schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-642q-2q68-9j3p | 2023-01-10T00:52:48Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4849'] | usememos/memos Cross-Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4849'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:06Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-p8j8-wxvp-h695 | 2023-01-06T23:07:38Z | 2022-12-25T12:30:25Z | null | ['CVE-2020-36629'] | SimbCo httpster vulnerable to Path Traversal | A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'httpster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36629'}, {'type': 'WEB', 'url': 'https://github.com/SimbCo/httpster/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/SimbCo/httpster/commit/d3055b3e30b40b65d30c5a06d6e053dffa7f35d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/SimbCo/httpster'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216748'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T23:07:38Z', 'nvd_published_at': '2022-12-25T11:15:00Z'} |
1.4.0 | GHSA-jwrv-x6rx-8vfm | 2023-01-06T22:14:29Z | 2022-12-25T12:30:25Z | null | ['CVE-2020-36627'] | Macaron i18n Open Redirect vulnerability | A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 can address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-macaron/i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36627'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-macaron/i18n'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/i18n/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1187'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216745'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:29Z', 'nvd_published_at': '2022-12-25T11:15:00Z'} |
1.4.0 | GHSA-jpgg-cp2x-qrw3 | 2023-08-29T18:58:37Z | 2022-12-28T00:30:23Z | null | ['CVE-2021-4236'] | ecnepsnai/web vulnerable to Uncontrolled Resource Consumption | Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ecnepsnai/web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4236'}, {'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecnepsnai/web'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0107'}] | {'cwe_ids': ['CWE-400', 'CWE-476'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:54:08Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-6mv3-wm7j-h4w5 | 2022-12-23T18:01:54Z | 2022-12-22T20:03:43Z | null | ['CVE-2022-46171'] | Tauri Filesystem Scope Glob Pattern is too Permissive | ### Impact
The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths.
Example: The `fs` scope `$HOME/*.key` would also allow `$HOME/.ssh/secret.key` to be read even though it is in a sub directory of `$HOME` and is inside a hidden folder.
Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected.
### Patches
The issue has been patched in the latest release and was backported into the currently supported 1.x branches.
### Workarounds
No workaround is known at the time of publication.
### References
The original report contained information that the `dialog.open` component automatically allows one sub directory to be read, regardless of the `recursive` option.
Imagine a file system looking like
```
o ../
o documents/
- file.txt
- deeper/
o deep_file.txt
```
Reproduction steps:
1. Trying to load “file.txt” or “deep_file.txt” doesn’t work. Expected
2. Select “documents” as folder to open(ie. with window.__TAURI__.dialog.open)
3. Trying to load “file.txt” works. Expected
5. Trying to load “deep_file.txt” also works, which isn’t expected
The recursive flag is used in https://github.com/tauri-apps/tauri/blob/cd8c074ae6592303d3f6844a4fb6d262eae913b2/core/tauri/src/scope/fs.rs#L154 to scope the filesystem access to either files in the folder or to also include sub directories.
The original issue was replicated and further investigated.
The root cause was triaged to the `glob` crate facilitating defaults, which allow the `*` and `[...]` to also match path literals.
```rust
MatchOptions {
case_sensitive: true,
require_literal_separator: false,
require_literal_leading_dot: false
}
```
This implicated that not only the `dialog.open` component was affected but rather all `fs` scopes containing the `*` or `[...]` glob.
During this investigation it became obvious that the current glob matches would also match hidden folder (e.g: `.ssh`) content by default, without explicitly allowing hidden folders to be matched. This is not commonly expected behavior in comparison to for example `bash`.
The new default Match options are:
```rust
MatchOptions {
case_sensitive: true,
require_literal_separator: true,
require_literal_leading_dot: true
}
```
> Another note security relevant for developers building applications interacting with case sensitive filesystems is, that the `case_sensitive` option only affects ASCII file paths and is not valid in Unicode based paths. This is considered a known risk until the `glob` crate supports non-ASCII file paths for this type of case sensitive matching.
### For more Information
If you have any questions or comments about this advisory:
Open an issue in tauri
Email us at [security@tauri.app](mailto:security@tauri.app)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.0'}, {'fixed': '2.0.0-alpha.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46171'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/14d567f7ecb25a6d1024cf3d796f86aee89d0dd4'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/72389b00d7b495ffd7750eb1e75a3b8537d07cf3'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/f0602e7c294245ab6ef6fbf2a976ef398340ef58'}, {'type': 'PACKAGE', 'url': 'https://github.com/tauri-apps/tauri'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:43Z', 'nvd_published_at': '2022-12-23T14:15:00Z'} |
1.4.0 | GHSA-wcwm-c3mr-pxcr | 2022-12-27T18:09:03Z | 2022-12-20T06:30:36Z | null | ['CVE-2022-25931'] | easy-static-server vulnerable to Directory Traversal | All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the `req.url` user input that is passed to the server code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'easy-static-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25931'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/cunjieliu/easyServer'}, {'type': 'WEB', 'url': 'https://github.com/cunjieliu/easyServer/blob/master/index.js#23L27'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:01Z', 'nvd_published_at': '2022-12-20T05:15:00Z'} |
1.4.0 | GHSA-qwmp-2cf2-g9g6 | 2022-12-26T19:42:25Z | 2022-12-23T00:30:23Z | null | ['CVE-2022-40898'] | pypa/wheel vulnerable to Regular Expression denial of service (ReDoS) | Python Packaging Authority (PyPA) Wheel is a reference implementation of the Python wheel packaging standard. Wheel 0.37.1 and earlier are vulnerable to a Regular Expression denial of service via attacker controlled input to the wheel cli. The vulnerable regex is used to verify the validity of Wheel file names. This has been patched in version 0.38.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wheel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.37.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40898'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/wheel'}, {'type': 'WEB', 'url': 'https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18'}, {'type': 'WEB', 'url': 'https://pypi.org/project/wheel/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}, {'type': 'WEB', 'url': 'https://pyup.io/vulnerabilities/CVE-2022-40898/51499/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-26T19:42:25Z', 'nvd_published_at': '2022-12-23T00:15:00Z'} |
1.4.0 | GHSA-67fx-wx78-jx33 | 2023-08-30T18:38:16Z | 2022-12-14T21:39:06Z | null | ['CVE-2022-23526'] | Helm vulnerable to denial of service through schema file | Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_chartutil_` package that can cause a segmentation violation. Applications that use functions from the `_chartutil_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
### Impact
The `_chartutil_` package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The `_chartutil_` package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation.
