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2019.03.5.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-legacy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2017.12.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2017.12.7.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-legacy'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:10:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5wjf-62hw-q78r
|
2021-09-10T16:33:46Z
|
2021-09-10T17:54:13Z
| null |
['CVE-2021-39204']
|
Excessive CPU usage
|
Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset.
### Impact
This can result in a DoS condition.
### Patches
Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
### Workarounds
N/A
### References
[envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc)
[envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32778)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.1'}]}], 'versions': ['0.15.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39204'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ'}]
|
{'cwe_ids': ['CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:33:46Z', 'nvd_published_at': '2021-09-09T22:15:00Z'}
|
1.4.0
|
GHSA-gh8j-2pgf-x458
|
2021-09-24T13:10:56Z
|
2021-09-13T20:05:51Z
| null |
['CVE-2021-40839']
|
Infinite Loop in rencode
|
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rencode'}, 'ecosystem_specific': {'affected_functions': ['rencode.dumps']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40839'}, {'type': 'WEB', 'url': 'https://github.com/aresch/rencode/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gh8j-2pgf-x458'}, {'type': 'PACKAGE', 'url': 'https://github.com/aresch/rencode'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/rencode/PYSEC-2021-345.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/rencode/#history'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2021/Sep/16'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0001/'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:11:37Z', 'nvd_published_at': '2021-09-10T02:15:00Z'}
|
1.4.0
|
GHSA-jj53-8fmw-f2w2
|
2021-08-31T17:46:08Z
|
2021-09-01T18:25:44Z
| null |
['CVE-2021-39163']
|
Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner.
|
### Impact
Unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where:
- the vulnerable homeserver is in the room; and
- untrusted users are permitted to create groups (communities).
By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted.
### Patches
Server administrators should upgrade to 1.41.1 or higher.
### Workarounds
Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators.
Administrators that are using a reverse proxy could, with partial loss of group functionality, block the following endpoints:
* `/_matrix/client/r0/groups/{group_id}/rooms`
* `/_matrix/client/unstable/groups/{group_id}/rooms`
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.41.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39163'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/cb35df940a'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T17:46:08Z', 'nvd_published_at': '2021-08-31T16:15:00Z'}
|
1.4.0
|
GHSA-6675-wwqr-jhmf
|
2021-10-04T13:52:08Z
|
2021-09-30T17:12:56Z
| null |
['CVE-2020-20695']
|
Cross-site Scripting in GilaCMS
|
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20695'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/52'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:07Z', 'nvd_published_at': '2021-09-27T22:15:00Z'}
|
1.4.0
|
GHSA-2ghc-6v89-pw9j
|
2022-08-10T23:37:49Z
|
2021-09-14T20:25:35Z
| null |
['CVE-2021-3666']
|
body-parser-xml vulnerable to Prototype Pollution
|
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'body-parser-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666'}, {'type': 'WEB', 'url': 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}, {'type': 'PACKAGE', 'url': 'https://github.com/fiznool/body-parser-xml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml'}]
|
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:39:31Z', 'nvd_published_at': '2021-09-13T18:15:00Z'}
|
1.4.0
|
GHSA-6q3p-36f4-cwxv
|
2021-09-16T18:52:16Z
|
2021-09-20T20:45:21Z
| null |
['CVE-2020-21122']
|
Server-Side Request Forgery in UReport
|
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21122'}, {'type': 'WEB', 'url': 'https://github.com/youseries/ureport/issues/483'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:52:16Z', 'nvd_published_at': '2021-09-15T17:15:00Z'}
|
1.4.0
|
GHSA-xqp8-w826-hh6x
|
2022-08-11T16:55:01Z
|
2021-09-02T16:51:14Z
| null |
['CVE-2021-39187']
|
Parse Server crashes with query parameter
|
### Impact
Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch.
