schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qgrp-8f3v-q85p | 2022-06-16T23:41:45Z | 2022-06-16T23:41:45Z | null | [] | `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets | `FixedSizeBinaryArray` performs insufficient bounds checks, which allows out-of-bounds reads in safe code.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/issues/774'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0118.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9v73-x562-wv5x | 2022-06-15T19:45:01Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34081'] | OS Command Injection in gitsome | OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gitsome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34081'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4780'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitsome'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:09:24Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-fp76-f299-v3hj | 2022-06-24T00:51:53Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2065'] | Cross-site Scripting in FacturaScripts | Cross-site Scripting (XSS) - Stored in GitHub repository neorazorx/facturascripts prior to 2022.06. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2065'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/1d1edb40b40016d7fd2893b410b98569d7facca1'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bcb44da4-d5c9-4830-924f-02d6defe6506'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:51:53Z', 'nvd_published_at': '2022-06-13T13:15:00Z'} |
1.4.0 | GHSA-xxhf-xq6v-c8mj | 2022-12-05T22:35:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34180'] | Improper authorization in Jenkins Embeddable Build Status Plugin bypasses ViewStatus permission requirement | Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for \"unprotected\" status badge access.
This allows attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.
Embeddable Build Status Plugin 2.0.4 requires ViewStatus permission to obtain the build status badge icon. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34180'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/402148784b3f4b029eaf47cc26ebf6b9bc636183'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2794'}] | {'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-cv76-rv4h-4mqc | 2022-06-03T22:24:14Z | 2022-06-03T00:00:59Z | null | ['CVE-2021-34082'] | OS Command Injection in proctree | OS Command Injection vulnerability in allenhwkim proctree through 0.1.1 and commit 0ac10ae575459457838f14e21d5996f2fa5c7593 for Node.js, allows attackers to execute arbitrary commands via the fix function. | [] | [{'package': {'ecosystem': 'npm', 'name': 'proctree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34082'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4783'}, {'type': 'PACKAGE', 'url': 'https://github.com/allenhwkim/proctree'}, {'type': 'WEB', 'url': 'https://github.com/allenhwkim/proctree/blob/master/index.js#L46'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:24:14Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-mhp7-3393-pfqr | 2022-12-06T00:02:19Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34172'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.340, symbol-based icons unescape previously escaped values of `tooltip` parameters.
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability. Symbol-based icons no longer unescape values of `tooltip` parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.340'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.332'}, {'fixed': '2.332.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34172'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:02:19Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-vvv8-xw5f-3f88 | 2022-06-20T22:33:58Z | 2022-06-18T00:00:20Z | null | ['CVE-2022-21213'] | Prototype Pollution in mout | This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21213'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/pull/279'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/commit/17ffdc2a96417a63a0147156dc045e90d0d14c64'}, {'type': 'PACKAGE', 'url': 'https://github.com/mout/mout'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepFillIn.js'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepMixIn.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOUT-2342654'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:33:58Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-xvf7-4v9q-58w6 | 2022-06-20T21:58:35Z | 2022-06-11T00:00:17Z | null | ['CVE-2022-25851'] | Infinite loop in jpeg-js | The package jpeg-js before 0.4.4 is vulnerable to Denial of Service (DoS) where a particular piece of input will cause the program to enter an infinite loop and never return. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jpeg-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25851'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/pull/106/'}, {'type': 'WEB', 'url': 'https://github.com/jpeg-js/jpeg-js/commit/9ccd35fb5f55a6c4f1902ac5b0f270f675750c27'}, {'type': 'PACKAGE', 'url': 'https://github.com/jpeg-js/jpeg-js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:00:49Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-5crp-9r3c-p9vr | 2022-12-08T16:42:36Z | 2022-06-22T15:08:47Z | null | [] | Improper Handling of Exceptional Conditions in Newtonsoft.Json | Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of expressions with high nesting level that lead to StackOverFlow exception or high CPU and RAM usage. Exploiting this vulnerability results in Denial Of Service (DoS).
The serialization and deserialization path have different properties regarding the issue.
Deserializing methods (like `JsonConvert.DeserializeObject`) will process the input that results in burning the CPU, allocating memory, and consuming a thread of execution. Quite high nesting level (>10kk, or 9.5MB of `{a:{a:{...` input) is needed to achieve the latency over 10 seconds, depending on the hardware.
Serializing methods (like `JsonConvert.Serialize` or `JObject.ToString`) will throw StackOverFlow exception with the nesting level of around 20k.
To mitigate the issue one either need to update Newtonsoft.Json to 13.0.1 or set `MaxDepth` parameter in the `JsonSerializerSettings`. This can be done globally with the following statement. After that the parsing of the nested input will fail fast with `Newtonsoft.Json.JsonReaderException`:
```
JsonConvert.DefaultSettings = () => new JsonSerializerSettings { MaxDepth = 128 };
```
Repro code:
```
//Create a string representation of an highly nested object (JSON serialized)
int nRep = 25000;
string json = string.Concat(Enumerable.Repeat("{a:", nRep)) + "1" +
string.Concat(Enumerable.Repeat("}", nRep));
//Parse this object (leads to high CPU/RAM consumption)
var parsedJson = JsonConvert.DeserializeObject(json);
// Methods below all throw stack overflow with nRep around 20k and higher
// string a = parsedJson.ToString();
// string b = JsonConvert.SerializeObject(parsedJson);
```
### Additional affected product and version information
**The original statement about the problem only affecting IIS applications is misleading.** Any application is affected, however the IIS has a behavior that stops restarting the instance after some time resulting in a harder-to-fix DoS.** | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Newtonsoft.Json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/issues/2457'}, {'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/pull/2462'}, {'type': 'WEB', 'url': 'https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/2018/10/22/StackOverflowException/'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/vulns/aleph-2018004'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesNK/Newtonsoft.Json'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678'}] | {'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T15:08:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-58jx-f5rf-qgqf | 2022-06-24T19:54:22Z | 2022-06-16T00:00:21Z | null | ['CVE-2021-33036'] | User account escalation in Apache Hadoop | In Apache Hadoop 2.2.0 to 2.10.1, 3.0.0-alpha1 to 3.1.4, 3.2.0 to 3.2.2, and 3.3.0 to 3.3.1, a user who can escalate to yarn user can possibly run arbitrary commands as root user. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33036'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/227d64ab59e8aa6477769b2542ad0cd7a6d855cb'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/45801fba8b00257ab32c02a7d1a05948ba687a49'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/ba041fe6d34215f075e0a7b2078d7273147e14b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ctr84rmo3xd2tzqcx2b277c8z692vhl5'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220722-0003/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/15/2'}] | {'cwe_ids': ['CWE-22', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:01Z', 'nvd_published_at': '2022-06-15T15:15:00Z'} |
1.4.0 | GHSA-xvc9-xwgj-4cq9 | 2023-06-13T18:20:41Z | 2022-06-16T23:08:02Z | null | ['CVE-2019-25008'] | Integer Overflow in HeaderMap::reserve() can cause Denial of Service | HeaderMap::reserve() used usize::next_power_of_two() to calculate the increased capacity. However, next_power_of_two() silently overflows to 0 if given a sufficiently large number in release mode.
If the map was not empty when the overflow happens, the library will invoke self.grow(0) and start infinite probing. This allows an attacker who controls the argument to reserve() to cause a potential denial of service (DoS).
The flaw was corrected in 0.1.20 release of http crate. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'http'}, 'ecosystem_specific': {'affected_functions': ['http::header::HeaderMap::reserve']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25008'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/http/issues/352'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0033.html'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:08:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5x9-8jwc-25rw | 2022-06-02T20:37:48Z | 2022-06-02T20:37:48Z | null | ['CVE-2022-31015'] | Uncaught Exception (due to a data race) leads to process termination in Waitress | ### Impact
Waitress may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed.
### Patches
This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket, instead it is always delegated to the main thread.
### Workarounds
There is no work-around, however users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: [pylons-project-security@googlegroups.com](mailto:pylons-project-security@googlegroups.com) (if security related)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31015'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/issues/374'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/pull/377'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2022-205.yaml'}] | {'cwe_ids': ['CWE-248', 'CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:37:48Z', 'nvd_published_at': '2022-05-31T23:15:00Z'} |
1.4.0 | GHSA-5j8w-r7g8-5472 | 2022-06-16T23:42:08Z | 2022-06-16T23:42:08Z | null | [] | Arrow2 allows double free in `safe` code | The struct `Ffi_ArrowArray` implements `#derive(Clone)` that is inconsistent with
its custom implementation of `Drop`, resulting in a double free when cloned.
Cloning this struct in `safe` results in a segmentation fault, which is unsound.
This derive was removed from this struct. All users are advised to either:
* bump the patch version of this crate (for versions `v0.7,v0.8,v0.9`), or
* migrate to a more recent version of the crate (when using `<0.7`).
Doing so elimitates this vulnerability (code no longer compiles).
