schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-qgrp-8f3v-q85p
2022-06-16T23:41:45Z
2022-06-16T23:41:45Z
null
[]
`FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets
`FixedSizeBinaryArray` performs insufficient bounds checks, which allows out-of-bounds reads in safe code.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/issues/774'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0118.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:45Z', 'nvd_published_at': None}
1.4.0
GHSA-9v73-x562-wv5x
2022-06-15T19:45:01Z
2022-06-03T00:00:58Z
null
['CVE-2021-34081']
OS Command Injection in gitsome
OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'gitsome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34081'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4780'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitsome'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:09:24Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-fp76-f299-v3hj
2022-06-24T00:51:53Z
2022-06-14T00:00:37Z
null
['CVE-2022-2065']
Cross-site Scripting in FacturaScripts
Cross-site Scripting (XSS) - Stored in GitHub repository neorazorx/facturascripts prior to 2022.06.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2065'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/1d1edb40b40016d7fd2893b410b98569d7facca1'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bcb44da4-d5c9-4830-924f-02d6defe6506'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:51:53Z', 'nvd_published_at': '2022-06-13T13:15:00Z'}
1.4.0
GHSA-xxhf-xq6v-c8mj
2022-12-05T22:35:57Z
2022-06-24T00:00:31Z
null
['CVE-2022-34180']
Improper authorization in Jenkins Embeddable Build Status Plugin bypasses ViewStatus permission requirement
Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for \"unprotected\" status badge access. This allows attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build. Embeddable Build Status Plugin 2.0.4 requires ViewStatus permission to obtain the build status badge icon.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34180'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/402148784b3f4b029eaf47cc26ebf6b9bc636183'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2794'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-cv76-rv4h-4mqc
2022-06-03T22:24:14Z
2022-06-03T00:00:59Z
null
['CVE-2021-34082']
OS Command Injection in proctree
OS Command Injection vulnerability in allenhwkim proctree through 0.1.1 and commit 0ac10ae575459457838f14e21d5996f2fa5c7593 for Node.js, allows attackers to execute arbitrary commands via the fix function.
[]
[{'package': {'ecosystem': 'npm', 'name': 'proctree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34082'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4783'}, {'type': 'PACKAGE', 'url': 'https://github.com/allenhwkim/proctree'}, {'type': 'WEB', 'url': 'https://github.com/allenhwkim/proctree/blob/master/index.js#L46'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:24:14Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-mhp7-3393-pfqr
2022-12-06T00:02:19Z
2022-06-24T00:00:31Z
null
['CVE-2022-34172']
Cross-site Scripting vulnerability in Jenkins
Since Jenkins 2.340, symbol-based icons unescape previously escaped values of `tooltip` parameters. This vulnerability is known to be exploitable by attackers with Job/Configure permission. Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability. Symbol-based icons no longer unescape values of `tooltip` parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.340'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.332'}, {'fixed': '2.332.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34172'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}]
{'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:02:19Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-vvv8-xw5f-3f88
2022-06-20T22:33:58Z
2022-06-18T00:00:20Z
null
['CVE-2022-21213']
Prototype Pollution in mout
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21213'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/pull/279'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/commit/17ffdc2a96417a63a0147156dc045e90d0d14c64'}, {'type': 'PACKAGE', 'url': 'https://github.com/mout/mout'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepFillIn.js'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepMixIn.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOUT-2342654'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:33:58Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
1.4.0
GHSA-xvf7-4v9q-58w6
2022-06-20T21:58:35Z
2022-06-11T00:00:17Z
null
['CVE-2022-25851']
Infinite loop in jpeg-js
The package jpeg-js before 0.4.4 is vulnerable to Denial of Service (DoS) where a particular piece of input will cause the program to enter an infinite loop and never return.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jpeg-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25851'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/pull/106/'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/commit/9ccd35fb5f55a6c4f1902ac5b0f270f675750c27'}, {'type': 'PACKAGE', 'url': 'https://github.com/jpeg-js/jpeg-js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:00:49Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
1.4.0
GHSA-5crp-9r3c-p9vr
2022-12-08T16:42:36Z
2022-06-22T15:08:47Z
null
[]
Improper Handling of Exceptional Conditions in Newtonsoft.Json
Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of expressions with high nesting level that lead to StackOverFlow exception or high CPU and RAM usage. Exploiting this vulnerability results in Denial Of Service (DoS). The serialization and deserialization path have different properties regarding the issue. Deserializing methods (like `JsonConvert.DeserializeObject`) will process the input that results in burning the CPU, allocating memory, and consuming a thread of execution. Quite high nesting level (>10kk, or 9.5MB of `{a:{a:{...` input) is needed to achieve the latency over 10 seconds, depending on the hardware. Serializing methods (like `JsonConvert.Serialize` or `JObject.ToString`) will throw StackOverFlow exception with the nesting level of around 20k. To mitigate the issue one either need to update Newtonsoft.Json to 13.0.1 or set `MaxDepth` parameter in the `JsonSerializerSettings`. This can be done globally with the following statement. After that the parsing of the nested input will fail fast with `Newtonsoft.Json.JsonReaderException`: ``` JsonConvert.DefaultSettings = () => new JsonSerializerSettings { MaxDepth = 128 }; ``` Repro code: ``` //Create a string representation of an highly nested object (JSON serialized) int nRep = 25000; string json = string.Concat(Enumerable.Repeat("{a:", nRep)) + "1" + string.Concat(Enumerable.Repeat("}", nRep)); //Parse this object (leads to high CPU/RAM consumption) var parsedJson = JsonConvert.DeserializeObject(json); // Methods below all throw stack overflow with nRep around 20k and higher // string a = parsedJson.ToString(); // string b = JsonConvert.SerializeObject(parsedJson); ``` ### Additional affected product and version information **The original statement about the problem only affecting IIS applications is misleading.** Any application is affected, however the IIS has a behavior that stops restarting the instance after some time resulting in a harder-to-fix DoS.**
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Newtonsoft.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/issues/2457'}, {'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/pull/2462'}, {'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/2018/10/22/StackOverflowException/'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/vulns/aleph-2018004'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesNK/Newtonsoft.Json'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678'}]
{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T15:08:47Z', 'nvd_published_at': None}
1.4.0
GHSA-58jx-f5rf-qgqf
2022-06-24T19:54:22Z
2022-06-16T00:00:21Z
null
['CVE-2021-33036']
User account escalation in Apache Hadoop
In Apache Hadoop 2.2.0 to 2.10.1, 3.0.0-alpha1 to 3.1.4, 3.2.0 to 3.2.2, and 3.3.0 to 3.3.1, a user who can escalate to yarn user can possibly run arbitrary commands as root user. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33036'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/227d64ab59e8aa6477769b2542ad0cd7a6d855cb'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/45801fba8b00257ab32c02a7d1a05948ba687a49'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/ba041fe6d34215f075e0a7b2078d7273147e14b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ctr84rmo3xd2tzqcx2b277c8z692vhl5'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220722-0003/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/15/2'}]
{'cwe_ids': ['CWE-22', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:01Z', 'nvd_published_at': '2022-06-15T15:15:00Z'}
1.4.0
GHSA-xvc9-xwgj-4cq9
2023-06-13T18:20:41Z
2022-06-16T23:08:02Z
null
['CVE-2019-25008']
Integer Overflow in HeaderMap::reserve() can cause Denial of Service
HeaderMap::reserve() used usize::next_power_of_two() to calculate the increased capacity. However, next_power_of_two() silently overflows to 0 if given a sufficiently large number in release mode. If the map was not empty when the overflow happens, the library will invoke self.grow(0) and start infinite probing. This allows an attacker who controls the argument to reserve() to cause a potential denial of service (DoS). The flaw was corrected in 0.1.20 release of http crate.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['http::header::HeaderMap::reserve']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25008'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/http/issues/352'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0033.html'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:08:02Z', 'nvd_published_at': None}
1.4.0
GHSA-f5x9-8jwc-25rw
2022-06-02T20:37:48Z
2022-06-02T20:37:48Z
null
['CVE-2022-31015']
Uncaught Exception (due to a data race) leads to process termination in Waitress
### Impact Waitress may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. ### Patches This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket, instead it is always delegated to the main thread. ### Workarounds There is no work-around, however users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: [pylons-project-security@googlegroups.com](mailto:pylons-project-security@googlegroups.com) (if security related)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31015'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/issues/374'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/pull/377'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2022-205.yaml'}]
{'cwe_ids': ['CWE-248', 'CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:37:48Z', 'nvd_published_at': '2022-05-31T23:15:00Z'}
1.4.0
GHSA-5j8w-r7g8-5472
2022-06-16T23:42:08Z
2022-06-16T23:42:08Z
null
[]
Arrow2 allows double free in `safe` code
The struct `Ffi_ArrowArray` implements `#derive(Clone)` that is inconsistent with its custom implementation of `Drop`, resulting in a double free when cloned. Cloning this struct in `safe` results in a segmentation fault, which is unsound. This derive was removed from this struct. All users are advised to either: * bump the patch version of this crate (for versions `v0.7,v0.8,v0.9`), or * migrate to a more recent version of the crate (when using `<0.7`). Doing so elimitates this vulnerability (code no longer compiles).