### Patches
Upgrade to Parse Server 4.10.3
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/4.10.3'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3463'}]
|
{'cwe_ids': ['CWE-20', 'CWE-74', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:25:16Z', 'nvd_published_at': '2021-09-02T16:15:00Z'}
|
1.4.0
|
GHSA-fmm9-3gv8-58f4
|
2021-09-08T14:47:32Z
|
2021-09-07T23:08:40Z
| null |
['CVE-2021-39194']
|
Improper Handling of Missing Values in kaml
|
### Impact
Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.
This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected.
YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example:
```yaml
!<x>
```
The following is a sample application that demonstrates this issue:
```kotlin
import com.charleskorn.kaml.Yaml
import kotlinx.serialization.SerialName
import kotlinx.serialization.Serializable
@Serializable
private sealed class K {
@Serializable
@SerialName("x")
data class X(
val property: String? = null,
) : K()
}
const val s = """
!<x>
"""
fun main() {
println("Started.")
val result = Yaml.default.decodeFromString(K.serializer(), s)
println("Finished, result is $result")
}
```
On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns.
### Patches
Version 0.35.3 or later contain the fix for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.charleskorn.kaml:kaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.35.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/issues/179'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/charleskorn/kaml/'}]
|
{'cwe_ids': ['CWE-230', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:02:13Z', 'nvd_published_at': '2021-09-07T20:15:00Z'}
|
1.4.0
|
GHSA-5vcm-3xc3-w7x3
|
2022-10-25T20:24:37Z
|
2021-09-22T19:18:41Z
| null |
['CVE-2021-41084']
|
Response Splitting from unsanitized headers
|
### Impact
http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields:
* Header names (`Header.name`å
* Header values (`Header.value`)
* Status reason phrases (`Status.reason`)
* URI paths (`Uri.Path`)
* URI authority registered names (`URI.RegName`) (through 0.21)
The following backends render invalid carriage return, newline, or null characters in an unsafe fashion.
| | blaze-server | ember-server | blaze-client | ember-client | jetty-client |
|:---------------|:-------------|:-------------|:-------------|--------------|--------------|
| header names | ⚠ | ⚠ | ⚠ | ⚠ | ⚠ |
| header values | ⚠ | ⚠ | ⚠ | ⚠ | |
| status reasons | ⚠ | ⚠ | | | |
| URI paths | | | ⚠ | ⚠ | |
| URI regnames | | | ⚠ < 0.22 | ⚠ < 0.22 | |
For example, given the following service:
```scala
import cats.effect._
import org.http4s._
import org.http4s.dsl.io._
import org.http4s.server.blaze.BlazeServerBuilder
import scala.concurrent.ExecutionContext.global
object ResponseSplit extends IOApp {
override def run(args: List[String]): IO[ExitCode] =
BlazeServerBuilder[IO](global)
.bindHttp(8080)
.withHttpApp(httpApp)
.resource
.use(_ => IO.never)
val httpApp: HttpApp[IO] =
HttpApp[IO] { req =>
req.params.get("author") match {
case Some(author) =>
Ok("The real content")
.map(_.putHeaders(Header("Set-Cookie", s"author=${author}")))
case None =>
BadRequest("No author parameter")
}
}
}
```
A clean `author` parameter returns a clean response:
```sh
curl -i 'http://localhost:8080/?author=Ross'
```
```http
HTTP/1.1 200 OK
Content-Type: text/plain; charset=UTF-8
Set-Cookie: author=Ross
Date: Mon, 20 Sep 2021 04:12:10 GMT
Content-Length: 16
The real content
```
A malicious `author` parameter allows a user-agent to hijack the response from our server and return different content:
```sh
curl -i 'http://localhost:8080/?author=hax0r%0d%0aContent-Length:+13%0d%0a%0aI+hacked+you'
```
```http
HTTP/1.1 200 OK
Content-Type: text/plain; charset=UTF-8
Set-Cookie: author=hax0r
Content-Length: 13
I hacked you
```
### Patches
Versions 0.21.29, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following:
* If a status reasoon phrase is invalid, it is dropped. Rendering is optional per spec.
* If a header name is invalid in a request or response, the header is dropped. There is no way to generically sanitize a header without potentially shadowing a correct one.