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'arrow2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jorgecarleitao/arrow2/issues/880'}, {'type': 'PACKAGE', 'url': 'https://github.com/jorgecarleitao/arrow2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0012.html'}] | {'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:42:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rvp4-r3g6-8hxq | 2023-08-08T20:30:32Z | 2022-06-20T22:33:41Z | null | ['CVE-2022-26850'] | Insufficiently Protected Credentials via Insecure Temporary File in org.apache.nifi:nifi-single-user-utils | ### Impact
`org.apache.nifi.authentication.single.user.writer.StandardLoginCredentialsWriter` contains a local information disclosure vulnerability due to writing credentials (username and password) to a file that is readable by all other users on unix-like systems. On unix-like systems, the system's temporary directory is shared between all users on that system. As such, files written to that directory without setting the correct file permissions can allow other users on that system to view the contents of the files written to those temporary files.
### Source
An insecure temporary file is created here:
- https://github.com/apache/nifi/blob/6a1c7c72d5b91b9ce5d5cb5b86e3155d21e2c19b/nifi-commons/nifi-single-user-utils/src/main/java/org/apache/nifi/authentication/single/user/writer/StandardLoginCredentialsWriter.java#L75
The username and password credentials are written to this file here:
- https://github.com/apache/nifi/blob/6a1c7c72d5b91b9ce5d5cb5b86e3155d21e2c19b/nifi-commons/nifi-single-user-utils/src/main/java/org/apache/nifi/authentication/single/user/writer/StandardLoginCredentialsWriter.java#L85-L95
### Patches
The vulnerability has been patched in version `1.16`.
### Prerequisites
This vulnerability impacts Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.
### Workarounds
Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems.
### References
- https://issues.apache.org/jira/browse/NIFI-9785
- https://github.com/apache/nifi/commit/859d5fe
- https://github.com/apache/nifi/pull/5856
- https://nifi.apache.org/security.html#CVE-2022-26850
- https://twitter.com/JLLeitschuh/status/1511736635645435904?s=20&t=I3w3zF6Y2DUvWYsEFqERjg | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-single-user-utils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.15.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-rvp4-r3g6-8hxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26850'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/859d5fe'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/859d5fe8cfe05ad24600b021f0ebf15753a8105c'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-26850'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/06/2'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:33:41Z', 'nvd_published_at': '2022-04-06T18:15:00Z'} |
1.4.0 | GHSA-p56p-gq3f-whg8 | 2022-06-16T23:54:46Z | 2022-06-16T23:54:46Z | null | [] | `Read` on uninitialized buffer may cause UB ( `read_entry()` ) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
There are two of such cases (`go_offset_log::read_entry()` & `offset_log::read_entry()`).
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'flumedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/pull/12/commits/1b643df85ca4a56f7d96105a9eb35e1b917ee488'}, {'type': 'PACKAGE', 'url': 'https://github.com/sunrise-choir/flumedb-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0086.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:54:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-552j-pv39-f3jf | 2022-06-03T22:13:43Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34080'] | OS Command injection in ssl-utils | OS Command Injection vulnerability in es128 ssl-utils 1.0.0 for Node.js allows attackers to execute arbitrary commands via unsanitized shell metacharacters provided to the createCertRequest() and the createCert() functions. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ssl-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34080'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4782'}, {'type': 'PACKAGE', 'url': 'https://github.com/es128/ssl-utils'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:13:43Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-25mq-v84q-4j7r | 2022-07-12T21:58:38Z | 2022-06-21T16:57:10Z | null | ['CVE-2022-31090'] | CURLOPT_HTTPAUTH option not cleared on change of origin | ### Impact
`Authorization` headers on requests are sensitive information. When using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin, if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` and `CURLOPT_USERPWD` options before continuing, stopping curl from appending the `Authorization` header to the new request. Previously, we would only consider a change in host. Now, we consider any change in host, port or scheme to be a change in origin.
### Patches
Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port.
### Workarounds
If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle stream handler backend, rather than curl.
### References
* [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx)
* [CVE-2022-27776](https://curl.se/docs/CVE-2022-27776.html)
### For more information
If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however - please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31090'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-24'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}] | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T16:57:10Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-4x5v-gmq8-25ch | 2023-07-19T19:58:13Z | 2022-06-03T00:01:00Z | null | ['CVE-2021-43307'] | Regular expression denial of service in semver-regex | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method | [] | [{'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43307'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/semver-regex/commit/d8ba39a528c1027c43ab23f12eec28ca4d40dd0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/semver-regex'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:26:33Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-m43h-hfrq-x8wx | 2022-08-15T20:09:32Z | 2022-06-28T00:00:48Z | null | ['CVE-2022-26477'] | SystemDS CPU exhaustion vulnerability | The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.systemds:systemds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'systemds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26477'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m43h-hfrq-x8wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/systemds'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/systemds/PYSEC-2022-222.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r4x2d2r6d4zykdrrx6s2l4qbxgzws0z3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220812-0003/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:06:14Z', 'nvd_published_at': '2022-06-27T18:15:00Z'} |
1.4.0 | GHSA-hc44-p2qq-cfm9 | 2022-12-05T22:26:47Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34184'] | Cross-site Scripting in Jenkins CRX Content Package Deployer Plugin | Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crx-content-package-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34184'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crx-content-package-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:53Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-g67p-jvvc-qf54 | 2022-12-05T21:45:31Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34203'] | Cross-Site Request Forgery in Jenkins EasyQA Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:53Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-6vcc-v9vw-g2x5 | 2022-06-17T19:20:55Z | 2022-06-08T22:34:23Z | null | ['CVE-2022-1993'] | Path Traversal in Git HTTP endpoints in Gogs | ### Impact
The malicious user is able to craft HTTP requests to access unauthorized Git directories. All installations with are affected.
### Patches
Path cleaning has accommodated for Git HTTP endpoints. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
### Workarounds
N/A
### References
https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d/
### For more information
If you have any questions or comments about this advisory, please post on #7002.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-6vcc-v9vw-g2x5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1993'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/7002'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/9bf748b6c4c9a17d3aa77f6b9abcfae65451febf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:34:23Z', 'nvd_published_at': '2022-06-09T17:15:00Z'} |
1.4.0 | GHSA-q559-8m2m-g699 | 2022-12-03T04:02:32Z | 2022-06-21T20:07:16Z | null | ['CVE-2022-31091'] | Change in port should be considered a change in origin | ### Impact
`Authorization` and `Cookie` headers on requests are sensitive information. On making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme downgrade. Now, we consider any change in host, port or scheme to be a change in origin.
### Patches
Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5.
### Workarounds
An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.
### References
* [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx)
* [CVE-2022-27776](https://curl.se/docs/CVE-2022-27776.html)
### For more information
If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31091'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-24'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:07:16Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-gx6v-67qv-rhx5 | 2022-06-29T22:09:12Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20064'] | Code injection in Elefant CMS | A vulnerability was found in Elefant CMS 1.3.12-RC. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /designer/add/layout. The manipulation leads to code injection. The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20064'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97261'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/39'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:12Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-pfrx-2q88-qq97 | 2022-07-05T21:24:52Z | 2022-06-19T00:00:21Z | null | ['CVE-2022-33987'] | Got allows a redirect to a UNIX socket | The got package before 11.8.5 and 12.1.0 for Node.js allows a redirect to a UNIX socket. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'got'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'got'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33987'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/pull/2047'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/got'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/releases/tag/v11.8.5'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/got/releases/tag/v12.1.0'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:05:25Z', 'nvd_published_at': '2022-06-18T21:15:00Z'} |
1.4.0 | GHSA-mjjj-6p43-vhhv | 2022-06-29T21:52:18Z | 2022-06-25T00:00:51Z | null | ['CVE-2022-21231'] | Prototype Pollution in deep-get-set | All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deep-get-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21231'}, {'type': 'PACKAGE', 'url': 'https://github.com/acstll/deep-get-set'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T21:52:18Z', 'nvd_published_at': '2022-06-24T20:15:00Z'} |
1.4.0 | GHSA-978j-88f3-p5j3 | 2022-06-17T00:18:43Z | 2022-06-17T00:18:43Z | null | [] | Threshold value is ignored (all shares are n=3) | Affected versions of this crate did not properly calculate secret shares requirements.
This reduces the security of the algorithm by restricting the crate to always
using a threshold value of three, rather than a configurable limit.
The flaw was corrected by correctly configuring the threshold.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'shamir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Nebulosus/shamir/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nebulosus/shamir'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0160.html'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:18:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wh6w-69xc-5rq5 | 2022-06-07T21:15:18Z | 2022-06-07T00:00:33Z | null | ['CVE-2022-23712'] | Improper Check for Unusual or Exceptional Conditions in Elasticsearch | A Denial of Service flaw was discovered in Elasticsearch 8.0.0 through 8.2.0. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request. Version 8.2.1 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23712'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-4-and-8-2-1-security-update/305530'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220707-0010/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}] | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:15:18Z', 'nvd_published_at': '2022-06-06T18:15:00Z'} |
1.4.0 | GHSA-5ww9-9qp2-x524 | 2022-07-05T18:02:56Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-33127'] | Improper handling of double quotes in file name in Diffy in Windows environment | The function that calls the diff tool in versions of Diffy prior to 3.4.1 does not properly handle double quotes in a filename when run in a Windows environment. This allows attackers to execute arbitrary commands via a crafted string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'diffy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33127'}, {'type': 'WEB', 'url': 'https://github.com/samg/diffy/commit/478f392082b66d38f54a02b4bb9c41be32fd6593'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/diffy/CVE-2022-33127.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/samg/diffy'}, {'type': 'WEB', 'url': 'https://github.com/samg/diffy/blob/56fd935aea256742f7352b050592542d3d153bf6/CHANGELOG#L1'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:10Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-8v9w-p43c-r885 | 2022-06-29T21:42:56Z | 2022-06-21T20:12:15Z | null | ['CVE-2022-31100'] | Reachable Assertion in rulex | ### Impact
When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result.