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jorgecarleitao/arrow2/issues/880'}, {'type': 'PACKAGE', 'url': 'https://github.com/jorgecarleitao/arrow2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0012.html'}]
{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:42:08Z', 'nvd_published_at': None}
1.4.0
GHSA-rvp4-r3g6-8hxq
2023-08-08T20:30:32Z
2022-06-20T22:33:41Z
null
['CVE-2022-26850']
Insufficiently Protected Credentials via Insecure Temporary File in org.apache.nifi:nifi-single-user-utils
### Impact `org.apache.nifi.authentication.single.user.writer.StandardLoginCredentialsWriter` contains a local information disclosure vulnerability due to writing credentials (username and password) to a file that is readable by all other users on unix-like systems. On unix-like systems, the system's temporary directory is shared between all users on that system. As such, files written to that directory without setting the correct file permissions can allow other users on that system to view the contents of the files written to those temporary files. ### Source An insecure temporary file is created here: - https://github.com/apache/nifi/blob/6a1c7c72d5b91b9ce5d5cb5b86e3155d21e2c19b/nifi-commons/nifi-single-user-utils/src/main/java/org/apache/nifi/authentication/single/user/writer/StandardLoginCredentialsWriter.java#L75 The username and password credentials are written to this file here: - https://github.com/apache/nifi/blob/6a1c7c72d5b91b9ce5d5cb5b86e3155d21e2c19b/nifi-commons/nifi-single-user-utils/src/main/java/org/apache/nifi/authentication/single/user/writer/StandardLoginCredentialsWriter.java#L85-L95 ### Patches The vulnerability has been patched in version `1.16`. ### Prerequisites This vulnerability impacts Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Workarounds Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems. ### References - https://issues.apache.org/jira/browse/NIFI-9785 - https://github.com/apache/nifi/commit/859d5fe - https://github.com/apache/nifi/pull/5856 - https://nifi.apache.org/security.html#CVE-2022-26850 - https://twitter.com/JLLeitschuh/status/1511736635645435904?s=20&t=I3w3zF6Y2DUvWYsEFqERjg
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-single-user-utils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.15.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-rvp4-r3g6-8hxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26850'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/859d5fe'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/859d5fe8cfe05ad24600b021f0ebf15753a8105c'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-26850'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/06/2'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:33:41Z', 'nvd_published_at': '2022-04-06T18:15:00Z'}
1.4.0
GHSA-p56p-gq3f-whg8
2022-06-16T23:54:46Z
2022-06-16T23:54:46Z
null
[]
`Read` on uninitialized buffer may cause UB ( `read_entry()` )
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. There are two of such cases (`go_offset_log::read_entry()` & `offset_log::read_entry()`). Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'flumedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/pull/12/commits/1b643df85ca4a56f7d96105a9eb35e1b917ee488'}, {'type': 'PACKAGE', 'url': 'https://github.com/sunrise-choir/flumedb-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0086.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:54:46Z', 'nvd_published_at': None}
1.4.0
GHSA-552j-pv39-f3jf
2022-06-03T22:13:43Z
2022-06-03T00:00:58Z
null
['CVE-2021-34080']
OS Command injection in ssl-utils
OS Command Injection vulnerability in es128 ssl-utils 1.0.0 for Node.js allows attackers to execute arbitrary commands via unsanitized shell metacharacters provided to the createCertRequest() and the createCert() functions.
[]
[{'package': {'ecosystem': 'npm', 'name': 'ssl-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34080'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4782'}, {'type': 'PACKAGE', 'url': 'https://github.com/es128/ssl-utils'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:13:43Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-25mq-v84q-4j7r
2022-07-12T21:58:38Z
2022-06-21T16:57:10Z
null
['CVE-2022-31090']
CURLOPT_HTTPAUTH option not cleared on change of origin
### Impact `Authorization` headers on requests are sensitive information. When using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin, if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` and `CURLOPT_USERPWD` options before continuing, stopping curl from appending the `Authorization` header to the new request. Previously, we would only consider a change in host. Now, we consider any change in host, port or scheme to be a change in origin. ### Patches Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. ### Workarounds If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle stream handler backend, rather than curl. ### References * [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx) * [CVE-2022-27776](https://curl.se/docs/CVE-2022-27776.html) ### For more information If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however - please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31090'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-24'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}]
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T16:57:10Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
1.4.0
GHSA-4x5v-gmq8-25ch
2023-07-19T19:58:13Z
2022-06-03T00:01:00Z
null
['CVE-2021-43307']
Regular expression denial of service in semver-regex
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method
[]
[{'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43307'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/semver-regex/commit/d8ba39a528c1027c43ab23f12eec28ca4d40dd0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/semver-regex'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:26:33Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-m43h-hfrq-x8wx
2022-08-15T20:09:32Z
2022-06-28T00:00:48Z
null
['CVE-2022-26477']
SystemDS CPU exhaustion vulnerability
The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.systemds:systemds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'systemds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26477'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m43h-hfrq-x8wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/systemds'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/systemds/PYSEC-2022-222.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r4x2d2r6d4zykdrrx6s2l4qbxgzws0z3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220812-0003/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:06:14Z', 'nvd_published_at': '2022-06-27T18:15:00Z'}
1.4.0
GHSA-hc44-p2qq-cfm9
2022-12-05T22:26:47Z
2022-06-24T00:00:31Z
null
['CVE-2022-34184']
Cross-site Scripting in Jenkins CRX Content Package Deployer Plugin
Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34184'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:53Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-g67p-jvvc-qf54
2022-12-05T21:45:31Z
2022-06-24T00:00:31Z
null
['CVE-2022-34203']
Cross-Site Request Forgery in Jenkins EasyQA Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:53Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-6vcc-v9vw-g2x5
2022-06-17T19:20:55Z
2022-06-08T22:34:23Z
null
['CVE-2022-1993']
Path Traversal in Git HTTP endpoints in Gogs
### Impact The malicious user is able to craft HTTP requests to access unauthorized Git directories. All installations with are affected. ### Patches Path cleaning has accommodated for Git HTTP endpoints. Users should upgrade to 0.12.9 or the latest 0.13.0+dev. ### Workarounds N/A ### References https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d/ ### For more information If you have any questions or comments about this advisory, please post on #7002.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-6vcc-v9vw-g2x5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1993'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/7002'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/9bf748b6c4c9a17d3aa77f6b9abcfae65451febf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:34:23Z', 'nvd_published_at': '2022-06-09T17:15:00Z'}
1.4.0
GHSA-q559-8m2m-g699
2022-12-03T04:02:32Z
2022-06-21T20:07:16Z
null
['CVE-2022-31091']
Change in port should be considered a change in origin
### Impact `Authorization` and `Cookie` headers on requests are sensitive information. On making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme downgrade. Now, we consider any change in host, port or scheme to be a change in origin. ### Patches Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. ### Workarounds An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together. ### References * [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx) * [CVE-2022-27776](https://curl.se/docs/CVE-2022-27776.html) ### For more information If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31091'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-24'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:07:16Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
1.4.0
GHSA-gx6v-67qv-rhx5
2022-06-29T22:09:12Z
2022-06-21T00:00:48Z
null
['CVE-2017-20064']
Code injection in Elefant CMS
A vulnerability was found in Elefant CMS 1.3.12-RC. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /designer/add/layout. The manipulation leads to code injection. The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20064'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97261'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/39'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:12Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-pfrx-2q88-qq97
2022-07-05T21:24:52Z
2022-06-19T00:00:21Z
null
['CVE-2022-33987']
Got allows a redirect to a UNIX socket
The got package before 11.8.5 and 12.1.0 for Node.js allows a redirect to a UNIX socket.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'got'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'got'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33987'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/pull/2047'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/got'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/releases/tag/v11.8.5'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/releases/tag/v12.1.0'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:05:25Z', 'nvd_published_at': '2022-06-18T21:15:00Z'}
1.4.0
GHSA-mjjj-6p43-vhhv
2022-06-29T21:52:18Z
2022-06-25T00:00:51Z
null
['CVE-2022-21231']
Prototype Pollution in deep-get-set
All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deep-get-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21231'}, {'type': 'PACKAGE', 'url': 'https://github.com/acstll/deep-get-set'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T21:52:18Z', 'nvd_published_at': '2022-06-24T20:15:00Z'}
1.4.0
GHSA-978j-88f3-p5j3
2022-06-17T00:18:43Z
2022-06-17T00:18:43Z
null
[]
Threshold value is ignored (all shares are n=3)
Affected versions of this crate did not properly calculate secret shares requirements. This reduces the security of the algorithm by restricting the crate to always using a threshold value of three, rather than a configurable limit. The flaw was corrected by correctly configuring the threshold.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'shamir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Nebulosus/shamir/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nebulosus/shamir'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0160.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:18:43Z', 'nvd_published_at': None}