* If a header value is invalid in a request or response, it is sanitized by replacing null (`\u0000`), carriage return (`\r`), and newline (`\n`) with space (` `) characters per spec.
* If a URI path or registered name is invalid in a request line, the client raises an `IllegalArgumentException`.
* If a URI registered name is invalid in a host header, the client raises an `IllegalArgumentException`.
### Workarounds
http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening.
Not all backends were affected: jetty-server, tomcat-server, armeria, and netty on the server; async-http-client, okhttp-client, armeria, and netty as clients.
### References
* https://owasp.org/www-community/attacks/HTTP_Response_Splitting
* https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](http://github.com/http4s/http4s)
* Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}, {'type': 'WEB', 'url': 'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}]
|
{'cwe_ids': ['CWE-74', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T16:10:13Z', 'nvd_published_at': '2021-09-21T18:15:00Z'}
|
1.4.0
|
GHSA-w6j8-jc36-x5q9
|
2021-09-01T18:19:02Z
|
2021-09-01T18:22:09Z
| null |
['CVE-2021-39166']
|
Improper Neutralization of Text-Values in Object Version Preview
|
Text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.1.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39166'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10170'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:19:02Z', 'nvd_published_at': '2021-09-01T14:15:00Z'}
|
1.4.0
|
GHSA-qhmp-h54x-38qr
|
2021-10-06T20:37:36Z
|
2021-09-20T20:57:02Z
| null |
['CVE-2021-39229']
|
CWE-730 Regex injection with IFTTT Plugin
|
### Impact
Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service.
### Patches
Update to Apprise v0.9.5.1
```bash
# Install Apprise v0.9.5.1 from PyPI
pip install apprise==0.9.5.1
```
The patch to the problem was performed [here](https://github.com/caronc/apprise/pull/436/files).
### Workarounds
Alternatively, if upgrading is not an option, you can safely remove the following file:
- `apprise/plugins/NotifyIFTTT.py`
The above will eliminate the ability to use IFTTT, but everything else will work smoothly.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Apprise](https://github.com/caronc/apprise/issues)
* Email me at [lead2gold@gmail.com](mailto:lead2gold@gmail.com)
### Additional Credit
Github would not allow me to additionally credit **Rasmus Petersen**, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited
## Additional Notes:
- Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39229'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/pull/436'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831'}, {'type': 'PACKAGE', 'url': 'https://github.com/caronc/apprise'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359'}, {'type': 'WEB', 'url': 'https://github.com/caronc/apprise/releases/tag/v0.9.5.1'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:30:36Z', 'nvd_published_at': '2021-09-20T22:15:00Z'}
|
1.4.0
|
GHSA-jgrx-mgxx-jf9v
|
2022-08-10T23:37:11Z
|
2021-09-20T20:27:52Z
| null |
['CVE-2021-3777']
|
tmpl vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion
|
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'tmpl'}, 'ecosystem_specific': {'affected_functions': ['tmpl.tmpl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3777'}, {'type': 'WEB', 'url': 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/daaku/nodejs-tmpl'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:05:45Z', 'nvd_published_at': '2021-09-15T08:15:00Z'}
|
1.4.0
|
GHSA-p5w8-wqhj-9hhf
|
2021-09-21T14:51:46Z
|
2021-09-10T17:56:06Z
| null |
['CVE-2021-32839']
|
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)
|
### Impact
The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.
### Patches
The issues has been fixed in sqlparse 0.4.2.
### Workarounds
Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool.