Applications that use the `_chartutil_` package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.
### Patches
This issue has been resolved in 3.10.3.
### Workarounds
SDK users can validate schema files that are correctly formatted before passing them to the `_chartutil_` functions.
### For more information
Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
### Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23526'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1166'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:39:06Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-fx2c-96vj-985v | 2023-01-13T17:18:24Z | 2022-12-12T21:24:29Z | null | ['CVE-2022-41881'] | HAProxyMessageDecoder Stack Exhaustion DoS | ### Impact
A StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion.
### Patches
Users should upgrade to 4.1.86.Final.
### Workarounds
There is no workaround, except using a custom HaProxyMessageDecoder.
### References
When parsing a TLV with type = PP2_TYPE_SSL, the value can be again a TLV with type = PP2_TYPE_SSL and so on.
The only limitation of the recursion is that the TLV length cannot be bigger than 0xffff because it is encoded in an unsigned short type.
Providing a TLV with a nesting level that is large enough will lead to raising of a StackOverflowError.
The StackOverflowError will be caught if HAProxyMessageDecoder is used as part of Netty’s ChannelPipeline, but using it directly without the ChannelPipeline will lead to a thrown exception / crash.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [netty](https://github.com/netty/netty)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-haproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.86.Final'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41881'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230113-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}] | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:24:29Z', 'nvd_published_at': '2022-12-12T18:15:00Z'} |
1.4.0 | GHSA-3w37-5p3p-jv92 | 2023-09-07T14:48:39Z | 2022-12-13T15:30:27Z | null | ['CVE-2022-46363'] | Apache CXF vulnerable to Exposure of Sensitive Information | A vulnerability in Apache CXF before versions 3.5.5 and 3.4.10 allows an attacker to perform a remote directory listing or code exfiltration. The vulnerability only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, and so the vulnerability can only arise if the CXF service is misconfigured. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46363'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c'}] | {'cwe_ids': ['CWE-20', 'CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:03Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-468w-8x39-gj5v | 2022-12-12T22:26:28Z | 2022-12-08T16:11:12Z | null | ['CVE-2022-46153'] | Traefik routes exposed with an empty TLSOption | ## Impact
There is a potential vulnerability in Traefik managing the TLS connections.
A router configured with a not well-formatted [TLSOption](https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options) is exposed with an empty TLSOption.
For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates.
## Patches
https://github.com/traefik/traefik/releases/tag/v2.9.6
## Workarounds
Check the logs to detect the following error messages and fix your TLS options:
- Empty CA:
```
{"level":"error","msg":"invalid clientAuthType: RequireAndVerifyClientCert, CAFiles is required","routerName":"Router0@file"}
```
- Bad CA content (or bad path):
```
{"level":"error","msg":"invalid certificate(s) content","routerName":"Router0@file"}
```
- Unknown Client Auth Type:
```
{"level":"error","msg":"unknown client auth type \"FooClientAuthType\"","routerName":"Router0@file"}
```
- Invalid cipherSuites
```
{"level":"error","msg":"invalid CipherSuite: foobar","routerName":"Router0@file"}
```
- Invalid curvePreferences
```
{"level":"error","msg":"invalid CurveID in curvePreferences: foobar","routerName":"Router0@file"}
```
## For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46153'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a'}, {'type': 'WEB', 'url': 'https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.9.6'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:12Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-xxfx-w2rw-gh63 | 2022-12-14T14:06:08Z | 2022-12-14T00:30:23Z | null | ['CVE-2022-43996'] | csaf-poc/csaf_distribution Cross-site Scripting vulnerability | The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/csaf-poc/csaf_distribution'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43996'}, {'type': 'WEB', 'url': 'https://github.com/csaf-poc/csaf_distribution/commit/17f22855ee8d4270dd17ff748c30ed7304846fdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-poc/csaf_distribution'}, {'type': 'WEB', 'url': 'https://github.com/csaf-poc/csaf_distribution/releases/tag/v0.8.2'}, {'type': 'WEB', 'url': 'https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T14:06:08Z', 'nvd_published_at': '2022-12-13T22:15:00Z'} |
1.4.0 | GHSA-j34r-57xj-pfm5 | 2022-12-20T22:09:36Z | 2022-12-15T21:30:26Z | null | ['CVE-2022-4520'] | WSO2 carbon-registry Cross-site Scripting vulnerability | A vulnerability was found in WSO2 carbon-registry up to 4.8.11. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `components/registry/org.wso2.carbon.registry.search.ui/src/main/resources/web/search/advancedSearchForm-ajaxprocessor.jsp` of the component `Advanced Search`. The manipulation of the argument `mediaType/rightOp/leftOp/rightPropertyValue/leftPropertyValue` leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.8.12 can address this issue. The name of the patch is 0c827cc1b14b82d8eb86117ab2e43c34bb91ddb4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215900. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.carbon.registry:carbon-registry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4520'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/pull/404'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/commit/0c827cc1b14b82d8eb86117ab2e43c34bb91ddb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/wso2/carbon-registry'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.12'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215900'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:09:36Z', 'nvd_published_at': '2022-12-15T21:15:00Z'} |
1.4.0 | GHSA-9895-g6x5-xwcp | 2022-12-12T22:25:49Z | 2022-12-06T21:30:46Z | null | ['CVE-2022-4147'] | Quarkus CORS filter allows simple GET and POST requests with an invalid Origin to proceed | Quarkus CORS filter allows simple GET and POST requests with invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest are the ones which have no event listeners registered on the object returned by the XMLHttpRequest upload property and have no ReadableStream object used in the request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0.CR1'}, {'fixed': '2.14.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.5.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4147'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4147'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2148867'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB', 'url': 'https://quarkus.io/blog/quarkus-2-14-2-final-released/'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:25:38Z', 'nvd_published_at': '2022-12-06T19:15:00Z'} |