This is a security concern for you, if
- your service parses untrusted rulex expressions (expressions provided by an untrusted user), and
- your service becomes unavailable when the thread running rulex panics.
### Patches
The crashes are fixed in version **0.4.3**. Affected users are advised to update to this version.
### Workarounds
You can use `catch_unwind` to recover from panics.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [rulex](https://github.com/rulex-rs/rulex/issues)
* Email me at [ludwig.stecher@gmx.de](mailto:ludwig.stecher@gmx.de)
### Credits
Credit for finding these bugs goes to
- [cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz) and [afl.rs](https://github.com/rust-fuzz/afl.rs)
- [evanrichter](https://github.com/evanrichter)
- [ForAllSecure Mayhem](https://forallsecure.com/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rulex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/security/advisories/GHSA-8v9w-p43c-r885'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31100'}, {'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/commit/fac6d58b25c6f9f8c0a6cdc4dec75b37b219f1d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/rulex-rs/rulex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0031.html'}] | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:15Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-r7jw-mg27-j839 | 2022-06-06T21:23:40Z | 2022-06-04T00:00:56Z | null | ['CVE-2022-1988'] | Cross-site Scripting in FacturaScripts | FacturaScripts 2022.08 and prior is vulnerable to cross-site scripting. A patch is available on the `master` branch of the repository and anticipated to be part of version 2022.09. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1988'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/93fc65ced3847a8e0837561e9fdfa0dbace2cfcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:23:40Z', 'nvd_published_at': '2022-06-03T08:15:00Z'} |
1.4.0 | GHSA-q874-g24w-4q9g | 2022-06-16T23:13:57Z | 2022-06-16T23:13:57Z | null | ['CVE-2022-29241'] | Token bruteforcing | Affects: Notebook and Lab between 6.4.0?(potentially earlier) and 6.4.11 (currently latest). Jupyter Server <=1.16.0. If I am correct about the responsible code it will affect Jupyter-Server 1.17.0 and 2.0.0a0 as well.
Description: If notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this url can be used from an xss payload (as in CVE-2021-32798) or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter_server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyter_server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0a0'}, {'fixed': '2.0.0a1'}]}], 'versions': ['2.0.0a0']}, {'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-q874-g24w-4q9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2022-211.yaml'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:13:57Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-fr2w-mp56-g4xp | 2022-06-29T21:47:25Z | 2022-06-17T01:16:55Z | null | ['CVE-2022-2111'] | Unrestricted Attachment Upload | ### Impact
InvenTree allows unrestricted upload of files as attachments to various database fields. Potentially dangerous files (such as HTML files containing malicious javascript) can be uploaded, and (when opened by the user) run the malicious code directly in the users browser.

*Note that the upload of malicious files must be performed by an authenticated user account*
### Solution
The solution for this vulnerability is to ensure that attachment files are downloaded to the local machine before opening, rather than opening the file in the current browser context.
### Patches
- The issue is addressed in the upcoming 0.8.0 release
- This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release
### Workarounds
Users can alleviate risk of opening malicious files by right-clicking on the attachment link and selecting "Save link as"

This minimizes risk (e.g. of XSS attacks) by opening the HTML file from the users computer
### References
https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github](http://github.com/inventree/inventree)
* Email us at [security@inventree.org](mailto:security@inventree.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-fr2w-mp56-g4xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2111'}, {'type': 'WEB', 'url': 'https://github.com/inventree/inventree/commit/26bf51c20a1c9b3130ac5dd2e17649bece5ff84f'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:55Z', 'nvd_published_at': '2022-06-17T13:15:00Z'} |
1.4.0 | GHSA-jcr6-mmjj-pchw | 2023-01-10T15:59:32Z | 2022-12-28T00:30:23Z | null | ['CVE-2017-20146'] | gorilla/handlers may allow requester to bypass expected behavior of the Same Origin Policy | Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gorilla/handlers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20146'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/handlers/pull/116'}, {'type': 'WEB', 'url': 'https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145'}, {'type': 'PACKAGE', 'url': 'https://github.com/gorilla/handlers'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0020'}] | {'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:18:39Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-x45c-cvp8-q4fm | 2022-12-06T16:20:39Z | 2022-12-05T23:08:37Z | null | ['CVE-2022-46167'] | Capsule vulnerable to privilege escalation by ServiceAccount deployed in a Tenant Namespace | Capsule implements a multi-tenant and policy-based environment in a Kubernetes cluster. A ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing all the enforcement like Pod Security annotations, Network Policies, Limit Range and Resource Quota items.
With that said, an attacker could detach the Namespace from a Tenant that is forbidding starting privileged Pods using the Pod Security labels by removing the OwnerReference, removing the enforcement labels, and being able to start privileged containers that would be able to start a generic Kubernetes privilege escalation.
### Patches
Patches have been released for version 0.1.3 and all users must upgrade to this release.
### Workarounds
N.A.
### References
N.A.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/clastix/capsule](https://github.com/clastix/capsule)
* Reach out on [#capsule](https://kubernetes.slack.com/archives/C03GETTJQRL) channel available on Kubernetes Slack workspace
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/clastix/capsule'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/clastix/capsule/security/advisories/GHSA-x45c-cvp8-q4fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46167'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/commit/1df430e71be8c4778c82eca3459978ad7d0b4b7b'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/commit/75525ac19254b0c5111e34d7985e2be7bc8b1ac1'}, {'type': 'PACKAGE', 'url': 'https://github.com/clastix/capsule'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule/releases/tag/v0.1.3'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:08:37Z', 'nvd_published_at': '2022-12-02T19:15:00Z'} |
1.4.0 | GHSA-pmg2-rph8-p8r6 | 2022-12-20T15:23:21Z | 2022-12-16T00:30:44Z | null | ['CVE-2022-45969'] | Alist vulnerable to Path Traversal | In versions of Alist prior to 3.6.0, a user with only file upload permission can bypass the base path restriction by using '... /' to bypass the base path restriction and upload files to an arbitrary path.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45969'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2449'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/commit/b5bf5f43253175b55fa2cb511fea601e677d2d83'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T17:21:27Z', 'nvd_published_at': '2022-12-15T23:15:00Z'} |
1.4.0 | GHSA-6jj8-mqx2-7fg5 | 2022-12-19T14:40:16Z | 2022-12-15T21:30:28Z | null | ['CVE-2020-36607'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36607'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:31:04Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-j7qp-mfxf-8xjw | 2023-02-14T21:25:56Z | 2022-12-07T23:13:02Z | null | ['CVE-2022-23492'] | libp2p DoS vulnerability from lack of resource management | ### Impact
Versions older than `v0.18.0` of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.
In the original version of the attack, the malicious node would continue opening new streams on a stream multiplexer that doesn’t provide sufficient back pressure (yamux or mplex). It is easy to defend against this one attack, but there are countless variations of this attack:
* Opening streams and causing a non-trivial memory allocation (e.g., for multistream or protobuf parsing)
* Creating a lot of sybil nodes and opening new connections across nodes
### Patches (What to do as a go-libp2p consumer:)
1. Update your go-libp2p dependency to go-libp2p v0.18.0 or greater (current version as of publish date is [v0.24.0](https://github.com/libp2p/go-libp2p/releases/tag/v0.24.0).)
- Note: **It's recommend that you update to `v0.21.0` onwards** as you’ll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. [Please see the v0.21.0 release notes for more info.](https://github.com/libp2p/go-libp2p/releases/tag/v0.21.0))
2. Determine appropriate limits for your application - go-libp2p sets up a resource manager with the default limits if none are provided. For default definitions please see [limits_defaults.go](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/limit_defaults.go). These limits are also set to automatically scale, this is done using the [AutoScale method of the ScalingLimitConfig](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#scaling-limits). We recommend you [tune your limits as described here](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#how-to-tune-your-limits).
3. Configure your node to be attack resilient. See [how to respond to an attack and identify misbehaving peers here](https://docs.libp2p.io/concepts/security/dos-mitigation/#responding-to-an-attack). Then setup automatic blocking with fail2ban using canonical libp2p log lines: [guide on how to do so here](https://docs.libp2p.io/concepts/security/dos-mitigation/#how-to-automate-blocking-with-fail2ban).
#### Examples
* Lotus’ integration can be found in https://github.com/filecoin-project/lotus/blob/master/node/modules/lp2p/rcmgr.go. Lotus reads user-configured resource limits from a limits.json file into the root directory. This allows users to share their resource manager configuration independent of any other configurations.