1.4.0
GHSA-wh6w-69xc-5rq5
2022-06-07T21:15:18Z
2022-06-07T00:00:33Z
null
['CVE-2022-23712']
Improper Check for Unusual or Exceptional Conditions in Elasticsearch
A Denial of Service flaw was discovered in Elasticsearch 8.0.0 through 8.2.0. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request. Version 8.2.1 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23712'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-4-and-8-2-1-security-update/305530'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220707-0010/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:15:18Z', 'nvd_published_at': '2022-06-06T18:15:00Z'}
1.4.0
GHSA-5ww9-9qp2-x524
2022-07-05T18:02:56Z
2022-06-24T00:00:31Z
null
['CVE-2022-33127']
Improper handling of double quotes in file name in Diffy in Windows environment
The function that calls the diff tool in versions of Diffy prior to 3.4.1 does not properly handle double quotes in a filename when run in a Windows environment. This allows attackers to execute arbitrary commands via a crafted string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'diffy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33127'}, {'type': 'WEB', 'url': 'https://github.com/samg/diffy/commit/478f392082b66d38f54a02b4bb9c41be32fd6593'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/diffy/CVE-2022-33127.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/samg/diffy'}, {'type': 'WEB', 'url': 'https://github.com/samg/diffy/blob/56fd935aea256742f7352b050592542d3d153bf6/CHANGELOG#L1'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:10Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-8v9w-p43c-r885
2022-06-29T21:42:56Z
2022-06-21T20:12:15Z
null
['CVE-2022-31100']
Reachable Assertion in rulex
### Impact When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result. This is a security concern for you, if - your service parses untrusted rulex expressions (expressions provided by an untrusted user), and - your service becomes unavailable when the thread running rulex panics. ### Patches The crashes are fixed in version **0.4.3**. Affected users are advised to update to this version. ### Workarounds You can use `catch_unwind` to recover from panics. ### For more information If you have any questions or comments about this advisory: * Open an issue in [rulex](https://github.com/rulex-rs/rulex/issues) * Email me at [ludwig.stecher@gmx.de](mailto:ludwig.stecher@gmx.de) ### Credits Credit for finding these bugs goes to - [cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz) and [afl.rs](https://github.com/rust-fuzz/afl.rs) - [evanrichter](https://github.com/evanrichter) - [ForAllSecure Mayhem](https://forallsecure.com/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rulex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/security/advisories/GHSA-8v9w-p43c-r885'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31100'}, {'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/commit/fac6d58b25c6f9f8c0a6cdc4dec75b37b219f1d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/rulex-rs/rulex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0031.html'}]
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:15Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
1.4.0
GHSA-r7jw-mg27-j839
2022-06-06T21:23:40Z
2022-06-04T00:00:56Z
null
['CVE-2022-1988']
Cross-site Scripting in FacturaScripts
FacturaScripts 2022.08 and prior is vulnerable to cross-site scripting. A patch is available on the `master` branch of the repository and anticipated to be part of version 2022.09.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.08'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1988'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/93fc65ced3847a8e0837561e9fdfa0dbace2cfcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:23:40Z', 'nvd_published_at': '2022-06-03T08:15:00Z'}
1.4.0
GHSA-q874-g24w-4q9g
2022-06-16T23:13:57Z
2022-06-16T23:13:57Z
null
['CVE-2022-29241']
Token bruteforcing
Affects: Notebook and Lab between 6.4.0?(potentially earlier) and 6.4.11 (currently latest). Jupyter Server <=1.16.0. If I am correct about the responsible code it will affect Jupyter-Server 1.17.0 and 2.0.0a0 as well. Description: If notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this url can be used from an xss payload (as in CVE-2021-32798) or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter_server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyter_server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0a0'}, {'fixed': '2.0.0a1'}]}], 'versions': ['2.0.0a0']}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-q874-g24w-4q9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2022-211.yaml'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:13:57Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
1.4.0
GHSA-fr2w-mp56-g4xp
2022-06-29T21:47:25Z
2022-06-17T01:16:55Z
null
['CVE-2022-2111']
Unrestricted Attachment Upload
### Impact InvenTree allows unrestricted upload of files as attachments to various database fields. Potentially dangerous files (such as HTML files containing malicious javascript) can be uploaded, and (when opened by the user) run the malicious code directly in the users browser. ![image](https://user-images.githubusercontent.com/10080325/173549827-af2d7a5c-1359-4d68-a920-dfdd0ccc882e.png) *Note that the upload of malicious files must be performed by an authenticated user account* ### Solution The solution for this vulnerability is to ensure that attachment files are downloaded to the local machine before opening, rather than opening the file in the current browser context. ### Patches - The issue is addressed in the upcoming 0.8.0 release - This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release ### Workarounds Users can alleviate risk of opening malicious files by right-clicking on the attachment link and selecting "Save link as" ![image](https://user-images.githubusercontent.com/10080325/173550035-2de4bf01-f0d3-4be8-ac45-6fbcf66a95e7.png) This minimizes risk (e.g. of XSS attacks) by opening the HTML file from the users computer ### References https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [github](http://github.com/inventree/inventree) * Email us at [security@inventree.org](mailto:security@inventree.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-fr2w-mp56-g4xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2111'}, {'type': 'WEB', 'url': 'https://github.com/inventree/inventree/commit/26bf51c20a1c9b3130ac5dd2e17649bece5ff84f'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:55Z', 'nvd_published_at': '2022-06-17T13:15:00Z'}
1.4.0
GHSA-jcr6-mmjj-pchw
2023-01-10T15:59:32Z
2022-12-28T00:30:23Z
null
['CVE-2017-20146']
gorilla/handlers may allow requester to bypass expected behavior of the Same Origin Policy
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gorilla/handlers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20146'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/handlers/pull/116'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145'}, {'type': 'PACKAGE', 'url': 'https://github.com/gorilla/handlers'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0020'}]
{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:18:39Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-x45c-cvp8-q4fm
2022-12-06T16:20:39Z
2022-12-05T23:08:37Z
null
['CVE-2022-46167']
Capsule vulnerable to privilege escalation by ServiceAccount deployed in a Tenant Namespace
Capsule implements a multi-tenant and policy-based environment in a Kubernetes cluster. A ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing all the enforcement like Pod Security annotations, Network Policies, Limit Range and Resource Quota items. With that said, an attacker could detach the Namespace from a Tenant that is forbidding starting privileged Pods using the Pod Security labels by removing the OwnerReference, removing the enforcement labels, and being able to start privileged containers that would be able to start a generic Kubernetes privilege escalation. ### Patches Patches have been released for version 0.1.3 and all users must upgrade to this release. ### Workarounds N.A. ### References N.A. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/clastix/capsule](https://github.com/clastix/capsule) * Reach out on [#capsule](https://kubernetes.slack.com/archives/C03GETTJQRL) channel available on Kubernetes Slack workspace
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/clastix/capsule'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/clastix/capsule/security/advisories/GHSA-x45c-cvp8-q4fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46167'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/commit/1df430e71be8c4778c82eca3459978ad7d0b4b7b'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/commit/75525ac19254b0c5111e34d7985e2be7bc8b1ac1'}, {'type': 'PACKAGE', 'url': 'https://github.com/clastix/capsule'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/releases/tag/v0.1.3'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:08:37Z', 'nvd_published_at': '2022-12-02T19:15:00Z'}
1.4.0
GHSA-pmg2-rph8-p8r6
2022-12-20T15:23:21Z
2022-12-16T00:30:44Z
null
['CVE-2022-45969']
Alist vulnerable to Path Traversal
In versions of Alist prior to 3.6.0, a user with only file upload permission can bypass the base path restriction by using '... /' to bypass the base path restriction and upload files to an arbitrary path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45969'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2449'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/commit/b5bf5f43253175b55fa2cb511fea601e677d2d83'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T17:21:27Z', 'nvd_published_at': '2022-12-15T23:15:00Z'}
1.4.0
GHSA-6jj8-mqx2-7fg5
2022-12-19T14:40:16Z
2022-12-15T21:30:28Z
null
['CVE-2020-36607']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36607'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:31:04Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-j7qp-mfxf-8xjw
2023-02-14T21:25:56Z
2022-12-07T23:13:02Z
null
['CVE-2022-23492']
libp2p DoS vulnerability from lack of resource management