1.4.0 | GHSA-r7hg-2cpp-8wqq | 2023-01-10T15:48:18Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4847'] | usememos/memos has Incorrectly Specified Destination in a Communication Channel | Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4847'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73'}] | {'cwe_ids': ['CWE-941'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:52:48Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-cmwm-45mj-mpg3 | 2022-12-16T21:57:53Z | 2022-12-14T12:30:42Z | null | ['CVE-2022-4493'] | SCIFIO vulnerable to Path Traversal | A vulnerability classified as critical was found in scifio. Affected by this vulnerability is the function downloadAndUnpackResource of the file src/test/java/io/scif/util/DefaultSampleFilesService.java of the component ZIP File Handler. The manipulation leads to path traversal. The attack can be launched remotely. The patch is at commit fcb0dbca0ec72b22fe0c9ddc8abc9cb188a0ff31. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215803. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.scif:scifio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.43.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4493'}, {'type': 'WEB', 'url': 'https://github.com/scifio/scifio/commit/fcb0dbca0ec72b22fe0c9ddc8abc9cb188a0ff31'}, {'type': 'PACKAGE', 'url': 'https://github.com/scifio/scifio'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215803'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:57:53Z', 'nvd_published_at': '2022-12-14T12:15:00Z'} |
1.4.0 | GHSA-33vh-7x8q-mg35 | 2023-01-02T16:24:43Z | 2022-12-20T06:30:36Z | null | ['CVE-2022-25904'] | safe-eval vulnerable to Prototype Pollution | All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an attacker to modify properties of the Object.prototype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25904'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/hacksparrow/safe-eval'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:42Z', 'nvd_published_at': '2022-12-20T05:15:00Z'} |
1.4.0 | GHSA-p782-4j23-xqcg | 2022-12-20T15:47:22Z | 2022-12-14T09:30:24Z | null | ['CVE-2022-34271'] | Apache Atlas: zip path traversal in import functionality | A vulnerability in import module of Apache Atlas allows an authenticated user to write to web server filesystem. This issue affects Apache Atlas versions from 0.8.4 to 2.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:apache-atlas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.4'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34271'}, {'type': 'WEB', 'url': 'https://github.com/apache/atlas/commit/3415913d252597c24c6b5d19d315375a49e64152'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ATLAS-4622'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0rqvcxo6brmos9w3lzfsdn2lsmlblpw3'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:41:34Z', 'nvd_published_at': '2022-12-14T09:15:00Z'} |
1.4.0 | GHSA-3839-6r69-m497 | 2023-01-06T03:20:27Z | 2022-12-28T00:30:23Z | null | ['CVE-2021-4238'] | GoUtils's randomly-generated alphanumeric strings contain significantly less entropy than expected | Randomly-generated alphanumeric strings contain significantly less entropy than expected. The `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/goutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4238'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Masterminds/goutils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0411'}] | {'cwe_ids': ['CWE-331'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:53:53Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-m688-cx2p-rgq9 | 2023-01-09T21:50:29Z | 2022-12-29T09:30:19Z | null | ['CVE-2018-25058'] | Twitter-Post-Fetcher vulnerable to Use of Web Link to Untrusted Target with window.opener Access | A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file `js/twitterFetcher.js` of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 can address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'twitter-fetcher-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25058'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/pull/170'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217017'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217017'}] | {'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:50:29Z', 'nvd_published_at': '2022-12-29T08:15:00Z'} |
1.4.0 | GHSA-hhxg-px5h-jc32 | 2023-01-09T21:58:58Z | 2022-12-30T12:30:25Z | null | ['CVE-2018-25060'] | Macaron csrf missing encryption and has sensitive cookies in HTTP session without secure attribute | A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file `csrf.go`. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-macaron/csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180426211050-dadd1711a617'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25060'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/csrf/pull/7'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-macaron/csrf'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1213'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217058'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217058'}] | {'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:58:58Z', 'nvd_published_at': '2022-12-30T12:15:00Z'} |
1.4.0 | GHSA-6gwx-gw56-qhf7 | 2023-01-10T16:02:13Z | 2022-12-31T09:30:42Z | null | ['CVE-2022-4867'] | Froxlor vulnerable to Cross-Site Request Forgery | Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4867'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/f7f356e896173558248c43f4f68612f78e73a65d'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:22Z', 'nvd_published_at': '2022-12-31T09:15:00Z'} |
1.4.0 | GHSA-v279-v2xm-whq9 | 2022-12-27T22:03:13Z | 2022-12-19T15:30:29Z | null | ['CVE-2021-4260'] | Oils JS vulnerable to Open Redirect | A vulnerability was found in oils-js. This vulnerability affects unknown code of the file core/Web.js. The manipulation leads to open redirect and the attack can be initiated remotely. The name of the patch is fad8fbae824a7d367dacb90d56cb02c5cb999d42. It is recommended to apply a patch to fix this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'oils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4260'}, {'type': 'WEB', 'url': 'https://github.com/mannyvergel/oils-js/commit/fad8fbae824a7d367dacb90d56cb02c5cb999d42'}, {'type': 'PACKAGE', 'url': 'https://github.com/mannyvergel/oils-js'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216268'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211204010604/https://www.npmjs.com/package/oils'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:05:11Z', 'nvd_published_at': '2022-12-19T14:15:00Z'} |
1.4.0 | GHSA-ghw3-5qvm-3mqc | 2022-12-22T19:59:58Z | 2022-12-22T19:59:58Z | null | ['CVE-2022-23556'] | CodeIgniter4 allows spoofing of IP address when using proxy | ### Impact
This vulnerability may allow attackers to spoof their IP address when your server is behind a reverse proxy.
### Patches
Upgrade to v4.2.11 or later, and configure `Config\App::$proxyIPs`.
### Workarounds
Do not use `$request->getIPAddress()`.