* Kubo’s (formerly go-ipfs) integration can be found in https://github.com/ipfs/go-ipfs/blob/master/core/node/libp2p/rcmgr.go. Kubo reads the limits from the IPFS config file.
**Note:** go-libp2p still implements the [connection manager](https://github.com/libp2p/go-libp2p/tree/master/p2p/net/connmgr) mentioned above. The connection manager is a component independent of the resource manager, which aims to keep the number of libp2p connections between a low and a high watermark. When modifying connection limits, it’s advantageous to keep the configuration of these components consistent, i.e., when setting a limit of N concurrent connections in the resource manager, the high watermark should be at most (and ideally slightly less) than N.
### Workarounds
Although there are no workarounds within go-libp2p, some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using `iptables` or `ufw` ) or making use of a load balancer in front of libp2p nodes.
However these require direct action & responsibility on your part and are no substitutes for upgrading go-libp2p. Therefore, we highly recommend upgrading your go-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about go-libp2p resource utilization.
### References
Please see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.
Please see the related disclosure for rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv
#### For more information
If you have any questions or comments about this advisory email us at [security@libp2p.io](mailto:security@libp2p.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23492'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de'}, {'type': 'WEB', 'url': 'https://docs.libp2p.io/reference/dos-mitigation/'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1148'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:13:02Z', 'nvd_published_at': '2022-12-08T01:15:00Z'} |
1.4.0 | GHSA-33m8-f4hw-wm3q | 2023-01-10T15:38:13Z | 2022-12-27T15:30:18Z | null | ['CVE-2022-4767'] | usememos/memos Denial of Service vulnerability | Denial of Service in GitHub repository usememos/memos 0.9.0 and prior. A patch is available on the `main` branch at commit number f888c628408501daf639de07b90a72ab443b0f4c. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4767'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/f888c628408501daf639de07b90a72ab443b0f4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75b4a085-923c-4ecc-bbf6-e049290db502'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:50Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-h2ph-vhm7-g4hp | 2022-12-09T15:20:21Z | 2022-12-08T16:11:37Z | null | ['CVE-2022-23469'] | Traefik may display authorization header in the debug logs | ### Impact
There is a potential vulnerability in Traefik displaying the Authorization header in its debug logs.
Traefik uses [oxy](https://github.com/vulcand/oxy) to provide the following features:
- Round Robin: https://doc.traefik.io/traefik/routing/services/#weighted-round-robin-service
- Buffering: https://doc.traefik.io/traefik/middlewares/http/buffering/
- Circuit Breaker: https://doc.traefik.io/traefik/middlewares/http/circuitbreaker/
- In-Flight Requests: https://doc.traefik.io/traefik/middlewares/http/inflightreq/
In such cases, if the log level is set to DEBUG, the credentials provided using the Authorization header are displayed in the debug logs:
```
level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\\"Method\\":\\"POST\\",\\"URL\\":{\\"Scheme\\":\\"\\",\\"Opaque\\":\\"\\",\\"User\\":null,\\"Host\\":\\"\\",\\"Path\\":\\"/<redacted>/<redacted>\\",\\"RawPath\\":\\"\\",\\"ForceQuery\\":false,\\"RawQuery\\":\\"\\",\\"Fragment\\":\\"\\",\\"RawFragment\\":\\"\\"},\\"Proto\\":\\"HTTP/2.0\\",\\"ProtoMajor\\":2,\\"ProtoMinor\\":0,\\"Header\\":{\\"Authorization\\":[\\"Bearer <token value was here>\\"],\\"Content-Type\\":[\\"application/grpc\\"],\\"Grpc-Accept-Encoding\\":[\\"gzip\\"],\\"Grpc-Timeout\\":[\\"29999886u\\"],\\"Te\\":[\\"trailers\\"],\\"User-Agent\\":[\\"<redacted>\\"],<remainder of log message removed>
```
### Patches
https://github.com/traefik/traefik/pull/9574
https://github.com/traefik/traefik/releases/tag/v2.9.6
### Workarounds
Set the log level to `INFO`, `WARN`, or `ERROR`.
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23469'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/9574'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.9.6'}] | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:37Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-4w2j-2rg4-5mjw | 2022-12-22T03:33:42Z | 2022-12-21T06:30:29Z | null | ['CVE-2022-25893'] | vm2 vulnerable to Arbitrary Code Execution | The package vm2 before 3.9.10 is vulnerable to Arbitrary Code Execution due to the usage of prototype lookup for the WeakMap.prototype.set method. Exploiting this vulnerability leads to access to a host object and a sandbox compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25893'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/444'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/pull/445'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/pull/445/commits/3a9876482be487b78a90ac459675da7f83f46d69'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-VM2-2990237'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:33:42Z', 'nvd_published_at': '2022-12-21T05:15:00Z'} |
1.4.0 | GHSA-9cmm-52cv-6hvc | 2022-12-27T01:02:26Z | 2022-12-22T03:30:18Z | null | ['CVE-2022-4647'] | Microweber vulnerable to Stored Cross-Site Scripting | Microweber versions 1.3.1 and prior are vulnerable to stored Cross-site Scripting (XSS). A patch is available on the 1.4, dev, and laravel-sail branches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4647'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:40Z', 'nvd_published_at': '2022-12-22T02:15:00Z'} |
1.4.0 | GHSA-q2fj-6h62-59m2 | 2022-12-30T22:13:59Z | 2022-12-30T22:13:59Z | null | [] | Apiman Vert.x Gateway has Transitive Hazelcast connection caching issue | ### Impact
If you are using the **Apiman Vert.x Gateway** prior to Apiman 3.0.0.Final, a connection caching issue in Hazelcast could allow an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity.
Hazelcast is a transitive dependency of the Apiman Vert.x Gateway.
The precise risk is difficult to quantify at this juncture as plugins deployed by users may make use of Hazelcast in a different manner to the main Apiman codebase.
If any of your custom Apiman plugins specify Hazelcast dependencies, you should also bump these versions.
Hint: an easy way to track Apiman dependency versions is to use `apiman-parent`.
If you use the Apiman Tomcat or WildFly Gateway this does not affect you.
### Patches
Upgrade to **Apiman 3.0.0.Final or later**.
If you are using an older version of Apiman and need to remain on that version, contact to your Apiman support provider for advice/long-term support.
### Workarounds
None (other than doing your own build).
### References
* https://github.com/advisories/GHSA-c5hg-mr8r-f6jp | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-gateway-platforms-vertx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-distro-vertx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-q2fj-6h62-59m2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5hg-mr8r-f6jp'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:13:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6w5w-wx8w-2cq9 | 2023-01-10T15:43:07Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4809'] | usememos/memos Improper Access Control vulnerability | usememos/memos 0.9.0 and prior is vulnerable to full account takeover via changing user name, email address, and display name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4809'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:40Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-45rm-2893-5f49 | 2023-01-02T21:15:49Z | 2022-12-22T06:30:15Z | null | ['CVE-2022-25948'] | liquidjs may leak properties of a prototype | The package liquidjs before 10.0.0 is vulnerable to Information Exposure when `ownPropertyOnly` parameter is set to `False`, which results in leaking properties of a prototype. Workaround For versions 9.34.0 and higher, an option to disable this functionality is provided. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'liquidjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25948'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/commit/7e99efc5131e20cf3f59e1fc2c371a15aa4109db'}, {'type': 'WEB', 'url': 'https://github.com/harttle/liquidjs/commit/7eb621601c2b05d6e379e5ce42219f2b1f556208'}, {'type': 'PACKAGE', 'url': 'https://github.com/harttle/liquidjs'}, {'type': 'WEB', 'url': 'https://groups.google.com/u/0/a/snyk.io/g/report/c/9ipXecWRtTM/m/IgLadevtCQAJ'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LIQUIDJS-2952868'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:15Z', 'nvd_published_at': '2022-12-22T05:15:00Z'} |
1.4.0 | GHSA-6fx9-29x2-fmfj | 2023-01-10T15:44:37Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4814'] | usememos/memos Improper Access Control vulnerability | Improper Access Control in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4814'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:12:23Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-whgh-g24c-3j5q | 2022-12-13T19:23:13Z | 2022-12-13T15:30:26Z | null | ['CVE-2022-45690'] | hutool-json stack overflow vulnerability | A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45690'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2746'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/issues/654'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/commit/7a124d857dc8da1165c87fa788e53359a317d0f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:23:13Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-vxwf-79ch-f7f7 | 2022-12-07T14:57:07Z | 2022-12-07T06:30:26Z | null | ['CVE-2022-41994'] | baserCMS vulnerable to stored Cross-site Scripting | Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41994'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN_53682526'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN53682526/index.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:57:07Z', 'nvd_published_at': '2022-12-07T04:15:00Z'} |
1.4.0 | GHSA-vq23-hwg7-hxrh | 2022-12-29T01:06:02Z | 2022-12-21T21:30:15Z | null | ['CVE-2020-36620'] | EnumStringValues vulnerable to Uncontrolled Resource Consumption | A vulnerability was found in Brondahl EnumStringValues 4.0.1. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.2 to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'EnumStringValues'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36620'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/commit/c0fc7806beb24883cc2f9543ebc50c0820297307'}, {'type': 'PACKAGE', 'url': 'https://github.com/Brondahl/EnumStringValues'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/releases/tag/4.0.1'}, {'type': 'WEB', 'url': 'https://github.com/Brondahl/EnumStringValues/releases/tag/4.0.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216466'}] | {'cwe_ids': ['CWE-400', 'CWE-404'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:35:03Z', 'nvd_published_at': '2022-12-21T19:15:00Z'} |
1.4.0 | GHSA-228g-948r-83gx | 2023-09-14T16:20:05Z | 2022-12-13T17:39:36Z | null | ['CVE-2022-23515'] | Improper neutralization of data URIs may allow XSS in Loofah | ## Summary
Loofah `>= 2.1.0, < 2.19.1` is vulnerable to cross-site scripting via the `image/svg+xml` media type in data URIs.