### Impact Versions older than `v0.18.0` of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. In the original version of the attack, the malicious node would continue opening new streams on a stream multiplexer that doesn’t provide sufficient back pressure (yamux or mplex). It is easy to defend against this one attack, but there are countless variations of this attack: * Opening streams and causing a non-trivial memory allocation (e.g., for multistream or protobuf parsing) * Creating a lot of sybil nodes and opening new connections across nodes ### Patches (What to do as a go-libp2p consumer:) 1. Update your go-libp2p dependency to go-libp2p v0.18.0 or greater (current version as of publish date is [v0.24.0](https://github.com/libp2p/go-libp2p/releases/tag/v0.24.0).) - Note: **It's recommend that you update to `v0.21.0` onwards** as you’ll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. [Please see the v0.21.0 release notes for more info.](https://github.com/libp2p/go-libp2p/releases/tag/v0.21.0)) 2. Determine appropriate limits for your application - go-libp2p sets up a resource manager with the default limits if none are provided. For default definitions please see [limits_defaults.go](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/limit_defaults.go). These limits are also set to automatically scale, this is done using the [AutoScale method of the ScalingLimitConfig](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#scaling-limits). We recommend you [tune your limits as described here](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#how-to-tune-your-limits). 3. Configure your node to be attack resilient. See [how to respond to an attack and identify misbehaving peers here](https://docs.libp2p.io/concepts/security/dos-mitigation/#responding-to-an-attack). Then setup automatic blocking with fail2ban using canonical libp2p log lines: [guide on how to do so here](https://docs.libp2p.io/concepts/security/dos-mitigation/#how-to-automate-blocking-with-fail2ban). #### Examples * Lotus’ integration can be found in https://github.com/filecoin-project/lotus/blob/master/node/modules/lp2p/rcmgr.go. Lotus reads user-configured resource limits from a limits.json file into the root directory. This allows users to share their resource manager configuration independent of any other configurations. * Kubo’s (formerly go-ipfs) integration can be found in https://github.com/ipfs/go-ipfs/blob/master/core/node/libp2p/rcmgr.go. Kubo reads the limits from the IPFS config file. **Note:** go-libp2p still implements the [connection manager](https://github.com/libp2p/go-libp2p/tree/master/p2p/net/connmgr) mentioned above. The connection manager is a component independent of the resource manager, which aims to keep the number of libp2p connections between a low and a high watermark. When modifying connection limits, it’s advantageous to keep the configuration of these components consistent, i.e., when setting a limit of N concurrent connections in the resource manager, the high watermark should be at most (and ideally slightly less) than N. ### Workarounds Although there are no workarounds within go-libp2p, some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using `iptables` or `ufw` ) or making use of a load balancer in front of libp2p nodes. However these require direct action & responsibility on your part and are no substitutes for upgrading go-libp2p. Therefore, we highly recommend upgrading your go-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about go-libp2p resource utilization. ### References Please see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. Please see the related disclosure for rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv #### For more information If you have any questions or comments about this advisory email us at [security@libp2p.io](mailto:security@libp2p.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23492'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de'}, {'type': 'WEB', 'url': 'https://docs.libp2p.io/reference/dos-mitigation/'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1148'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:13:02Z', 'nvd_published_at': '2022-12-08T01:15:00Z'}
1.4.0
GHSA-33m8-f4hw-wm3q
2023-01-10T15:38:13Z
2022-12-27T15:30:18Z
null
['CVE-2022-4767']
usememos/memos Denial of Service vulnerability
Denial of Service in GitHub repository usememos/memos 0.9.0 and prior. A patch is available on the `main` branch at commit number f888c628408501daf639de07b90a72ab443b0f4c.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4767'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/f888c628408501daf639de07b90a72ab443b0f4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75b4a085-923c-4ecc-bbf6-e049290db502'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:50Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-h2ph-vhm7-g4hp
2022-12-09T15:20:21Z
2022-12-08T16:11:37Z
null
['CVE-2022-23469']
Traefik may display authorization header in the debug logs
### Impact There is a potential vulnerability in Traefik displaying the Authorization header in its debug logs. Traefik uses [oxy](https://github.com/vulcand/oxy) to provide the following features: - Round Robin: https://doc.traefik.io/traefik/routing/services/#weighted-round-robin-service - Buffering: https://doc.traefik.io/traefik/middlewares/http/buffering/ - Circuit Breaker: https://doc.traefik.io/traefik/middlewares/http/circuitbreaker/ - In-Flight Requests: https://doc.traefik.io/traefik/middlewares/http/inflightreq/ In such cases, if the log level is set to DEBUG, the credentials provided using the Authorization header are displayed in the debug logs: ``` level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\\"Method\\":\\"POST\\",\\"URL\\":{\\"Scheme\\":\\"\\",\\"Opaque\\":\\"\\",\\"User\\":null,\\"Host\\":\\"\\",\\"Path\\":\\"/<redacted>/<redacted>\\",\\"RawPath\\":\\"\\",\\"ForceQuery\\":false,\\"RawQuery\\":\\"\\",\\"Fragment\\":\\"\\",\\"RawFragment\\":\\"\\"},\\"Proto\\":\\"HTTP/2.0\\",\\"ProtoMajor\\":2,\\"ProtoMinor\\":0,\\"Header\\":{\\"Authorization\\":[\\"Bearer <token value was here>\\"],\\"Content-Type\\":[\\"application/grpc\\"],\\"Grpc-Accept-Encoding\\":[\\"gzip\\"],\\"Grpc-Timeout\\":[\\"29999886u\\"],\\"Te\\":[\\"trailers\\"],\\"User-Agent\\":[\\"<redacted>\\"],<remainder of log message removed> ``` ### Patches https://github.com/traefik/traefik/pull/9574 https://github.com/traefik/traefik/releases/tag/v2.9.6 ### Workarounds Set the log level to `INFO`, `WARN`, or `ERROR`. ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23469'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/9574'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.9.6'}]
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:37Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-4w2j-2rg4-5mjw
2022-12-22T03:33:42Z
2022-12-21T06:30:29Z
null
['CVE-2022-25893']
vm2 vulnerable to Arbitrary Code Execution
The package vm2 before 3.9.10 is vulnerable to Arbitrary Code Execution due to the usage of prototype lookup for the WeakMap.prototype.set method. Exploiting this vulnerability leads to access to a host object and a sandbox compromise.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25893'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/444'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/pull/445'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/pull/445/commits/3a9876482be487b78a90ac459675da7f83f46d69'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-VM2-2990237'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:33:42Z', 'nvd_published_at': '2022-12-21T05:15:00Z'}
1.4.0
GHSA-9cmm-52cv-6hvc
2022-12-27T01:02:26Z
2022-12-22T03:30:18Z
null
['CVE-2022-4647']
Microweber vulnerable to Stored Cross-Site Scripting
Microweber versions 1.3.1 and prior are vulnerable to stored Cross-site Scripting (XSS). A patch is available on the 1.4, dev, and laravel-sail branches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4647'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:40Z', 'nvd_published_at': '2022-12-22T02:15:00Z'}
1.4.0
GHSA-q2fj-6h62-59m2
2022-12-30T22:13:59Z
2022-12-30T22:13:59Z
null
[]
Apiman Vert.x Gateway has Transitive Hazelcast connection caching issue
### Impact If you are using the **Apiman Vert.x Gateway** prior to Apiman 3.0.0.Final, a connection caching issue in Hazelcast could allow an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity. Hazelcast is a transitive dependency of the Apiman Vert.x Gateway. The precise risk is difficult to quantify at this juncture as plugins deployed by users may make use of Hazelcast in a different manner to the main Apiman codebase. If any of your custom Apiman plugins specify Hazelcast dependencies, you should also bump these versions. Hint: an easy way to track Apiman dependency versions is to use `apiman-parent`. If you use the Apiman Tomcat or WildFly Gateway this does not affect you. ### Patches Upgrade to **Apiman 3.0.0.Final or later**. If you are using an older version of Apiman and need to remain on that version, contact to your Apiman support provider for advice/long-term support. ### Workarounds None (other than doing your own build). ### References * https://github.com/advisories/GHSA-c5hg-mr8r-f6jp
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-gateway-platforms-vertx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-distro-vertx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-q2fj-6h62-59m2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5hg-mr8r-f6jp'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:13:59Z', 'nvd_published_at': None}
1.4.0
GHSA-6w5w-wx8w-2cq9
2023-01-10T15:43:07Z
2022-12-28T15:30:46Z
null
['CVE-2022-4809']
usememos/memos Improper Access Control vulnerability
usememos/memos 0.9.0 and prior is vulnerable to full account takeover via changing user name, email address, and display name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4809'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:40Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-45rm-2893-5f49
2023-01-02T21:15:49Z
2022-12-22T06:30:15Z
null
['CVE-2022-25948']
liquidjs may leak properties of a prototype
The package liquidjs before 10.0.0 is vulnerable to Information Exposure when `ownPropertyOnly` parameter is set to `False`, which results in leaking properties of a prototype. Workaround For versions 9.34.0 and higher, an option to disable this functionality is provided.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'liquidjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25948'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/commit/7e99efc5131e20cf3f59e1fc2c371a15aa4109db'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/commit/7eb621601c2b05d6e379e5ce42219f2b1f556208'}, {'type': 'PACKAGE', 'url': 'https://github.com/harttle/liquidjs'}, {'type': 'WEB', 'url': 'https://groups.google.com/u/0/a/snyk.io/g/report/c/9ipXecWRtTM/m/IgLadevtCQAJ'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LIQUIDJS-2952868'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:15Z', 'nvd_published_at': '2022-12-22T05:15:00Z'}
1.4.0
GHSA-6fx9-29x2-fmfj
2023-01-10T15:44:37Z
2022-12-28T15:30:46Z
null
['CVE-2022-4814']
usememos/memos Improper Access Control vulnerability
Improper Access Control in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4814'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:12:23Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-whgh-g24c-3j5q
2022-12-13T19:23:13Z
2022-12-13T15:30:26Z
null
['CVE-2022-45690']
hutool-json stack overflow vulnerability
A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45690'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2746'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/issues/654'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/commit/7a124d857dc8da1165c87fa788e53359a317d0f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:23:13Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-vxwf-79ch-f7f7
2022-12-07T14:57:07Z
2022-12-07T06:30:26Z
null
['CVE-2022-41994']
baserCMS vulnerable to stored Cross-site Scripting
Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41994'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN_53682526'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN53682526/index.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:57:07Z', 'nvd_published_at': '2022-12-07T04:15:00Z'}
1.4.0
GHSA-vq23-hwg7-hxrh
2022-12-29T01:06:02Z
2022-12-21T21:30:15Z
null
['CVE-2020-36620']
EnumStringValues vulnerable to Uncontrolled Resource Consumption