### References
- https://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\HTTP\Request::getIPAddress
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm-3mqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23556'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a013836628028ddc984659'}, {'type': 'WEB', 'url': 'https://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\\HTTP\\Request::getIPAddress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/codeigniter4/framework/CVE-2022-23556.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T19:59:58Z', 'nvd_published_at': '2022-12-22T19:15:00Z'} |
1.4.0 | GHSA-w6qf-j4qr-f946 | 2023-01-10T16:02:57Z | 2022-12-31T12:30:20Z | null | ['CVE-2022-4868'] | Froxlor Improper Authorization vulnerability | Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4868'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/0527f22dc942483430f8449e25a096bb8d683a5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b'}] | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:06Z', 'nvd_published_at': '2022-12-31T10:15:00Z'} |
1.4.0 | GHSA-957m-g6rf-4c2m | 2022-12-14T21:54:33Z | 2022-12-12T15:30:31Z | null | ['CVE-2022-45970'] | Alist Cross-site Scripting vulnerability | Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45970'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2457'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:49:04Z', 'nvd_published_at': '2022-12-12T14:15:00Z'} |
1.4.0 | GHSA-w9rv-xmf7-x3gh | 2023-01-10T16:12:55Z | 2022-12-30T12:30:25Z | null | ['CVE-2022-44621'] | Apache Kylin vulnerable to Command injection by Diagnosis Controller | Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44621'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/2011'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/2011/commits/418a63c61379d429312972fc94b87994e06b664f'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/fd2977e21c51f1afed668f2d9713cf562f2dc42d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7ctchj24dofgsj9g1rg1245cms9myb34'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:34:35Z', 'nvd_published_at': '2022-12-30T11:15:00Z'} |
1.4.0 | GHSA-cq2g-pw6q-hf7j | 2022-12-27T22:04:00Z | 2022-12-19T21:09:05Z | null | ['CVE-2022-23536'] | Cortex's Alertmanager can expose local files content via specially crafted config | ### Impact
A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the [Alertmanager Set Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration). Only users of the Cortex Alertmanager service using `-experimental.alertmanager.enable-api` or `enable_api: true` are affected.
### Patches
Affected Cortex users are advised to upgrade to versions 1.13.2 or 1.14.1.
### Workarounds
Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section and `opsgenie_api_key_file` in the `global` section before sending to the [Set Alertmanager Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration) as a workaround.
### References
- Fixed Versions:
- https://github.com/cortexproject/cortex/releases/tag/v1.14.1
- https://github.com/cortexproject/cortex/releases/tag/v1.13.2
- https://cortexmetrics.io/docs/api/#set-alertmanager-configuration
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cortex](https://github.com/cortexproject/cortex/issues/new/choose)
* Email us at [cortex-team@googlegroups.com](mailto:cortex-team@googlegroups.com).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex/pkg/alertmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex/pkg/alertmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23536'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506'}, {'type': 'WEB', 'url': 'https://cortexmetrics.io/docs/api/#set-alertmanager-configuration'}, {'type': 'PACKAGE', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/releases/tag/v1.13.2'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/releases/tag/v1.14.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1175'}] | {'cwe_ids': ['CWE-184', 'CWE-641', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:09:05Z', 'nvd_published_at': '2022-12-19T22:15:00Z'} |
1.4.0 | GHSA-cm9x-c3rh-7rc4 | 2022-12-29T01:49:47Z | 2022-12-29T01:49:47Z | null | ['CVE-2022-4318'] | CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation | ### Impact
It is possible to craft an environment variable with newlines to add entries to a container's /etc/passwd. It is possible to circumvent admission validation of username/UID by adding such an entry.
Note: because the pod author is in control of the container's /etc/passwd, this is not considered a new risk factor. However, this advisory is being opened for transparency and as a way of tracking fixes.
### Patches
1.26.0 will have the fix. More patches will be posted as they're available.
### Workarounds
Additional security controls like SELinux should prevent any damage a container is able to do with root on the host. Using SELinux is recommended because this class of attack is already possible by manually editing the container's /etc/passwd
### References
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-cm9x-c3rh-7rc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4318'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/6450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1033'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1503'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4318'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2152703'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}] | {'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:49:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2jx-w3wm-9p3p | 2022-12-05T23:29:35Z | 2022-12-05T06:30:22Z | null | ['CVE-2022-41777'] | nadesiko3 allows remote attacker to inject invalid value to decodeURIComponent of nako3edit | Nako3edit is the editor component of Nadeshiko 3, a programming language developed based on Japanese. Improper check or handling of exceptional conditions in Nako3edit v3.3.74 and earlier allows a remote attacker to inject an invalid value to decodeURIComponent of nako3edit, which may lead the server to crash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.75'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41777'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.75'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}] | {'cwe_ids': ['CWE-703', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:29:35Z', 'nvd_published_at': '2022-12-05T04:15:00Z'} |
1.4.0 | GHSA-qr97-v87p-x965 | 2023-01-09T21:51:34Z | 2022-12-31T12:30:20Z | null | ['CVE-2017-20157'] | Ariadne Component Library vulnerable to Server-Side Request Forgery | A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 can address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'arc/web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20157'}, {'type': 'WEB', 'url': 'https://github.com/Ariadne-CMS/arc-web/commit/1feb1cc11e6c9f218408f15f53f537ea0d788656'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ariadne-CMS/arc-web'}, {'type': 'WEB', 'url': 'https://github.com/Ariadne-CMS/arc-web/releases/tag/3.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217140'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217140'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:34Z', 'nvd_published_at': '2022-12-31T10:15:00Z'} |
1.4.0 | GHSA-3vqj-43w4-2q58 | 2023-04-14T17:02:26Z | 2022-12-13T15:30:26Z | null | ['CVE-2022-45688'] | json stack overflow vulnerability | A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 and org.json:json before version 20230227 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.json:json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20230227'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45688'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2748'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/issues/708'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/commit/a6e412bded7a0ad605adfeca029318f184c32102'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:25:03Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-mgj2-q8wp-29rr | 2022-12-13T17:06:07Z | 2022-12-13T17:06:07Z | null | ['CVE-2022-23502'] | TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset | ### Problem
When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions.