### References
This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues)
* Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32839'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'}, {'type': 'PACKAGE', 'url': 'https://github.com/andialbrecht/sqlparse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2021-333.yaml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T17:13:29Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}
|
1.4.0
|
GHSA-748f-wv76-x9hg
|
2021-07-13T15:53:15Z
|
2021-09-08T17:26:26Z
| null |
['CVE-2021-28931']
|
Arbitrary file upload in Fork CMS
|
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.9.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28931'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3351'}, {'type': 'WEB', 'url': 'https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/releases/tag/5.9.2'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T13:59:31Z', 'nvd_published_at': '2021-07-07T15:15:00Z'}
|
1.4.0
|
GHSA-xv7v-rf6g-xwrc
|
2021-09-30T16:49:05Z
|
2021-09-30T17:10:14Z
| null |
['CVE-2019-11831']
|
Directory Traversal in typo3/phar-stream-wrapper
|
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/phar-stream-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/36'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-psa-2019-007/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4445'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-007'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_22'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108302'}]
|
{'cwe_ids': ['CWE-22', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:49:05Z', 'nvd_published_at': '2019-05-09T04:29:00Z'}
|
1.4.0
|
GHSA-gqcf-83rq-gpfr
|
2021-09-14T18:35:35Z
|
2021-09-14T20:24:44Z
| null |
[]
|
Any storage file can be downloaded from p.sh if full server path is known
|
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/post-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/ibexa/post-install/security/advisories/GHSA-gqcf-83rq-gpfr'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/post-install'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:35:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x38q-xg2h-rxgx
|
2021-09-30T18:35:48Z
|
2021-09-23T23:14:28Z
| null |
['CVE-2020-23478']
|
Regular Expression Denial of Service in Leo Editor
|
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'leo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23478'}, {'type': 'WEB', 'url': 'https://github.com/leo-editor/leo-editor/issues/1597'}, {'type': 'PACKAGE', 'url': 'https://github.com/leo-editor/leo-editor/'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:37:27Z', 'nvd_published_at': '2021-09-22T20:15:00Z'}
|
1.4.0
|
GHSA-5vp3-v4hc-gx76
|
2021-11-16T21:44:47Z
|
2021-09-15T20:23:17Z
| null |
['CVE-2021-41264']
|
UUPSUpgradeable vulnerability in @openzeppelin/contracts
|
### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
### References
[Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}, {'type': 'WEB', 'url': 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]
|
{'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T22:17:42Z', 'nvd_published_at': '2021-11-12T18:15:00Z'}
|
1.4.0
|
GHSA-wmpm-fq7r-jq56
|
2022-07-13T19:09:43Z
|
2021-09-02T22:05:17Z
| null |
['CVE-2021-23427']
|
Imporoper path validation in elFinder.NetCore
|
This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.NetCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23427'}, {'type': 'PACKAGE', 'url': 'https://github.com/gordon-matt/elFinder.NetCore'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T18:03:43Z', 'nvd_published_at': '2021-09-01T15:15:00Z'}
|
1.4.0
|
GHSA-vpw5-grxx-v396
|
2022-07-13T18:55:15Z
|
2021-09-02T17:16:56Z
| null |
['CVE-2021-36793']
|
CSRF token exposure in TYPO3 extension
|
When using the CsrfTokenViewHelper the extension discloses the user's session identifier to HTML output without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance Cross Site Scripting in the frontend output.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'lms/routes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36793'}, {'type': 'PACKAGE', 'url': 'https://github.com/Lacr1ma/routes'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-008'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:23:15Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
|
1.4.0
|
GHSA-36mj-6r7r-mqhf
|
2021-09-28T21:21:08Z
|
2021-09-29T17:09:23Z
| null |
[]
|
User can obtain JWT token even if account is disabled
|
Users can authenticate this way even if their user account is disabled. This is a high risk vulnerability when account disabling is used to block users' access to the system. (Someone who never had an account cannot exploit this vulnerability.) The fix ensures tokens are generated only for enabled user accounts, and is distributed via Composer as ezsystems/ezplatform-rest v1.3.8
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-36mj-6r7r-mqhf'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-007-jwt-auth-possible-for-disabled-users.-username-login-handler-can-t-be-disabled'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-rest'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:21:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qh7x-j4v8-qw5w
|
2021-10-21T14:19:54Z
|
2021-09-22T20:39:26Z
| null |
['CVE-2021-41086']
|
Clipboard-based XSS
|
### Impact
XSS against the user.
### Details
jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS.
### References
The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'jsuites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsuites/jsuites/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jsuites'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T21:50:39Z', 'nvd_published_at': '2021-09-21T21:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.