A vulnerability was found in Brondahl EnumStringValues 4.0.1. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.2 to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'EnumStringValues'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36620'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/commit/c0fc7806beb24883cc2f9543ebc50c0820297307'}, {'type': 'PACKAGE', 'url': 'https://github.com/Brondahl/EnumStringValues'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/releases/tag/4.0.1'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/releases/tag/4.0.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216466'}]
{'cwe_ids': ['CWE-400', 'CWE-404'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:35:03Z', 'nvd_published_at': '2022-12-21T19:15:00Z'}
1.4.0
GHSA-228g-948r-83gx
2023-09-14T16:20:05Z
2022-12-13T17:39:36Z
null
['CVE-2022-23515']
Improper neutralization of data URIs may allow XSS in Loofah
## Summary Loofah `>= 2.1.0, < 2.19.1` is vulnerable to cross-site scripting via the `image/svg+xml` media type in data URIs. ## Mitigation Upgrade to Loofah `>= 2.19.1`. ## Severity The Loofah maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) - https://hackerone.com/reports/1694173 - https://github.com/flavorjones/loofah/issues/101 ## Credit This vulnerability was responsibly reported by Maciej Piechota (@haqpl).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23515'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/101'}, {'type': 'WEB', 'url': 'https://github.com/w3c/svgwg/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1694173'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:39:36Z', 'nvd_published_at': '2022-12-14T14:15:00Z'}
1.4.0
GHSA-6q6q-88xp-6f2r
2023-03-01T18:40:10Z
2022-12-28T00:30:22Z
null
['CVE-2022-3064']
yaml package for Go can consume excessive amounts of CPU or memory
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3064'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/releases/tag/v2.2.4'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0956'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:04:00Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-6jqm-3c9g-pch7
2022-12-12T21:28:35Z
2022-12-12T21:28:35Z
null
['CVE-2022-23510']
@cubejs-backend/api-gateway row level security bypass
### Impact All authenticated Cube clients could bypass row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint. ### Patches The change has been reverted in 0.31.24 ### Workarounds Upgrade to >=0.31.24 or downgrade to <=0.31.22 ### Post mortem As part of implementing the Cube Cloud SQL runner functionality, we’ve added a new endpoint to the Cube Core so that we could add arbitrary queries directly to the queue, bypassing the modeling layer. The endpoint was added in this commit: https://github.com/cube-js/cube.js/commit/f1e25bb50323c0b99f3891d349467e7b637baeea It went through the code review; however, it slipped everyone’s attention that this endpoint completely bypasses any row-level security logic implemented in the modeling layer. Now anyone with a valid Cube JWT token could fetch any data, even if they were not allowed to do so by their security context. The issue was noticed by the Core team on Dec 12 and immediately reverted. The just-released 0.31.23 version of the Cube has been pulled out of all the registries, and a CVE was published on Github. Another change (https://github.com/cube-js/cube.js/commit/2c5db32f2ded074ebe5e83668eee8c024101240b) was also rolled back along with the SQL runner endpoint. It didn't pose a significant security threat, but it increased the attacker’s ability to enumerate cube schema, and it should be revisited. The 0.31.24 was released to replace the revoked version with a change completely reverted. All customers are urged to upgrade to the newest Cube version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@cubejs-backend/api-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.31.23'}, {'fixed': '0.31.24'}]}], 'versions': ['0.31.23']}]
[{'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/security/advisories/GHSA-6jqm-3c9g-pch7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23510'}, {'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/commit/3c614674fed6ca17df08bbba8c835ef110167570'}, {'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/commit/f1140de508e359970ac82b50bae1c4bf152f6041'}, {'type': 'PACKAGE', 'url': 'https://github.com/cube-js/cube.js'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:28:35Z', 'nvd_published_at': '2022-12-09T23:15:00Z'}
1.4.0
GHSA-wgpp-g6v9-7hxp
2022-12-12T22:20:51Z
2022-12-12T09:30:35Z
null
['CVE-2022-46682']
Jenkins Plot Plugin XML External Entity Reference vulnerability
Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control XML input files for the 'Plot build data' build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. Plot Plugin 2.1.12 disables external entity resolution for its XML parser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46682'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/plot-plugin/commit/4f7afbe064aab538a242a9984e583e513863e0ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/plot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2940'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:20:51Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-v3c5-jqr6-7qm8
2023-01-13T20:45:37Z
2022-12-23T00:30:23Z
null
['CVE-2022-40899']
Python Charmers Future denial of service vulnerability
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. This issue has been patched in version 0.18.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'future'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.18.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40899'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/pull/610'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/pull/17157'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/commit/c91d70b34ef0402aef3e9d04364ba98509dca76f'}, {'type': 'PACKAGE', 'url': 'https://github.com/PythonCharmers/python-future'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215'}, {'type': 'WEB', 'url': 'https://pypi.org/project/future/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:50:24Z', 'nvd_published_at': '2022-12-23T00:15:00Z'}
1.4.0
GHSA-f552-97qx-c694
2023-01-02T21:18:58Z
2022-12-23T21:30:18Z
null
['CVE-2022-4692']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4692'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:58:02Z', 'nvd_published_at': '2022-12-23T20:15:00Z'}
1.4.0
GHSA-2c7v-qcjp-4mg2
2023-05-22T16:09:15Z
2022-12-14T21:42:00Z
null
['CVE-2022-41089']
.NET Remote Code Execution Vulnerability
# Microsoft Security Advisory CVE-2022-41089: .NET Remote Code Execution Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1, .NET 6.0., and .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A remote code execution vulnerability exists in .NET Core 3.1, .NET 6.0, and .NET 7.0, where a malicious actor could cause a user to run arbitrary code as a result of parsing maliciously crafted xps files. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/242 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 WinForms or WPF application running on .NET 7.0.0 or earlier. * Any .NET 6.0 WinForms or WPF application running on .NET 6.0.11 or earlier. * Any .NET Core 3.1 WinForms or WPF application running on .NET 3.1.31 or earlier. If the application does not utilize WinForms or WPF, it is not affected by this vulnerability. Applications targeting Mac, Linux, Android, iOS, and other non-Windows platforms are not affected by this vulnerability. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET Core 3.1"></a>.NET Core 3.1 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 3.1.0, <= 3.1.31|3.1.32 [Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 3.1.0, <= 3.1.31|3.1.32 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.11|6.0.12 [Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.11|6.0.12 [Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.11|6.0.12 ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64)|>= 7.0.0, <= 7.0.0|7.0.1 [Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 7.0.0, <= 7.0.0|7.0.1 [Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 7.0.0, <= 7.0.0|7.0.1 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 7.0, .NET 6.0 or .NET Core 3.1. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; * If you are using one of the affected packages, please update to the patched version listed above. ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.1 or SDK 7.0.101 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.12 or SDK 6.0.112 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0. * If you're using .NET Core 3.1, you should download and install Runtime 3.1.32 (for Visual Studio 2019 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/3.1. .NET 7.0, .NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Acknowledgements [Eleftherios Panos](https://twitter.com/lefterispan) with [Nettitude](https://www.nettitude.com/) [Nick Landers](https://twitter.com/monoxgas) with NetSPI ### Reporting Security Issues If you have found a potential security issue in .NET 7.0, .NET 6.0 or .NET Core 3.1, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/wpf/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2022-41089]( https://www.cve.org/CVERecord?id=CVE-2022-41089)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/security/advisories/GHSA-2c7v-qcjp-4mg2'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/242'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/5f4c0f7763a06b024c8a517616e0fc0194e997a4'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/7b0be4d41c33ce8525d8160bf8869cac10f8a8cd'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/c08825a9889e6c798fe95ed5ec1f6a9f517ab5a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/wpf'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:42:00Z', 'nvd_published_at': None}
1.4.0
GHSA-x9p9-v3x6-68mq
2023-01-10T16:02:34Z
2022-12-31T09:30:42Z
null
['CVE-2022-4866']
usememos/memos vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4866'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7670c9536000bb32c6345d4906a91268dcddd5fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:59Z', 'nvd_published_at': '2022-12-31T09:15:00Z'}
1.4.0
GHSA-43fp-rhv2-5gv8
2022-12-07T23:05:18Z
2022-12-07T23:05:18Z
null
['CVE-2022-23491']
Certifi removing TrustCor root certificate
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found [here](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'certifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2017.11.05'}, {'fixed': '2022.12.07'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23491'}, {'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/commit/9e9e840925d7b8e76c76fdac1fab7e6e88c1c3b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/certifi/python-certifi'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:05:18Z', 'nvd_published_at': '2022-12-07T22:15:00Z'}
1.4.0
GHSA-cwh7-28vg-jmpr
2023-01-10T16:12:39Z
2022-12-30T12:30:25Z
null
['CVE-2018-25059']
pastebinit Path Traversal vulnerability
A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument `r.URL.Path` leads to path traversal. Upgrading to version 0.2.3 can address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/jessfraz/pastebinit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25059'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/commit/1af2facb6d95976c532b7f8f82747d454a092272'}, {'type': 'PACKAGE', 'url': 'https://github.com/jessfraz/pastebinit'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/releases/tag/v0.2.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217040'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217040'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:28:42Z', 'nvd_published_at': '2022-12-30T11:15:00Z'}