### Solution
Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
### References
* [TYPO3-CORE-SA-2022-014](https://typo3.org/security/advisory/typo3-core-sa-2022-014)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23502'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d9ffbf24fcc62068033ebb3912538347bd380a6c'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23502.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23502.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-014'}] | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:06:07Z', 'nvd_published_at': '2022-12-14T08:15:00Z'} |
1.4.0 | GHSA-m5pr-wm6q-x4g2 | 2023-01-10T15:44:18Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4812'] | usememos/memos vulnerable to Comparison of Object References Instead of Object Contents | Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4812'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c'}] | {'cwe_ids': ['CWE-595', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:56Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-97g8-xfvw-q4hg | 2023-09-20T22:30:19Z | 2022-12-13T19:44:33Z | null | ['CVE-2022-3916'] | Keycloak vulnerable to session takeover with OIDC offline refreshtokens | An issue was discovered in Keycloak when using a client with the `offline_access` scope. Reuse of session ids across root and user authentication sessions and a lack of root session validation enabled attackers to resolve a user session attached to a different previously authenticated user.
This issue most affects users of shared computers. Suppose a user logs out of their account (without clearing their cookies) in a mobile app or similar client that includes the `offline_access` scope, and another user authenticates to the application. In that case, it will share the same root session id, and when utilizing the refresh token, they will be issued a token for the original user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-97g8-xfvw-q4hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3916'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8961'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8962'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8963'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8965'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3916'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2141404'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-287', 'CWE-304', 'CWE-488', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:44:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qf9q-3wwx-8qjv | 2023-01-10T15:43:21Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4810'] | usememos/memos Improper Access Control vulnerability | In usememos/memos 0.9.0 and prior, a user can view any content from private memos from other users via the API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4810'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:35Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-rp2v-v467-q9vq | 2022-12-15T21:59:36Z | 2022-12-02T22:25:25Z | null | ['CVE-2022-23531'] | GuardDog vulnerable to arbitrary file write when scanning a specially-crafted PyPI package | ### Impact
Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed.
This is due to a path traversal vulnerability when extracting the `.tar.gz` file of the package being scanned, which exists by design in the `tarfile.TarFile.extractall` function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall
### Remediation
Upgrade to GuardDog v0.1.5 or more recent.
### References
* https://semgrep.dev/r?q=trailofbits.python.tarfile-extractall-traversal.tarfile-extractall-traversal
* https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html
* https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'guarddog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23531'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataDog/guarddog'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/releases/tag/v0.1.5'}] | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:25:25Z', 'nvd_published_at': '2022-12-17T00:15:00Z'} |
1.4.0 | GHSA-ghx2-6v4g-9wmm | 2023-01-10T15:45:19Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4796'] | usememos/memos makes Incorrect Use of Privileged APIs | In usememos/memos 0.9.0 and prior, a user with login permission can delete all notes of the whole application via `API DELETE https://demo.usememos.com/api/memo/$idnote`. The vulnerability will lose all user notes data throughout the system, causing damage to user data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4796'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6'}] | {'cwe_ids': ['CWE-648'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:54Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-f5c5-hmw9-v8hx | 2023-08-30T11:48:44Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36561'] | Unzip vulnerable to path traversal | Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/yi-ge/unzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3-0.20200308084313-2adbaa4891b9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36561'}, {'type': 'WEB', 'url': 'https://github.com/yi-ge/unzip/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73'}, {'type': 'PACKAGE', 'url': 'https://github.com/yi-ge/unzip'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0035'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:07:02Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-6rx9-889q-vv2r | 2022-12-20T19:06:38Z | 2022-12-14T21:36:56Z | null | ['CVE-2022-23524'] | Helm vulnerable to denial of service through string value parsing | Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
### Impact
The _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.
Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.
### Patches
This issue has been resolved in 3.10.3.
### Workarounds
SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.
### For more information
Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
### Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23524'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1167'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:36:56Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-qrrf-xvcf-p64q | 2023-01-10T15:45:39Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4797'] | usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts | In usememos/memos 0.9.0 and prior, an attacker can delete other users' posts via post id, which can be done via brute force. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4797'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b'}] | {'cwe_ids': ['CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:53:10Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-jv85-mqxj-3f9j | 2022-12-12T21:27:09Z | 2022-12-12T21:27:09Z | null | ['CVE-2022-23485'] | Sentry vulnerable to invite code reuse via cookie manipulation | With a known valid invite link (i.e. not already accepted or expired) an unauthenticated attacker can manipulate the cookie to allow the same invite link to be reused on multiple accounts when joining an organization.
### Impact
An attacker with a valid invite link can create multiple users and join the organization from which the invite link was generated.
### Patches
This issue was patched in version 22.11.0.
### Workarounds
Sentry SaaS customers do not need to take action.
Self-hosted Sentry installs can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).
1. Add the following line into `sentry.conf.py`:
```python
SENTRY_FEATURES["organizations:invite-members"] = False
```
2. Restart the Sentry web service.
```
docker compose restart web
```
### For more information
If you have any questions or comments about this advisory:
* [Visit our FAQs on this CVE](https://help.sentry.io/account/security/cve-2022-23485-faqs/)
* Open an issue in [getsentry/sentry](http://github.com/getsentry/sentry)
* Email us at security[@]sentry.io
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.6.0'}, {'fixed': '22.11.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23485'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/commit/565f971da955d57c754a47f5802fe9f9f7c66b39'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}] | {'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:27:09Z', 'nvd_published_at': '2022-12-10T01:15:00Z'} |
1.4.0 | GHSA-m3q4-7qmj-657m | 2022-12-20T19:33:27Z | 2022-12-20T19:33:27Z | null | ['CVE-2022-23542'] | OpenFGA Authorization Bypass | ### Overview
During our internal security assessment, it was discovered that OpenFGA versions v0.3.0 is vulnerable to authorization bypass under certain conditions.