## Mitigation
Upgrade to Loofah `>= 2.19.1`.
## Severity
The Loofah maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
## References
- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266)
- https://hackerone.com/reports/1694173
- https://github.com/flavorjones/loofah/issues/101
## Credit
This vulnerability was responsibly reported by Maciej Piechota (@haqpl). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.19.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23515'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/101'}, {'type': 'WEB', 'url': 'https://github.com/w3c/svgwg/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1694173'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23515.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:39:36Z', 'nvd_published_at': '2022-12-14T14:15:00Z'} |
1.4.0 | GHSA-6q6q-88xp-6f2r | 2023-03-01T18:40:10Z | 2022-12-28T00:30:22Z | null | ['CVE-2022-3064'] | yaml package for Go can consume excessive amounts of CPU or memory | Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3064'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/releases/tag/v2.2.4'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0956'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:04:00Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-6jqm-3c9g-pch7 | 2022-12-12T21:28:35Z | 2022-12-12T21:28:35Z | null | ['CVE-2022-23510'] | @cubejs-backend/api-gateway row level security bypass | ### Impact
All authenticated Cube clients could bypass row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint.
### Patches
The change has been reverted in 0.31.24
### Workarounds
Upgrade to >=0.31.24 or downgrade to <=0.31.22
### Post mortem
As part of implementing the Cube Cloud SQL runner functionality, we’ve added a new endpoint to the Cube Core so that we could add arbitrary queries directly to the queue, bypassing the modeling layer.
The endpoint was added in this commit: https://github.com/cube-js/cube.js/commit/f1e25bb50323c0b99f3891d349467e7b637baeea
It went through the code review; however, it slipped everyone’s attention that this endpoint completely bypasses any row-level security logic implemented in the modeling layer. Now anyone with a valid Cube JWT token could fetch any data, even if they were not allowed to do so by their security context.
The issue was noticed by the Core team on Dec 12 and immediately reverted.
The just-released 0.31.23 version of the Cube has been pulled out of all the registries, and a CVE was published on Github.
Another change (https://github.com/cube-js/cube.js/commit/2c5db32f2ded074ebe5e83668eee8c024101240b) was also rolled back along with the SQL runner endpoint. It didn't pose a significant security threat, but it increased the attacker’s ability to enumerate cube schema, and it should be revisited.
The 0.31.24 was released to replace the revoked version with a change completely reverted. All customers are urged to upgrade to the newest Cube version.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@cubejs-backend/api-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.31.23'}, {'fixed': '0.31.24'}]}], 'versions': ['0.31.23']}] | [{'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/security/advisories/GHSA-6jqm-3c9g-pch7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23510'}, {'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/commit/3c614674fed6ca17df08bbba8c835ef110167570'}, {'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/commit/f1140de508e359970ac82b50bae1c4bf152f6041'}, {'type': 'PACKAGE', 'url': 'https://github.com/cube-js/cube.js'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:28:35Z', 'nvd_published_at': '2022-12-09T23:15:00Z'} |
1.4.0 | GHSA-wgpp-g6v9-7hxp | 2022-12-12T22:20:51Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46682'] | Jenkins Plot Plugin XML External Entity Reference vulnerability | Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control XML input files for the 'Plot build data' build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Plot Plugin 2.1.12 disables external entity resolution for its XML parser.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46682'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/plot-plugin/commit/4f7afbe064aab538a242a9984e583e513863e0ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/plot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2940'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:20:51Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-v3c5-jqr6-7qm8 | 2023-01-13T20:45:37Z | 2022-12-23T00:30:23Z | null | ['CVE-2022-40899'] | Python Charmers Future denial of service vulnerability | An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. This issue has been patched in version 0.18.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'future'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.18.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40899'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/pull/610'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/pull/17157'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/commit/c91d70b34ef0402aef3e9d04364ba98509dca76f'}, {'type': 'PACKAGE', 'url': 'https://github.com/PythonCharmers/python-future'}, {'type': 'WEB', 'url': 'https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215'}, {'type': 'WEB', 'url': 'https://pypi.org/project/future/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:50:24Z', 'nvd_published_at': '2022-12-23T00:15:00Z'} |
1.4.0 | GHSA-f552-97qx-c694 | 2023-01-02T21:18:58Z | 2022-12-23T21:30:18Z | null | ['CVE-2022-4692'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4692'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:58:02Z', 'nvd_published_at': '2022-12-23T20:15:00Z'} |
1.4.0 | GHSA-2c7v-qcjp-4mg2 | 2023-05-22T16:09:15Z | 2022-12-14T21:42:00Z | null | ['CVE-2022-41089'] | .NET Remote Code Execution Vulnerability | # Microsoft Security Advisory CVE-2022-41089: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1, .NET 6.0., and .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A remote code execution vulnerability exists in .NET Core 3.1, .NET 6.0, and .NET 7.0, where a malicious actor could cause a user to run arbitrary code as a result of parsing maliciously crafted xps files.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/242
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 WinForms or WPF application running on .NET 7.0.0 or earlier.
* Any .NET 6.0 WinForms or WPF application running on .NET 6.0.11 or earlier.
* Any .NET Core 3.1 WinForms or WPF application running on .NET 3.1.31 or earlier.
If the application does not utilize WinForms or WPF, it is not affected by this vulnerability.
Applications targeting Mac, Linux, Android, iOS, and other non-Windows platforms are not affected by this vulnerability.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET Core 3.1"></a>.NET Core 3.1
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 3.1.0, <= 3.1.31|3.1.32
[Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 3.1.0, <= 3.1.31|3.1.32
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.11|6.0.12
[Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.11|6.0.12
[Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.11|6.0.12
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64)|>= 7.0.0, <= 7.0.0|7.0.1
[Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64)|>= 7.0.0, <= 7.0.0|7.0.1
[Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86)|>= 7.0.0, <= 7.0.0|7.0.1
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 7.0, .NET 6.0 or .NET Core 3.1. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
* If you are using one of the affected packages, please update to the patched version listed above.