1.4.0
GHSA-xj33-8r43-r227
2022-12-07T15:40:35Z
2022-12-06T00:30:16Z
null
['CVE-2022-43556']
Concrete CMS vulnerable to cross-site scripting in the text input field
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XSS in the text input field since the result dashboard page output is not sanitized. The Concrete CMS security team has ranked this 4.2 with CVSS v3.1 vector AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Remediate by updating to Concrete CMS 8.5.10 and Concrete CMS 9.1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43556'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:35:42Z', 'nvd_published_at': '2022-12-05T22:15:00Z'}
1.4.0
GHSA-2wpw-cm9w-v4xm
2023-01-06T18:33:17Z
2022-12-27T15:30:19Z
null
['CVE-2022-4719']
rdiffweb vulnerable to Business Logic Errors
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4719'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/bc4bed89affcba71251fe54ed10639da9d392c1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:09Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-ppp9-7jff-5vj2
2023-01-09T20:02:12Z
2022-12-26T06:30:22Z
null
['CVE-2021-38561']
golang.org/x/text/language Out-of-bounds Read vulnerability
golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text/language'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38561'}, {'type': 'WEB', 'url': 'https://deps.dev/advisory/OSV/GO-2021-0113'}, {'type': 'WEB', 'url': 'https://go.dev/cl/340830'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/golang.org/x/text/language'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0113'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:02:12Z', 'nvd_published_at': '2022-12-26T06:15:00Z'}
1.4.0
GHSA-hc37-84v3-8gmq
2022-12-22T15:33:16Z
2022-12-17T03:30:25Z
null
['CVE-2022-4572']
UBI Reader vulnerable to Path Traversal
A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 can address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ubi-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4572'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/pull/57'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/commit/d5d68e6b1b9f7070c29df5f67fc060f579ae9139'}, {'type': 'PACKAGE', 'url': 'https://github.com/jrspruitt/ubi_reader'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/releases/tag/v0.8.5-master'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216146'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:13:09Z', 'nvd_published_at': '2022-12-17T02:15:00Z'}
1.4.0
GHSA-gw9m-2m5v-c6x5
2023-01-10T00:53:55Z
2022-12-29T18:30:24Z
null
['CVE-2022-4845']
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4845'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:20Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-c5wx-6c2c-f7rm
2022-12-13T17:11:46Z
2022-12-13T17:11:46Z
null
['CVE-2022-23503']
TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework
### Problem Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code. The existence of individual TypoScript instructions for a particular form item (known as [`formDefinitionOverrides`](https://docs.typo3.org/c/typo3/cms-form/main/en-us/I/Concepts/FrontendRendering/Index.html#form-element-properties)) and a valid backend user account with access to the form module are needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above. ### References * [TYPO3-CORE-SA-2022-015](https://typo3.org/security/advisory/typo3-core-sa-2022-015)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.49'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23503'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-015'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:11:46Z', 'nvd_published_at': '2022-12-14T08:15:00Z'}
1.4.0
GHSA-qcw2-492v-57xj
2023-01-02T20:22:05Z
2022-12-23T12:30:25Z
null
['CVE-2022-4683']
usememos/memos missing Secure cookie attribute
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 is missing the Secure cookie attribute, making it vulnerable to session hijacking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4683'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7efa749c6628c75b19a912ca170529f5c293bb2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef'}]
{'cwe_ids': ['CWE-311', 'CWE-319', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T02:21:22Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-c4pm-63cg-9j7h
2022-12-12T20:46:11Z
2022-12-08T15:52:54Z
null
['CVE-2022-23496']
Yauaa vulnerable to ArrayIndexOutOfBoundsException triggered by a crafted Sec-Ch-Ua-Full-Version-List
### Impact Applications using the Client Hints analysis feature introduced with 7.0.0 can crash because the Yauaa library throws an ArrayIndexOutOfBoundsException. Applications that do not use this feature are not affected. ### Patches Upgrade to 7.9.0 ### Workarounds Catch and discard any exceptions from Yauaa.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-beam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-beam-sql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-elasticsearch-8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-flink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-flink-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-logparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-nifi-processors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-snowflake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-trino'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nielsbasjes/yauaa/security/advisories/GHSA-c4pm-63cg-9j7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23496'}, {'type': 'WEB', 'url': 'https://github.com/nielsbasjes/yauaa/commit/3017a866e2cff0d308f264b66fde4fa79e3beb9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/nielsbasjes/yauaa'}]
{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T15:52:54Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-m8r9-qxx8-mrxp
2023-01-10T00:50:35Z
2022-12-27T15:30:19Z
null
['CVE-2022-4724']
rdiffweb Improper Access Control vulnerability
Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4724'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/c4a19cf67d575c4886171b8efcbf4675d51f3929'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:00:15Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-gcjf-29m9-888q
2022-12-09T15:35:11Z
2022-12-07T09:30:23Z
null
['CVE-2022-46742']
PaddlePaddle vulnerable to Code Injection
Code injection in `paddle.audio.functional.get_window` in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution. A [patch](https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb) is available on the `develop` branch of the repository and anticipated to be part of a 2.4 release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0-rc0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46742'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/pull/47386'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:55:31Z', 'nvd_published_at': '2022-12-07T09:15:00Z'}
1.4.0
GHSA-4gjr-vgfx-9qvw
2022-12-14T21:54:22Z
2022-12-12T15:30:31Z
null
['CVE-2022-45968']
AList vulnerable to Improper Preservation of Permissions
Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). Version 3.5.1 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45968'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2444'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/commit/85e1350af82e1759ca6580895e48ab969eb566cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}]
{'cwe_ids': ['CWE-281', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:30:02Z', 'nvd_published_at': '2022-12-12T14:15:00Z'}
1.4.0
GHSA-8gh8-hqwg-xf34
2023-06-12T23:48:11Z
2022-12-25T21:30:22Z
null
['CVE-2021-4279']
Starcounter-Jack JSON-Patch Prototype Pollution vulnerability
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 can address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-json-patch'}, 'ecosystem_specific': {'affected_functions': ['fast-json-patch.applyOperation']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4279'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/pull/262'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/commit/7ad6af41eabb2d799f698740a91284d762c955c9'}, {'type': 'WEB', 'url': 'https://blog.effectrenan.com/pwn2win-2021-illusion-web-challenge/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/releases/tag/3.1.1'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-fast-json-patch/'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:22Z', 'nvd_published_at': '2022-12-25T20:15:00Z'}
1.4.0
GHSA-vp56-r7qv-783v
2023-01-10T15:58:40Z
2022-12-28T00:30:23Z
null
['CVE-2020-36559']
ahh vulnerable to Path Traversal
Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-aah/aah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'aahframe.work'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36559'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-aah/aah'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0033'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:07:19Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-p27h-4cpf-fw48
2023-01-10T21:42:08Z
2022-12-27T09:30:41Z
null
['CVE-2018-25049']
email-existence Inefficient Regular Expression Complexity vulnerability
A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `index.js`. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'email-existence'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25049'}, {'type': 'WEB', 'url': 'https://github.com/nmanousos/email-existence/pull/37'}, {'type': 'WEB', 'url': 'https://github.com/nmanousos/email-existence/commit/0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56'}, {'type': 'PACKAGE', 'url': 'https://github.com/nmanousos/email-existence'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216854'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216854'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:40:18Z', 'nvd_published_at': '2022-12-27T09:15:00Z'}
1.4.0
GHSA-7599-fqgm-v84p
2023-01-10T16:10:03Z
2022-12-31T21:30:20Z
null
['CVE-2018-25061']
rgb2hex vulnerable to inefficient regular expression complexity
A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 can address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rgb2hex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25061'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/commit/9e0c38594432edfa64136fdf7bb651835e17c34f'}, {'type': 'PACKAGE', 'url': 'https://github.com/christian-bromann/rgb2hex'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/releases/tag/v0.1.6'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217151'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217151'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:26:40Z', 'nvd_published_at': '2022-12-31T20:15:00Z'}
1.4.0
GHSA-rc58-qr9j-cpgw
2023-01-04T13:54:50Z
2022-12-20T12:30:22Z
null
['CVE-2022-46421']
Apache Airflow Hive Provider vulnerable to Command Injection
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider before 5.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46421'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/28101'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/09twdoyoybldlfj5gvk0qswtofh0rmp4'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:54:50Z', 'nvd_published_at': '2022-12-20T11:15:00Z'}
1.4.0
GHSA-7q4r-x5qg-mmcp
2023-01-06T03:20:36Z
2022-12-27T15:30:19Z
null
['CVE-2022-4723']
rdiffweb has no rate limit on resend email feature
rdiffweb prior to 2.5.5 has no rate limit on the "resend email feature" while enable or disable 2FA from `/prefs/mfa` endpoint .