### Am I Affected?
You are affected by this vulnerability if **all** of the following applies:
1. You are using OpenFGA v0.3.0
2. You created a model using modeling language v1.1 that applies a type restriction to an object e.g. `define viewer: [user]`
3. You created tuples based on the aforementioned model, e.g. `document:1#viewer@user:jon`
4. You updated the previous model by adding a new type and replacing the previous restriction with the newly added type e.g. `define viewer: [employee]`
5. You use the tuples created against the first model (step 3) and issue checks against the updated model e.g. `user=user:jon, relation=viewer, object:document:1`
### How to fix that?
Upgrade to version v0.3.1
### Backward Compatibility
This update is backward compatible. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23542'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/pull/422'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v0.3.1'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T19:33:27Z', 'nvd_published_at': '2022-12-20T21:15:00Z'} |
1.4.0 | GHSA-5jqp-wmhj-g33f | 2023-01-10T00:52:28Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4844'] | usememos/memos Cross-Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4844'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:52:57Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-hw46-vg6w-88fj | 2022-12-20T19:06:15Z | 2022-12-15T21:30:28Z | null | ['CVE-2021-33420'] | replicator vulnerable to Deserialization of Untrusted Data | A deserialization issue discovered in inikulin replicator before 1.0.4 allows remote attackers to run arbitrary code via the fromSerializable function in TypedArray object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'replicator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33420'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/commit/2c626242fb4a118855262c64b5731b2ce98e521b'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4787'}, {'type': 'PACKAGE', 'url': 'https://github.com/inikulin/replicator'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:31:51Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-gfj4-wg89-m22r | 2023-01-10T15:42:51Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4807'] | usememos/memos Improper Access Control vulnerability | In usememos/memos 0.9.0 and prior, users can edit and delete all other users' shortcuts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4807'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:27Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-gw62-c7w4-x449 | 2022-12-30T00:58:42Z | 2022-12-21T21:30:15Z | null | ['CVE-2021-4272'] | studygolang vulnerable to cross-site scripting | A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/studygolang/studygolang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4272'}, {'type': 'WEB', 'url': 'https://github.com/studygolang/studygolang/commit/0fb30f9640bd5fa0cae58922eac6c00bb1a94391'}, {'type': 'PACKAGE', 'url': 'https://github.com/studygolang/studygolang'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216477'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:58:42Z', 'nvd_published_at': '2022-12-21T19:15:00Z'} |
1.4.0 | GHSA-jvgw-gccv-q5p8 | 2023-07-14T21:53:44Z | 2022-12-07T20:28:46Z | null | ['CVE-2022-23486'] | libp2p DoS vulnerability from lack of resource management | ### Impact
An attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network.
### Details
In the original version of the attack, the malicious node would continuously open new streams on a single connection using a stream multiplexer that doesn’t provide sufficient back pressure (mplex or yamux). While allocations per stream might be considered small, they multiply with the number of streams and connections. It is easy to defend against this one attack, e.g. by setting a strict per connection stream limit and connection limit. But there are other variations of this attack, e.g. causing memory allocations by sending partial payloads on various protocol levels, forcing the victim to buffer the partial payload for a period of time or by tricking the victim into pre-allocating buffers for messages which are never sent by the attacker.
### Patches
Users are advised to upgrade to `libp2p` `v0.45.1` or above.
### References
Please see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.
Please see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv
### For more information
If you have any questions or comments about this advisory, please email us at security@libp2p.io.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.45.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.45.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23486'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0084.html'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T20:28:46Z', 'nvd_published_at': '2022-12-07T21:15:00Z'} |
1.4.0 | GHSA-f8p3-q834-q9cj | 2023-01-09T19:52:37Z | 2022-12-26T09:30:26Z | null | ['CVE-2021-30134'] | php-mod/curl allows Cross-site Scripting | php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the `post_file_path_upload.php` key parameter and the POST data to `post_multidimensional.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'php-mod/curl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30134'}, {'type': 'WEB', 'url': 'https://github.com/php-mod/curl/commit/0bddefe8bbd292065f23dd6e24d2c745c4865cf7'}, {'type': 'PACKAGE', 'url': 'https://github.com/php-mod/curl'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:52:37Z', 'nvd_published_at': '2022-12-26T07:15:00Z'} |
1.4.0 | GHSA-xr7p-8q82-878q | 2022-12-06T15:36:15Z | 2022-12-06T15:36:15Z | null | ['CVE-2022-23466'] | teler dashboard vulnerable to DOM-based cross-site scripting (XSS) | ### Description
teler prior to version <= 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized.
### Impact
This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This indicates a low severity and there is no significant impact on the users.
### Affected Version
This issue was introduced from version `v2.0.0-rc` to `v2.0.0-rc.3` & `v2.0.0-dev`.
### Patches
This vulnerability has been fixed on version `v2.0.0-rc.4` & `v2.0.0-dev.2`.
### Workarounds
Here are some workarounds to handle this case:
- Deactivate the live event dashboard from the configuration file, or
- Upgrade teler version to `v2.0.0-rc.4` or `v2.0.0-dev.2` & above.
### References
- https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'teler.app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-rc'}, {'fixed': '2.0.0-rc.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc.3'}}, {'package': {'ecosystem': 'Go', 'name': 'teler.app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-dev'}, {'fixed': '2.0.0-dev.2'}]}], 'versions': ['2.0.0-dev']}] | [{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/security/advisories/GHSA-xr7p-8q82-878q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23466'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:36:15Z', 'nvd_published_at': '2022-12-06T18:15:00Z'} |
1.4.0 | GHSA-c2v4-8r9g-g5xj | 2023-01-09T08:20:53Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4695'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4695'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:37Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-85fp-523q-5xwc | 2022-12-29T16:59:42Z | 2022-12-22T03:30:18Z | null | ['CVE-2022-4646'] | rdiffweb vulnerable to Cross-Site Request Forgery | rdiffweb prior to version 2.5.4 is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4646'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/e6f0d8002129be90fe82fa3e3ea0a6942caba398'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:59Z', 'nvd_published_at': '2022-12-22T02:15:00Z'} |
1.4.0 | GHSA-f83p-pg86-p922 | 2023-01-10T15:41:37Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4801'] | usememos/memos has Insufficient Granularity of Access Control | usememos/memos 0.9.0 and prior allows an attacker to archive any user's public or private post. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4801'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593'}] | {'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:52Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-pppv-ch8p-rp2w | 2022-12-27T17:55:21Z | 2022-12-21T06:30:29Z | null | ['CVE-2022-25895'] | lite-dev-server vulnerable to Directory Traversal | All versions of package lite-dev-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the `req.url` user input that is passed to the server code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'lite-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25895'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowwzw/lite-dev-server'}, {'type': 'WEB', 'url': 'https://github.com/shadowwzw/lite-dev-server/blob/master/src/server.js#23L134'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:22:17Z', 'nvd_published_at': '2022-12-21T05:15:00Z'} |
1.4.0 | GHSA-r48c-4vfj-h426 | 2022-12-16T21:58:44Z | 2022-12-14T15:30:16Z | null | ['CVE-2022-4495'] | collective.dms.basecontent Cross-site Scripting vulnerability | A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'collective.dms.basecontent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4495'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.dms.basecontent'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.dms.basecontent/releases/tag/1.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215813'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:58:44Z', 'nvd_published_at': '2022-12-14T15:15:00Z'} |
1.4.0 | GHSA-53c4-hhmh-vw5q | 2023-08-30T18:40:46Z | 2022-12-14T21:38:31Z | null | ['CVE-2022-23525'] | Helm vulnerable to denial of service through through repository index file | Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_repo_` package that can cause a segmentation violation. Applications that use functions from the `_repo_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
### Impact
The `_repo_` package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The `_repo_` package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation.