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.1 or SDK 7.0.101 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.12 or SDK 6.0.112 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.32 (for Visual Studio 2019 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
.NET 7.0, .NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Acknowledgements
[Eleftherios Panos](https://twitter.com/lefterispan) with [Nettitude](https://www.nettitude.com/)
[Nick Landers](https://twitter.com/monoxgas) with NetSPI
### Reporting Security Issues
If you have found a potential security issue in .NET 7.0, .NET 6.0 or .NET Core 3.1, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/wpf/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2022-41089]( https://www.cve.org/CVERecord?id=CVE-2022-41089)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.11'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}], 'versions': ['7.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/security/advisories/GHSA-2c7v-qcjp-4mg2'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/242'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/5f4c0f7763a06b024c8a517616e0fc0194e997a4'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/7b0be4d41c33ce8525d8160bf8869cac10f8a8cd'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/commit/c08825a9889e6c798fe95ed5ec1f6a9f517ab5a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/wpf'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:42:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x9p9-v3x6-68mq | 2023-01-10T16:02:34Z | 2022-12-31T09:30:42Z | null | ['CVE-2022-4866'] | usememos/memos vulnerable to Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4866'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7670c9536000bb32c6345d4906a91268dcddd5fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:59Z', 'nvd_published_at': '2022-12-31T09:15:00Z'} |
1.4.0 | GHSA-43fp-rhv2-5gv8 | 2022-12-07T23:05:18Z | 2022-12-07T23:05:18Z | null | ['CVE-2022-23491'] | Certifi removing TrustCor root certificate | Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found [here](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'certifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2017.11.05'}, {'fixed': '2022.12.07'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23491'}, {'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/commit/9e9e840925d7b8e76c76fdac1fab7e6e88c1c3b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/certifi/python-certifi'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ'}] | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:05:18Z', 'nvd_published_at': '2022-12-07T22:15:00Z'} |
1.4.0 | GHSA-cwh7-28vg-jmpr | 2023-01-10T16:12:39Z | 2022-12-30T12:30:25Z | null | ['CVE-2018-25059'] | pastebinit Path Traversal vulnerability | A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument `r.URL.Path` leads to path traversal. Upgrading to version 0.2.3 can address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/jessfraz/pastebinit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25059'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/commit/1af2facb6d95976c532b7f8f82747d454a092272'}, {'type': 'PACKAGE', 'url': 'https://github.com/jessfraz/pastebinit'}, {'type': 'WEB', 'url': 'https://github.com/jessfraz/pastebinit/releases/tag/v0.2.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217040'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217040'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:28:42Z', 'nvd_published_at': '2022-12-30T11:15:00Z'} |
1.4.0 | GHSA-xj33-8r43-r227 | 2022-12-07T15:40:35Z | 2022-12-06T00:30:16Z | null | ['CVE-2022-43556'] | Concrete CMS vulnerable to cross-site scripting in the text input field | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XSS in the text input field since the result dashboard page output is not sanitized. The Concrete CMS security team has ranked this 4.2 with CVSS v3.1 vector AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Remediate by updating to Concrete CMS 8.5.10 and Concrete CMS 9.1.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43556'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:35:42Z', 'nvd_published_at': '2022-12-05T22:15:00Z'} |
1.4.0 | GHSA-2wpw-cm9w-v4xm | 2023-01-06T18:33:17Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4719'] | rdiffweb vulnerable to Business Logic Errors | Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4719'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/bc4bed89affcba71251fe54ed10639da9d392c1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:09Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-ppp9-7jff-5vj2 | 2023-01-09T20:02:12Z | 2022-12-26T06:30:22Z | null | ['CVE-2021-38561'] | golang.org/x/text/language Out-of-bounds Read vulnerability | golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text/language'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38561'}, {'type': 'WEB', 'url': 'https://deps.dev/advisory/OSV/GO-2021-0113'}, {'type': 'WEB', 'url': 'https://go.dev/cl/340830'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/golang.org/x/text/language'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0113'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:02:12Z', 'nvd_published_at': '2022-12-26T06:15:00Z'} |
1.4.0 | GHSA-hc37-84v3-8gmq | 2022-12-22T15:33:16Z | 2022-12-17T03:30:25Z | null | ['CVE-2022-4572'] | UBI Reader vulnerable to Path Traversal | A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 can address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ubi-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4572'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/pull/57'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/commit/d5d68e6b1b9f7070c29df5f67fc060f579ae9139'}, {'type': 'PACKAGE', 'url': 'https://github.com/jrspruitt/ubi_reader'}, {'type': 'WEB', 'url': 'https://github.com/jrspruitt/ubi_reader/releases/tag/v0.8.5-master'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216146'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:13:09Z', 'nvd_published_at': '2022-12-17T02:15:00Z'} |
1.4.0 | GHSA-gw9m-2m5v-c6x5 | 2023-01-10T00:53:55Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4845'] | usememos/memos Cross-Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4845'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:20Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-c5wx-6c2c-f7rm | 2022-12-13T17:11:46Z | 2022-12-13T17:11:46Z | null | ['CVE-2022-23503'] | TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework | ### Problem
Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code.
The existence of individual TypoScript instructions for a particular form item (known as [`formDefinitionOverrides`](https://docs.typo3.org/c/typo3/cms-form/main/en-us/I/Concepts/FrontendRendering/Index.html#form-element-properties)) and a valid backend user account with access to the form module are needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
### References
* [TYPO3-CORE-SA-2022-015](https://typo3.org/security/advisory/typo3-core-sa-2022-015)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.49'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23503'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-015'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:11:46Z', 'nvd_published_at': '2022-12-14T08:15:00Z'} |
1.4.0 | GHSA-qcw2-492v-57xj | 2023-01-02T20:22:05Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4683'] | usememos/memos missing Secure cookie attribute | usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 is missing the Secure cookie attribute, making it vulnerable to session hijacking.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4683'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7efa749c6628c75b19a912ca170529f5c293bb2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef'}] | {'cwe_ids': ['CWE-311', 'CWE-319', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T02:21:22Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-c4pm-63cg-9j7h | 2022-12-12T20:46:11Z | 2022-12-08T15:52:54Z | null | ['CVE-2022-23496'] | Yauaa vulnerable to ArrayIndexOutOfBoundsException triggered by a crafted Sec-Ch-Ua-Full-Version-List | ### Impact
Applications using the Client Hints analysis feature introduced with 7.0.0 can crash because the Yauaa library throws an ArrayIndexOutOfBoundsException. Applications that do not use this feature are not affected.
### Patches
Upgrade to 7.9.0
### Workarounds
Catch and discard any exceptions from Yauaa.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-beam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-beam-sql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-elasticsearch-8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-flink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-flink-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-logparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-nifi-processors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-snowflake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'nl.basjes.parse.useragent:yauaa-trino'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nielsbasjes/yauaa/security/advisories/GHSA-c4pm-63cg-9j7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23496'}, {'type': 'WEB', 'url': 'https://github.com/nielsbasjes/yauaa/commit/3017a866e2cff0d308f264b66fde4fa79e3beb9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/nielsbasjes/yauaa'}] | {'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T15:52:54Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-m8r9-qxx8-mrxp | 2023-01-10T00:50:35Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4724'] | rdiffweb Improper Access Control vulnerability | Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4724'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/c4a19cf67d575c4886171b8efcbf4675d51f3929'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:00:15Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-gcjf-29m9-888q | 2022-12-09T15:35:11Z | 2022-12-07T09:30:23Z | null | ['CVE-2022-46742'] | PaddlePaddle vulnerable to Code Injection | Code injection in `paddle.audio.functional.get_window` in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution. A [patch](https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb) is available on the `develop` branch of the repository and anticipated to be part of a 2.4 release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0-rc0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46742'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/pull/47386'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-002.md'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:55:31Z', 'nvd_published_at': '2022-12-07T09:15:00Z'} |
1.4.0 | GHSA-4gjr-vgfx-9qvw | 2022-12-14T21:54:22Z | 2022-12-12T15:30:31Z | null | ['CVE-2022-45968'] | AList vulnerable to Improper Preservation of Permissions | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). Version 3.5.1 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45968'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2444'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/commit/85e1350af82e1759ca6580895e48ab969eb566cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}] | {'cwe_ids': ['CWE-281', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:30:02Z', 'nvd_published_at': '2022-12-12T14:15:00Z'} |
1.4.0 | GHSA-8gh8-hqwg-xf34 | 2023-06-12T23:48:11Z | 2022-12-25T21:30:22Z | null | ['CVE-2021-4279'] | Starcounter-Jack JSON-Patch Prototype Pollution vulnerability | A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 can address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-json-patch'}, 'ecosystem_specific': {'affected_functions': ['fast-json-patch.applyOperation']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4279'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/pull/262'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/commit/7ad6af41eabb2d799f698740a91284d762c955c9'}, {'type': 'WEB', 'url': 'https://blog.effectrenan.com/pwn2win-2021-illusion-web-challenge/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch'}, {'type': 'WEB', 'url': 'https://github.com/Starcounter-Jack/JSON-Patch/releases/tag/3.1.1'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-fast-json-patch/'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:22Z', 'nvd_published_at': '2022-12-25T20:15:00Z'} |
1.4.0 | GHSA-vp56-r7qv-783v | 2023-01-10T15:58:40Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36559'] | ahh vulnerable to Path Traversal | Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-aah/aah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'aahframe.work'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36559'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-aah/aah'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0033'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:07:19Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-p27h-4cpf-fw48 | 2023-01-10T21:42:08Z | 2022-12-27T09:30:41Z | null | ['CVE-2018-25049'] | email-existence Inefficient Regular Expression Complexity vulnerability | A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `index.js`. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'email-existence'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25049'}, {'type': 'WEB', 'url': 'https://github.com/nmanousos/email-existence/pull/37'}, {'type': 'WEB', 'url': 'https://github.com/nmanousos/email-existence/commit/0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56'}, {'type': 'PACKAGE', 'url': 'https://github.com/nmanousos/email-existence'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216854'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216854'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:40:18Z', 'nvd_published_at': '2022-12-27T09:15:00Z'} |
1.4.0 | GHSA-7599-fqgm-v84p | 2023-01-10T16:10:03Z | 2022-12-31T21:30:20Z | null | ['CVE-2018-25061'] | rgb2hex vulnerable to inefficient regular expression complexity | A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 can address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rgb2hex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25061'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/commit/9e0c38594432edfa64136fdf7bb651835e17c34f'}, {'type': 'PACKAGE', 'url': 'https://github.com/christian-bromann/rgb2hex'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/releases/tag/v0.1.6'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217151'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217151'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:26:40Z', 'nvd_published_at': '2022-12-31T20:15:00Z'} |
1.4.0 | GHSA-rc58-qr9j-cpgw | 2023-01-04T13:54:50Z | 2022-12-20T12:30:22Z | null | ['CVE-2022-46421'] | Apache Airflow Hive Provider vulnerable to Command Injection | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider before 5.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46421'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/28101'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/09twdoyoybldlfj5gvk0qswtofh0rmp4'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:54:50Z', 'nvd_published_at': '2022-12-20T11:15:00Z'} |
1.4.0 | GHSA-7q4r-x5qg-mmcp | 2023-01-06T03:20:36Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4723'] | rdiffweb has no rate limit on resend email feature | rdiffweb prior to 2.5.5 has no rate limit on the "resend email feature" while enable or disable 2FA from `/prefs/mfa` endpoint . | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4723'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6e9ee210548f6d3210704cac302cfc7cdb239765'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:00:31Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-8qwh-rm6c-jv96 | 2023-01-09T20:08:56Z | 2022-12-27T12:30:20Z | null | ['CVE-2019-25088'] | Oxidized Web vulnerable to Cross-site Scripting | A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file `lib/oxidized/web/views/conf_search.haml`. The manipulation of the argument `to_research` leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'oxidized-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25088'}, {'type': 'WEB', 'url': 'https://github.com/ytti/oxidized-web/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/ytti/oxidized-web/commit/55ab9bdc68b03ebce9280b8746ef31d7fdedcc45'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/oxidized-web/CVE-2019-25088.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/ytti/oxidized-web'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216870'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216870'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:08:56Z', 'nvd_published_at': '2022-12-27T10:15:00Z'} |
1.4.0 | GHSA-8w3p-qh3x-6gjr | 2022-12-13T17:13:37Z | 2022-12-13T17:13:37Z | null | ['CVE-2022-23504'] | TYPO3 CMS vulnerable to Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration | ### Problem
Due to the lack of handling user-submitted [YAML placeholder expressions](https://docs.typo3.org/m/typo3/reference-coreapi/main/en-us/Configuration/Yaml/YamlApi.html#custom-placeholder-processing) in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors.