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4723'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6e9ee210548f6d3210704cac302cfc7cdb239765'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:00:31Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-8qwh-rm6c-jv96
2023-01-09T20:08:56Z
2022-12-27T12:30:20Z
null
['CVE-2019-25088']
Oxidized Web vulnerable to Cross-site Scripting
A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file `lib/oxidized/web/views/conf_search.haml`. The manipulation of the argument `to_research` leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'oxidized-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25088'}, {'type': 'WEB', 'url': 'https://github.com/ytti/oxidized-web/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/ytti/oxidized-web/commit/55ab9bdc68b03ebce9280b8746ef31d7fdedcc45'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/oxidized-web/CVE-2019-25088.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/ytti/oxidized-web'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216870'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216870'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:08:56Z', 'nvd_published_at': '2022-12-27T10:15:00Z'}
1.4.0
GHSA-8w3p-qh3x-6gjr
2022-12-13T17:13:37Z
2022-12-13T17:13:37Z
null
['CVE-2022-23504']
TYPO3 CMS vulnerable to Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration
### Problem Due to the lack of handling user-submitted [YAML placeholder expressions](https://docs.typo3.org/m/typo3/reference-coreapi/main/en-us/Configuration/Yaml/YamlApi.html#custom-placeholder-processing) in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors. A valid backend user account having administrator privileges is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above. ### References * [TYPO3-CORE-SA-2022-016](https://typo3.org/security/advisory/typo3-core-sa-2022-016)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23504'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-016'}]
{'cwe_ids': ['CWE-200', 'CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:13:37Z', 'nvd_published_at': '2022-12-14T08:15:00Z'}
1.4.0
GHSA-3v7m-2jrh-vc93
2023-01-10T16:03:04Z
2022-12-31T00:30:21Z
null
['CVE-2022-4864']
Froxlor vulnerable to Argument Injection
Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4864'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/f2485ecd9aab8da544b5e12891d82ae6fcff5fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b'}]
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T16:56:36Z', 'nvd_published_at': '2022-12-30T23:15:00Z'}
1.4.0
GHSA-287q-jfcp-9vhv
2022-12-21T16:13:03Z
2022-12-15T21:30:26Z
null
['CVE-2022-4526']
django-photologue vulnerable to Cross-site Scripting
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.16 is able to address this issue. The name of the patch is 960cb060ce5e2964e6d716ff787c72fc18a371e7. It is recommended to apply a patch to fix this issue. VDB-215906 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-photologue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4526'}, {'type': 'WEB', 'url': 'https://github.com/richardbarran/django-photologue/issues/223'}, {'type': 'WEB', 'url': 'https://github.com/richardbarran/django-photologue/commit/960cb060ce5e2964e6d716ff787c72fc18a371e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/richardbarran/django-photologue'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215906'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:29:11Z', 'nvd_published_at': '2022-12-15T21:15:00Z'}
1.4.0
GHSA-mfmp-8mqg-q4wm
2023-01-10T15:46:53Z
2022-12-28T15:30:45Z
null
['CVE-2022-4803']
usememos/memos Improper Access Control vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Access Control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4803'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286'}]
{'cwe_ids': ['CWE-284', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:20Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-4gg5-vx3j-xwc7
2022-12-12T22:34:26Z
2022-12-12T15:30:33Z
null
['CVE-2022-3510']
Protobuf Java vulnerable to Uncontrolled Resource Consumption
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3510'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf/tree/main/java'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:34:26Z', 'nvd_published_at': '2022-12-12T13:15:00Z'}
1.4.0
GHSA-gqgq-784q-v9xp
2022-12-19T19:14:45Z
2022-12-15T21:30:29Z
null
['CVE-2022-40001']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the title field of the create article page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40001'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/65'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:25Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-9qgp-9wwc-v29r
2022-12-12T20:47:11Z
2022-12-08T16:11:54Z
null
['CVE-2022-46158']
PrestaShop has potential Information exposure in the upload directory
### Impact Potential Information exposure in the upload directory. ### Patches Patch in PrestaShop 1.7.8.8 ### References https://capec.mitre.org/data/definitions/87.html Thanks to DZPATROL
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-9qgp-9wwc-v29r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46158'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/8684d429fb7c3bb51efb098e8b92a1fd2958f8cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.8'}]
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:54Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-mw4x-g2x8-qcvf
2023-01-09T19:53:50Z
2022-12-25T18:30:28Z
null
['CVE-2021-4278']
tree-kit vulnerable to Prototype Pollution
A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tree-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4278'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/commit/a63f559c50d70e8cb2eaae670dec25d1dbc4afcd'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/tree-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/releases/tag/v0.7.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216765'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216765'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:53:50Z', 'nvd_published_at': '2022-12-25T16:15:00Z'}
1.4.0
GHSA-995x-33wq-8gc9
2023-08-08T22:09:46Z
2022-12-14T06:30:16Z
null
['CVE-2022-24377']
cycle-import-check vulnerable to Command Injection
The package cycle-import-check before version 1.3.2 is vulnerable to Command Injection via the `writeFileToTmpDirAndOpenIt` function due to improper user-input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cycle-import-check'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24377'}, {'type': 'WEB', 'url': 'https://github.com/Soontao/cycle-import-check/commit/1ca97b59df7e9c704471fcb4cf042ce76d7c9890'}, {'type': 'PACKAGE', 'url': 'https://github.com/Soontao/cycle-import-check'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:40:46Z', 'nvd_published_at': '2022-12-14T05:15:00Z'}
1.4.0
GHSA-mhhf-vgwh-fw9h
2023-05-04T20:06:09Z
2022-12-06T21:13:32Z
null
['CVE-2022-23472']
Passeo uses insecure random number generator
### Impact Everyone below v1.0.5 is impacted by this flaw, of confidentiality being at risk due to the password(s) being easily able to be guessed with Passeo's use of the ``random`` library. It is recommended to change any passwords made with Passeo before v1.0.5 and upgrade to v1.0.5, and v1.0.5 patches this with the ``secrets`` library. ### Workarounds No current workaround available than updating to v1.0.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Passeo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23472'}, {'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ArjunSharda/Passeo'}, {'type': 'WEB', 'url': 'https://peps.python.org/pep-0506/'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:13:32Z', 'nvd_published_at': '2022-12-06T18:15:00Z'}
1.4.0
GHSA-8vjp-hfgh-68rj
2022-12-19T19:14:35Z
2022-12-15T21:30:29Z
null
['CVE-2022-40000']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the username field of the admin log in page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40000'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/64'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:14Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-837v-6vgx-jqcc
2022-12-15T23:36:08Z
2022-12-12T15:30:31Z
null
['CVE-2021-4244']
yikes-inc-easy-mailchimp-extender Cross-site Scripting vulnerability
A vulnerability classified as problematic has been found in yikes-inc-easy-mailchimp-extender Plugin up to 6.8.5. This affects an unknown part of the file admin/partials/ajax/add_field_to_form.php. The manipulation of the argument field_name/merge_tag/field_type/list_id leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 6.8.6 can address this issue. The name of the patch is 3662c6593aa1bb4286781214891d26de2e947695. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215307.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yikesinc/yikes-inc-easy-mailchimp-extender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4244'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/pull/889'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/commit/3662c6593aa1bb4286781214891d26de2e947695'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/releases/tag/6.8.6'}, {'type': 'PACKAGE', 'url': 'https://github.com/yikesinc/yikes-inc-easy-mailchimp-extender'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215307'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:36:08Z', 'nvd_published_at': '2022-12-12T14:15:00Z'}
1.4.0
GHSA-9c47-m6qq-7p4h
2023-01-11T22:37:41Z
2022-12-29T01:51:03Z
null
['CVE-2022-46175']
Prototype Pollution in JSON5 via Parse Method