Applications that use the `_repo_` package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.
### Patches
This issue has been resolved in 3.10.3.
### Workarounds
SDK users can validate index files that are correctly formatted before passing them to the `_repo_` functions.
### For more information
Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
### Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23525'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1165'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:38:31Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-cx45-565q-6qx8 | 2023-01-03T21:28:26Z | 2022-12-19T18:19:11Z | null | ['CVE-2022-42949'] | SilverStripe Subsite weakens file permissions | The subsites module can weaken edit restrictions on some files and allow a malicious user to edit files they do not have edit rights to.
This only affects projects with the subsites module installed. Regression testing should focus on custom file logic.
Be advised that this is not a case of a user being able to edit a file in subsites they do not have access to. As a reminder, all separation of content achieved with the subsites module should be viewed as cosmetic and not appropriate for security-critical applications. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/subsites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42949'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-subsites/commit/73f3d15bfb90ba779dd5498fcc5ae4ab292d6272'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/subsites/CVE-2022-42949.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-subsites'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-42949'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:19:11Z', 'nvd_published_at': '2022-12-21T00:15:00Z'} |
1.4.0 | GHSA-pp3p-6jjh-rmg7 | 2023-01-10T15:42:32Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4806'] | usememos/memos Improper Access Control vulnerability | An Improper Access Control vulnerability in usememos/memos 0.9.0 and prior can result in a user deleting others' public and private memos. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4806'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be'}] | {'cwe_ids': ['CWE-284', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:17Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-9h6h-9g78-86f7 | 2022-12-29T01:50:20Z | 2022-12-29T01:50:20Z | null | [] | Yapscan's report receiver server vulnerable to path traversal and log injection | ### Impact
If you make use of the **report receiver server** (experimental), a client may be able to forge requests such that arbitrary files on the host can be overwritten (subject to permissions of the yapscan server), leading to loss of data. This is particularly problematic if you do not authenticate clients and/or run the server with elevated permissions.
### Patches
Vulnerable versions:
- v0.18.0
- v0.19.0 (unreleased)
This problem is patched in version v0.19.1
### Workarounds
Update to the newer version is highly encouraged!
Measures to reduce the risk of this include authenticating clients (see `--client-ca` flag) and containerization of the yapscan server.
### References
The tracking issue is #35. There you can find the commits, fixing the issue.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fkie-cad/yapscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.19.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/security/advisories/GHSA-9h6h-9g78-86f7'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/a75a20b50be673b96b1d42187b97f8cfe60728df'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/fef9a33ceb66f6b929839f7eaf393b629681bc5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/fkie-cad/yapscan'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/releases/tag/v0.19.1'}] | {'cwe_ids': ['CWE-117', 'CWE-22', 'CWE-73'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:50:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jj8r-jw42-mw4w | 2023-01-09T20:06:17Z | 2022-12-28T00:30:22Z | null | ['CVE-2022-4772'] | Widoco Path Traversal vulnerability | A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function `unZipIt` of the file `src/main/java/widoco/WidocoUtils.java`. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.dgarijo:Widoco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4772'}, {'type': 'WEB', 'url': 'https://github.com/dgarijo/Widoco/pull/551'}, {'type': 'WEB', 'url': 'https://github.com/dgarijo/Widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92'}, {'type': 'PACKAGE', 'url': 'https://github.com/dgarijo/Widoco'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216914'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216914'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:17Z', 'nvd_published_at': '2022-12-27T23:15:00Z'} |
1.4.0 | GHSA-mhxg-2xf7-4xwx | 2022-12-27T01:02:42Z | 2022-12-19T12:30:23Z | null | ['CVE-2022-47500'] | Apache Helix UI vulnerable to Open Redirect | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Software Foundation Apache Helix UI component.This issue affects Apache Helix all releases from 0.8.0 to and including 1.0.4. Solution: removed the the forward component since it was improper designed for UI embedding. User please upgrade to 1.1.0 to fix this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.helix:helix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47500'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/helix'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lr74xtxxbb1t3dfn5qzzwl2xjr3qlbmh'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:22:50Z', 'nvd_published_at': '2022-12-19T11:15:00Z'} |
1.4.0 | GHSA-f44q-634c-jvwv | 2023-07-14T21:52:56Z | 2022-12-07T23:23:59Z | null | ['CVE-2022-23487'] | libp2p DoS vulnerability from lack of resource management | ### Impact
Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.
### Patches (What to do as a js-libp2p consumer:)
Update your js-libp2p dependency to `v0.38.0` or greater.
### Workarounds
There are no workarounds, and so we recommend to upgrade your js-libp2p version.
Some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using iptables or ufw ) or making use of a load balancer in front of libp2p nodes.
You can also use the [allow deny list in js-libp2p](https://docs.libp2p.io/concepts/security/dos-mitigation/#deny-specific-peers-or-create-an-allow-list-of-trusted-peers) to deny specific peers.
However these require direct action & responsibility on your part and are no substitutes for upgrading js-libp2p. Therefore, we highly recommend upgrading your js-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about js-libp2p resource utilization.
### References
* DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.