A valid backend user account having administrator privileges is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
### References
* [TYPO3-CORE-SA-2022-016](https://typo3.org/security/advisory/typo3-core-sa-2022-016)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23504'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-016'}] | {'cwe_ids': ['CWE-200', 'CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:13:37Z', 'nvd_published_at': '2022-12-14T08:15:00Z'} |
1.4.0 | GHSA-3v7m-2jrh-vc93 | 2023-01-10T16:03:04Z | 2022-12-31T00:30:21Z | null | ['CVE-2022-4864'] | Froxlor vulnerable to Argument Injection | Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4864'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/f2485ecd9aab8da544b5e12891d82ae6fcff5fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b'}] | {'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T16:56:36Z', 'nvd_published_at': '2022-12-30T23:15:00Z'} |
1.4.0 | GHSA-287q-jfcp-9vhv | 2022-12-21T16:13:03Z | 2022-12-15T21:30:26Z | null | ['CVE-2022-4526'] | django-photologue vulnerable to Cross-site Scripting | A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.16 is able to address this issue. The name of the patch is 960cb060ce5e2964e6d716ff787c72fc18a371e7. It is recommended to apply a patch to fix this issue. VDB-215906 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-photologue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4526'}, {'type': 'WEB', 'url': 'https://github.com/richardbarran/django-photologue/issues/223'}, {'type': 'WEB', 'url': 'https://github.com/richardbarran/django-photologue/commit/960cb060ce5e2964e6d716ff787c72fc18a371e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/richardbarran/django-photologue'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215906'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:29:11Z', 'nvd_published_at': '2022-12-15T21:15:00Z'} |
1.4.0 | GHSA-mfmp-8mqg-q4wm | 2023-01-10T15:46:53Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4803'] | usememos/memos Improper Access Control vulnerability | usememos/memos 0.9.0 and prior is vulnerable to Improper Access Control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4803'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286'}] | {'cwe_ids': ['CWE-284', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:20Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-4gg5-vx3j-xwc7 | 2022-12-12T22:34:26Z | 2022-12-12T15:30:33Z | null | ['CVE-2022-3510'] | Protobuf Java vulnerable to Uncontrolled Resource Consumption | A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3510'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf/tree/main/java'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:34:26Z', 'nvd_published_at': '2022-12-12T13:15:00Z'} |
1.4.0 | GHSA-gqgq-784q-v9xp | 2022-12-19T19:14:45Z | 2022-12-15T21:30:29Z | null | ['CVE-2022-40001'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the title field of the create article page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40001'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/65'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:25Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-9qgp-9wwc-v29r | 2022-12-12T20:47:11Z | 2022-12-08T16:11:54Z | null | ['CVE-2022-46158'] | PrestaShop has potential Information exposure in the upload directory | ### Impact
Potential Information exposure in the upload directory.
### Patches
Patch in PrestaShop 1.7.8.8
### References
https://capec.mitre.org/data/definitions/87.html
Thanks to DZPATROL
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-9qgp-9wwc-v29r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46158'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/8684d429fb7c3bb51efb098e8b92a1fd2958f8cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.8'}] | {'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:54Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-mw4x-g2x8-qcvf | 2023-01-09T19:53:50Z | 2022-12-25T18:30:28Z | null | ['CVE-2021-4278'] | tree-kit vulnerable to Prototype Pollution | A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tree-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4278'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/commit/a63f559c50d70e8cb2eaae670dec25d1dbc4afcd'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/tree-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/releases/tag/v0.7.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216765'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216765'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:53:50Z', 'nvd_published_at': '2022-12-25T16:15:00Z'} |
1.4.0 | GHSA-995x-33wq-8gc9 | 2023-08-08T22:09:46Z | 2022-12-14T06:30:16Z | null | ['CVE-2022-24377'] | cycle-import-check vulnerable to Command Injection | The package cycle-import-check before version 1.3.2 is vulnerable to Command Injection via the `writeFileToTmpDirAndOpenIt` function due to improper user-input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cycle-import-check'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24377'}, {'type': 'WEB', 'url': 'https://github.com/Soontao/cycle-import-check/commit/1ca97b59df7e9c704471fcb4cf042ce76d7c9890'}, {'type': 'PACKAGE', 'url': 'https://github.com/Soontao/cycle-import-check'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:40:46Z', 'nvd_published_at': '2022-12-14T05:15:00Z'} |
1.4.0 | GHSA-mhhf-vgwh-fw9h | 2023-05-04T20:06:09Z | 2022-12-06T21:13:32Z | null | ['CVE-2022-23472'] | Passeo uses insecure random number generator | ### Impact
Everyone below v1.0.5 is impacted by this flaw, of confidentiality being at risk due to the password(s) being easily able to be guessed with Passeo's use of the ``random`` library. It is recommended to change any passwords made with Passeo before v1.0.5 and upgrade to v1.0.5, and v1.0.5 patches this with the ``secrets`` library.
### Workarounds
No current workaround available than updating to v1.0.5.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Passeo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Passeo/security/advisories/GHSA-mhhf-vgwh-fw9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23472'}, {'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Passeo/commit/8caa798b6bc4647dca59b2376204b6dc6176361a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ArjunSharda/Passeo'}, {'type': 'WEB', 'url': 'https://peps.python.org/pep-0506/'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:13:32Z', 'nvd_published_at': '2022-12-06T18:15:00Z'} |
1.4.0 | GHSA-8vjp-hfgh-68rj | 2022-12-19T19:14:35Z | 2022-12-15T21:30:29Z | null | ['CVE-2022-40000'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the username field of the admin log in page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40000'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/64'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:14Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-837v-6vgx-jqcc | 2022-12-15T23:36:08Z | 2022-12-12T15:30:31Z | null | ['CVE-2021-4244'] | yikes-inc-easy-mailchimp-extender Cross-site Scripting vulnerability | A vulnerability classified as problematic has been found in yikes-inc-easy-mailchimp-extender Plugin up to 6.8.5. This affects an unknown part of the file admin/partials/ajax/add_field_to_form.php. The manipulation of the argument field_name/merge_tag/field_type/list_id leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 6.8.6 can address this issue. The name of the patch is 3662c6593aa1bb4286781214891d26de2e947695. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215307. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yikesinc/yikes-inc-easy-mailchimp-extender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4244'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/pull/889'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/commit/3662c6593aa1bb4286781214891d26de2e947695'}, {'type': 'WEB', 'url': 'https://github.com/EvanHerman/yikes-inc-easy-mailchimp-extender/releases/tag/6.8.6'}, {'type': 'PACKAGE', 'url': 'https://github.com/yikesinc/yikes-inc-easy-mailchimp-extender'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215307'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:36:08Z', 'nvd_published_at': '2022-12-12T14:15:00Z'} |
1.4.0 | GHSA-9c47-m6qq-7p4h | 2023-01-11T22:37:41Z | 2022-12-29T01:51:03Z | null | ['CVE-2022-46175'] | Prototype Pollution in JSON5 via Parse Method | The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object.
This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations.
## Impact
This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution.
## Mitigation
This vulnerability is patched in json5 v2.2.2 and later. A patch has also been backported for json5 v1 in versions v1.0.2 and later.
## Details
Suppose a developer wants to allow users and admins to perform some risky operation, but they want to restrict what non-admins can do. To accomplish this, they accept a JSON blob from the user, parse it using `JSON5.parse`, confirm that the provided data does not set some sensitive keys, and then performs the risky operation using the validated data:
```js
const JSON5 = require('json5');
const doSomethingDangerous = (props) => {
if (props.isAdmin) {
console.log('Doing dangerous thing as admin.');
} else {
console.log('Doing dangerous thing as user.');
}
};
const secCheckKeysSet = (obj, searchKeys) => {
let searchKeyFound = false;
Object.keys(obj).forEach((key) => {
if (searchKeys.indexOf(key) > -1) {
searchKeyFound = true;
}
});
return searchKeyFound;
};
const props = JSON5.parse('{"foo": "bar"}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
doSomethingDangerous(props); // "Doing dangerous thing as user."