The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. ## Impact This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. ## Mitigation This vulnerability is patched in json5 v2.2.2 and later. A patch has also been backported for json5 v1 in versions v1.0.2 and later. ## Details Suppose a developer wants to allow users and admins to perform some risky operation, but they want to restrict what non-admins can do. To accomplish this, they accept a JSON blob from the user, parse it using `JSON5.parse`, confirm that the provided data does not set some sensitive keys, and then performs the risky operation using the validated data: ```js const JSON5 = require('json5'); const doSomethingDangerous = (props) => { if (props.isAdmin) { console.log('Doing dangerous thing as admin.'); } else { console.log('Doing dangerous thing as user.'); } }; const secCheckKeysSet = (obj, searchKeys) => { let searchKeyFound = false; Object.keys(obj).forEach((key) => { if (searchKeys.indexOf(key) > -1) { searchKeyFound = true; } }); return searchKeyFound; }; const props = JSON5.parse('{"foo": "bar"}'); if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) { doSomethingDangerous(props); // "Doing dangerous thing as user." } else { throw new Error('Forbidden...'); } ``` If the user attempts to set the `isAdmin` key, their request will be rejected: ```js const props = JSON5.parse('{"foo": "bar", "isAdmin": true}'); if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) { doSomethingDangerous(props); } else { throw new Error('Forbidden...'); // Error: Forbidden... } ``` However, users can instead set the `__proto__` key to `{"isAdmin": true}`. `JSON5` will parse this key and will set the `isAdmin` key on the prototype of the returned object, allowing the user to bypass the security check and run their request as an admin: ```js const props = JSON5.parse('{"foo": "bar", "__proto__": {"isAdmin": true}}'); if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) { doSomethingDangerous(props); // "Doing dangerous thing as admin." } else { throw new Error('Forbidden...'); } ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'json5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'json5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46175'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/issues/199'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/issues/295'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/pull/298'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/commit/62a65408408d40aeea14c7869ed327acead12972'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/commit/7774c1097993bc3ce9f0ac4b722a32bf7d6871c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/json5/json5'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:51:03Z', 'nvd_published_at': '2022-12-24T04:15:00Z'}
1.4.0
GHSA-969w-q74q-9j8v
2022-12-08T16:00:29Z
2022-12-08T16:00:29Z
null
[]
Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code
Because of incorrect bounds on method `Secp256k1::preallocated_gen_new` it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator. The method takes a place for storing the context as a mutable reference and returns context containing that reference. Because the code internally uses `unsafe` and the bounds were incorrect it was possible to create a context that outlived the passed reference (e.g. `'static`). Because the context can alternatively carry heap-allocated pointer freed on drop it was possible to "deallocate" a pointer that wasn't returned from appropriate allocator. The code decides whether to free the memory based on type parameter but because of missing bound it was possible to construct the context with invalid parameter. You are unaffected if you either * don't call `Secp256k1::preallocated_gen_new` * manually checked that your usage of the method is sound * upgraded to the patched version of `secp256k1` (recommended) The patched version uses correct bounds which means it is API-breaking. This effectively means adopting the policy of Rust lang itself allowing API-breaking changes to fix soundness bugs. Note however that valid straigthforward usage of the code will continue to compile. Only unsound code or code that propagates the bound in custom generics will fail to compile. If the code is sound fixing the bounds should be sufficient to make the code compile. See the [GitHub issue](https://github.com/rust-bitcoin/rust-secp256k1/issues/543) for example "exploit" code and further discussion.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.22.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.24.0'}, {'fixed': '0.24.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rust-bitcoin/rust-secp256k1/issues/543'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-bitcoin/rust-secp256k1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0070.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:00:29Z', 'nvd_published_at': None}
1.4.0
GHSA-x87m-36g7-6mpw
2022-12-13T13:50:43Z
2022-12-10T00:30:17Z
null
['CVE-2022-34297']
Yii2 Gii Cross-site Scripting vulnerability
Some fields like Message Category (requires I18N enabled) in Model Generator, CRUD Generator or Form Generator, Author Name in Extension Generator, etc. are being cached without sanitisation of their contents when the Preview button is pressed. This leads to possibility of injecting malicious javascript in specified pages by placing it in said fields and caching it by pressing Preview button. On each consequent visit of specified pages malicious javascript will be loaded from server and executed in client's browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-gii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34297'}, {'type': 'WEB', 'url': 'https://gist.github.com/be4r/b5c48d97ef6726d3ee37f995ee5aac81'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T13:50:43Z', 'nvd_published_at': '2022-12-09T22:15:00Z'}
1.4.0
GHSA-qwph-4952-7xr6
2023-07-14T22:03:13Z
2022-12-22T03:32:59Z
null
['CVE-2022-23540']
jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
# Overview In versions <=8.5.1 of jsonwebtoken library, lack of algorithm definition and a falsy secret or key in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. # Am I affected? You will be affected if all the following are true in the `jwt.verify()` function: - a token with no signature is received - no algorithms are specified - a falsy (e.g. null, false, undefined) secret or key is passed # How do I fix it? Update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method. # Will the fix impact my users? There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23540'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}]
{'cwe_ids': ['CWE-287', 'CWE-327', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:32:59Z', 'nvd_published_at': '2022-12-22T19:15:00Z'}
1.4.0
GHSA-27h2-hvpr-p74q
2023-01-27T21:51:55Z
2022-12-22T03:31:28Z
2023-01-27T21:51:55Z
['CVE-2022-23529']
jsonwebtoken has insecure input validation in jwt.verify function
# Overview For versions `<=8.5.1` of `jsonwebtoken` library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the `secretOrPublicKey` argument from the [readme link](https://github.com/auth0/node-jsonwebtoken#jwtverifytoken-secretorpublickey-options-callback)) of the `jwt.verify()` function, they can gain remote code execution (RCE). # Am I affected? This security issue is a concern when the `jsonwebtoken` library is used in an insecure way. Users are affected only if they allow untrusted entities to modify the key retrieval parameter of the `jwt.verify()` on a host that you control. In this scenario, if all the prerequisites are met, the issue may be exploitable. The source of this risk in this scenario would be in the calling code, and not in the library itself. # How do I fix it? Users of jsonwebtoken 8.5.1 and earlier are encouraged to update to the latest version, 9.0.0, which presents safer code and important security checks that fixes this security flaw and others and prevents misuse of the package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-27h2-hvpr-p74q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23529'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:31:28Z', 'nvd_published_at': '2022-12-21T21:15:00Z'}
1.4.0
GHSA-grr4-wv38-f68w
2023-01-04T14:25:45Z
2022-12-13T15:30:27Z
null
['CVE-2022-45693']
Jettison Out-of-bounds Write vulnerability
Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45693'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/52'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:25:45Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-5vw4-v588-pgv8
2023-01-10T16:02:05Z
2022-12-28T00:30:23Z
null
['CVE-2015-10004']
robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/robbert229/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170426191122-ca1404ee6e83'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10004'}, {'type': 'WEB', 'url': 'https://github.com/robbert229/jwt/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654'}, {'type': 'PACKAGE', 'url': 'https://github.com/robbert229/jwt'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0023'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:33:01Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-f8cc-g7j8-xxpm
2022-12-30T16:58:39Z
2022-12-30T16:58:39Z
null
['CVE-2022-40151']
XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow
### Impact The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead. ### Workarounds The only solution is to catch the StackOverflowError in the client code calling XStream. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2022-40151](https://x-stream.github.io/CVE-2022-40151.html). ### Credits The vulnerability was discovered and reported by Henry Lin of the Google OSS-Fuzz team. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-f8cc-g7j8-xxpm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40151'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/314'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2022-40151.html'}]
{'cwe_ids': ['CWE-121', 'CWE-502', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:58:39Z', 'nvd_published_at': None}
1.4.0
GHSA-m7qp-cj9p-gj85
2023-01-09T21:50:04Z
2022-12-28T18:30:20Z
null
['CVE-2021-4294']
OpenShift OSIN vulnerable to Observable Timing Discrepancy
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function `ClientSecretMatches/CheckClientSecret`. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/osin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2-0.20210113124101-8612686d6dda'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4294'}, {'type': 'WEB', 'url': 'https://github.com/openshift/osin/pull/200'}, {'type': 'WEB', 'url': 'https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/osin'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1201'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216987'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:50:04Z', 'nvd_published_at': '2022-12-28T17:15:00Z'}
1.4.0
GHSA-9v48-2h5x-fvpm
2023-01-23T19:32:20Z
2022-12-23T12:30:25Z
null
['CVE-2022-4685']
usememos/memos vulnerable to improper access control
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4685'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/015dbf52-8924-4aad-86d7-892cb61157af'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:50:36Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-3x8r-x6xp-q4vm
2022-12-13T17:40:50Z
2022-12-13T17:40:50Z
null
['CVE-2022-23516']
Uncontrolled Recursion in Loofah
## Summary Loofah `>= 2.2.0, < 2.19.1` uses recursion for sanitizing `CDATA` sections, making it susceptible to stack exhaustion and raising a `SystemStackError` exception. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to Loofah `>= 2.19.1`. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized. ## Severity The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-674: Uncontrolled Recursion (4.9)](https://cwe.mitre.org/data/definitions/674.html)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23516'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/86f7f6364491b0099d215db858ecdc0c89ded040'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23516.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:40:50Z', 'nvd_published_at': '2022-12-14T14:15:00Z'}