} else {
throw new Error('Forbidden...');
}
```
If the user attempts to set the `isAdmin` key, their request will be rejected:
```js
const props = JSON5.parse('{"foo": "bar", "isAdmin": true}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
doSomethingDangerous(props);
} else {
throw new Error('Forbidden...'); // Error: Forbidden...
}
```
However, users can instead set the `__proto__` key to `{"isAdmin": true}`. `JSON5` will parse this key and will set the `isAdmin` key on the prototype of the returned object, allowing the user to bypass the security check and run their request as an admin:
```js
const props = JSON5.parse('{"foo": "bar", "__proto__": {"isAdmin": true}}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
doSomethingDangerous(props); // "Doing dangerous thing as admin."
} else {
throw new Error('Forbidden...');
}
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'json5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'json5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46175'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/issues/199'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/issues/295'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/pull/298'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/commit/62a65408408d40aeea14c7869ed327acead12972'}, {'type': 'WEB', 'url': 'https://github.com/json5/json5/commit/7774c1097993bc3ce9f0ac4b722a32bf7d6871c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/json5/json5'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:51:03Z', 'nvd_published_at': '2022-12-24T04:15:00Z'} |
1.4.0 | GHSA-969w-q74q-9j8v | 2022-12-08T16:00:29Z | 2022-12-08T16:00:29Z | null | [] | Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code | Because of incorrect bounds on method `Secp256k1::preallocated_gen_new` it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator.
The method takes a place for storing the context as a mutable reference and returns context containing that reference. Because the code internally uses `unsafe` and the bounds were incorrect it was possible to create a context that outlived the passed reference (e.g. `'static`). Because the context can alternatively carry heap-allocated pointer freed on drop it was possible to "deallocate" a pointer that wasn't returned from appropriate allocator. The code decides whether to free the memory based on type parameter but because of missing bound it was possible to construct the context with invalid parameter.
You are unaffected if you either
* don't call `Secp256k1::preallocated_gen_new`
* manually checked that your usage of the method is sound
* upgraded to the patched version of `secp256k1` (recommended)
The patched version uses correct bounds which means it is API-breaking. This effectively means adopting the policy of Rust lang itself allowing API-breaking changes to fix soundness bugs. Note however that valid straigthforward usage of the code will continue to compile. Only unsound code or code that propagates the bound in custom generics will fail to compile. If the code is sound fixing the bounds should be sufficient to make the code compile.
See the [GitHub issue](https://github.com/rust-bitcoin/rust-secp256k1/issues/543) for example "exploit" code and further discussion.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.22.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'secp256k1'}, 'ecosystem_specific': {'affected_functions': ['secp256k1::Secp256k1::preallocated_gen_new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.24.0'}, {'fixed': '0.24.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rust-bitcoin/rust-secp256k1/issues/543'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-bitcoin/rust-secp256k1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0070.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:00:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x87m-36g7-6mpw | 2022-12-13T13:50:43Z | 2022-12-10T00:30:17Z | null | ['CVE-2022-34297'] | Yii2 Gii Cross-site Scripting vulnerability | Some fields like Message Category (requires I18N enabled) in Model Generator, CRUD Generator or Form Generator, Author Name in Extension Generator, etc. are being cached without sanitisation of their contents when the Preview button is pressed. This leads to possibility of injecting malicious javascript in specified pages by placing it in said fields and caching it by pressing Preview button. On each consequent visit of specified pages malicious javascript will be loaded from server and executed in client's browser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-gii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34297'}, {'type': 'WEB', 'url': 'https://gist.github.com/be4r/b5c48d97ef6726d3ee37f995ee5aac81'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T13:50:43Z', 'nvd_published_at': '2022-12-09T22:15:00Z'} |
1.4.0 | GHSA-qwph-4952-7xr6 | 2023-07-14T22:03:13Z | 2022-12-22T03:32:59Z | null | ['CVE-2022-23540'] | jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify() | # Overview
In versions <=8.5.1 of jsonwebtoken library, lack of algorithm definition and a falsy secret or key in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification.
# Am I affected?
You will be affected if all the following are true in the `jwt.verify()` function:
- a token with no signature is received
- no algorithms are specified
- a falsy (e.g. null, false, undefined) secret or key is passed
# How do I fix it?
Update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method.
# Will the fix impact my users?
There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23540'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}] | {'cwe_ids': ['CWE-287', 'CWE-327', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:32:59Z', 'nvd_published_at': '2022-12-22T19:15:00Z'} |
1.4.0 | GHSA-27h2-hvpr-p74q | 2023-01-27T21:51:55Z | 2022-12-22T03:31:28Z | 2023-01-27T21:51:55Z | ['CVE-2022-23529'] | jsonwebtoken has insecure input validation in jwt.verify function | # Overview
For versions `<=8.5.1` of `jsonwebtoken` library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the `secretOrPublicKey` argument from the [readme link](https://github.com/auth0/node-jsonwebtoken#jwtverifytoken-secretorpublickey-options-callback)) of the `jwt.verify()` function, they can gain remote code execution (RCE).
# Am I affected?
This security issue is a concern when the `jsonwebtoken` library is used in an insecure way. Users are affected only if they allow untrusted entities to modify the key retrieval parameter of the `jwt.verify()` on a host that you control. In this scenario, if all the prerequisites are met, the issue may be exploitable. The source of this risk in this scenario would be in the calling code, and not in the library itself.
# How do I fix it?
Users of jsonwebtoken 8.5.1 and earlier are encouraged to update to the latest version, 9.0.0, which presents safer code and important security checks that fixes this security flaw and others and prevents misuse of the package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-27h2-hvpr-p74q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23529'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:31:28Z', 'nvd_published_at': '2022-12-21T21:15:00Z'} |
1.4.0 | GHSA-grr4-wv38-f68w | 2023-01-04T14:25:45Z | 2022-12-13T15:30:27Z | null | ['CVE-2022-45693'] | Jettison Out-of-bounds Write vulnerability | Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45693'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/52'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:25:45Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-5vw4-v588-pgv8 | 2023-01-10T16:02:05Z | 2022-12-28T00:30:23Z | null | ['CVE-2015-10004'] | robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison | Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/robbert229/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170426191122-ca1404ee6e83'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10004'}, {'type': 'WEB', 'url': 'https://github.com/robbert229/jwt/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654'}, {'type': 'PACKAGE', 'url': 'https://github.com/robbert229/jwt'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0023'}] | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:33:01Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-f8cc-g7j8-xxpm | 2022-12-30T16:58:39Z | 2022-12-30T16:58:39Z | null | ['CVE-2022-40151'] | XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow | ### Impact
The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.
### Workarounds
The only solution is to catch the StackOverflowError in the client code calling XStream.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2022-40151](https://x-stream.github.io/CVE-2022-40151.html).
### Credits
The vulnerability was discovered and reported by Henry Lin of the Google OSS-Fuzz team.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-f8cc-g7j8-xxpm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40151'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/314'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2022-40151.html'}] | {'cwe_ids': ['CWE-121', 'CWE-502', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:58:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7qp-cj9p-gj85 | 2023-01-09T21:50:04Z | 2022-12-28T18:30:20Z | null | ['CVE-2021-4294'] | OpenShift OSIN vulnerable to Observable Timing Discrepancy | A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function `ClientSecretMatches/CheckClientSecret`. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/osin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2-0.20210113124101-8612686d6dda'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4294'}, {'type': 'WEB', 'url': 'https://github.com/openshift/osin/pull/200'}, {'type': 'WEB', 'url': 'https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/osin'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1201'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216987'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:50:04Z', 'nvd_published_at': '2022-12-28T17:15:00Z'} |
1.4.0 | GHSA-9v48-2h5x-fvpm | 2023-01-23T19:32:20Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4685'] | usememos/memos vulnerable to improper access control | Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4685'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/015dbf52-8924-4aad-86d7-892cb61157af'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:50:36Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-3x8r-x6xp-q4vm | 2022-12-13T17:40:50Z | 2022-12-13T17:40:50Z | null | ['CVE-2022-23516'] | Uncontrolled Recursion in Loofah | ## Summary
Loofah `>= 2.2.0, < 2.19.1` uses recursion for sanitizing `CDATA` sections, making it susceptible to stack exhaustion and raising a `SystemStackError` exception. This may lead to a denial of service through CPU resource consumption.
## Mitigation
Upgrade to Loofah `>= 2.19.1`.
Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized.
## Severity
The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
## References
- [CWE - CWE-674: Uncontrolled Recursion (4.9)](https://cwe.mitre.org/data/definitions/674.html)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.19.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23516'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/86f7f6364491b0099d215db858ecdc0c89ded040'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23516.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}] | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:40:50Z', 'nvd_published_at': '2022-12-14T14:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.