* Documentation on how to configure limits to prevent excessive resource consumption: https://github.com/libp2p/js-libp2p/blob/master/doc/LIMITS.md
* Documentation on how to configure metrics: https://github.com/libp2p/js-libp2p/blob/master/doc/METRICS.md
Please see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8
#### For more information
If you have any questions or comments about this advisory, please email us at [security@libp2p.io](mailto:security@libp2p.io). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23487'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/js-libp2p'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:23:59Z', 'nvd_published_at': '2022-12-07T21:15:00Z'} |
1.4.0 | GHSA-4crw-w8pw-2hmf | 2022-12-12T20:44:49Z | 2022-12-08T18:30:50Z | null | ['CVE-2022-4122'] | Buildah (as part of Podman) vulnerable to Link Following | A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4122'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/16315'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144983'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:39:14Z', 'nvd_published_at': '2022-12-08T16:15:00Z'} |
1.4.0 | GHSA-xv6x-456v-24xh | 2022-12-30T00:58:09Z | 2022-12-30T00:58:09Z | null | ['CVE-2022-46181'] | gotify/server vulnerable to Cross-site Scripting in the application image file upload | ### Impact
The XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as:
```
https://push.example.org/image/[alphanumeric string].html
```
An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify.
### Patches
The vulnerability has been fixed in version 2.2.2.
### Workarounds
You can block access to non image files via a reverse proxy in the `./image` directory.
### References
https://github.com/gotify/server/pull/534
https://github.com/gotify/server/pull/535
---
Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gotify/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46181'}, {'type': 'WEB', 'url': 'https://github.com/gotify/server/pull/534'}, {'type': 'WEB', 'url': 'https://github.com/gotify/server/pull/535'}, {'type': 'PACKAGE', 'url': 'https://github.com/gotify/server'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:58:09Z', 'nvd_published_at': '2022-12-29T19:15:00Z'} |
1.4.0 | GHSA-65hj-9ppw-77xc | 2022-12-21T18:16:26Z | 2022-12-01T06:30:26Z | null | ['CVE-2022-44262'] | ff4j is vulnerable to Remote Code Execution (RCE) | ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE). This issue has been patched in version 1.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.ff4j:ff4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.1'}, {'fixed': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44262'}, {'type': 'WEB', 'url': 'https://github.com/ff4j/ff4j/issues/624'}, {'type': 'WEB', 'url': 'https://github.com/ff4j/ff4j/commit/62d03140f3bfbd380d0f4b4e5a94dcb8baa9d9c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ff4j/ff4j'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:13:55Z', 'nvd_published_at': '2022-12-01T05:15:00Z'} |
1.4.0 | GHSA-xv8h-43h9-v3jq | 2022-12-19T19:15:29Z | 2022-12-15T21:30:29Z | null | ['CVE-2022-40373'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 allows remote attackers to run arbitrary code via upload of crafted XML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40373'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:53Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-7p7c-pvvx-2vx3 | 2022-12-05T22:03:46Z | 2022-12-05T22:03:46Z | null | [] | hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack | Path resolution in `hyper-staticfile` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem.
This only impacts Windows. Linux and other unix likes are not impacted by this.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0-alpha.1'}, {'fixed': '0.10.0-alpha.2'}]}], 'versions': ['0.10.0-alpha.1']}] | [{'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/1e40e31d64bc6b32e595d24074092dcf84410b2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/stephank/hyper-staticfile'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0069.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:03:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w66j-xc7r-m2jv | 2022-12-06T18:49:45Z | 2022-12-05T15:30:28Z | null | ['CVE-2022-45046'] | camel-ldap component allows LDAP Injection when using the filter option | The camel-ldap component allows LDAP Injection when using the filter option. Users are recommended to either move to the Camel-Spring-Ldap component (which is not affected) or upgrade to 3.14.6 or 3.18.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.18.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45046'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2022-45046.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/05/2'}] | {'cwe_ids': ['CWE-90'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:33:29Z', 'nvd_published_at': '2022-12-05T14:15:00Z'} |
1.4.0 | GHSA-967g-cjx4-h7j6 | 2023-02-09T21:40:05Z | 2022-12-28T00:30:23Z | null | ['CVE-2022-2584'] | go-codec-dagpb vulnerable to panic when decoding invalid blocks | go-codec-dagpb is an implementation of the DAG-PB spec for Go. The dag-pb codec can panic when decoding invalid blocks. This issue has been patched in version 1.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-codec-dagpb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2584'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0422'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-codec-dagpb'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:51:36Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-fxrc-hg6j-6v3x | 2022-12-13T19:24:59Z | 2022-12-13T15:30:26Z | null | ['CVE-2022-45689'] | hutool-json vulnerable to memory exhaustion | hutool-json v5.8.10 was discovered to contain an out of memory error. This issue is similar to CVE-2022-45690. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45689'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2747'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}] | {'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:24:59Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-qr52-59r6-49f4 | 2023-01-02T20:21:58Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4684'] | usememos/memos Improper Access Control vulnerability | Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4684'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b66f2bdd-8b41-456c-bf65-92302c2e03b5'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:48Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-p6fg-723f-hgpw | 2023-01-10T15:58:24Z | 2022-12-28T03:30:28Z | null | ['CVE-2020-36562'] | shiyanhui/dht vulnerable to Uncontrolled Resource Consumption | Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/shiyanhui/dht'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20201219151056-5a20f3199263'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36562'}, {'type': 'WEB', 'url': 'https://github.com/shiyanhui/dht/issues/57'}, {'type': 'PACKAGE', 'url': 'https://github.com/shiyanhui/dht'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0040'}] | {'cwe_ids': ['CWE-400', 'CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:43Z', 'nvd_published_at': '2022-12-28T03:15:00Z'} |
1.4.0 | GHSA-m54v-gv8p-9pqp | 2022-12-19T15:54:56Z | 2022-12-15T21:30:29Z | null | ['CVE-2021-36572'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via the user name field of the login page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36572'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/58'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:32:38Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-79mp-cxp4-9p6r | 2023-01-10T15:57:21Z | 2022-12-28T12:30:50Z | null | ['CVE-2018-25053'] | Json2html vulnerable to cross-site scripting | Json2html is a client side javascript HTML templating library with wrappers for both jQuery and Node.js. A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 can address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. The associated identifier of this vulnerability is VDB-216959. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-json2html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25053'}, {'type': 'WEB', 'url': 'https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801'}, {'type': 'PACKAGE', 'url': 'https://github.com/moappi/json2html'}, {'type': 'WEB', 'url': 'https://github.com/moappi/json2html/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216959'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216959'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T20:35:02Z', 'nvd_published_at': '2022-12-28T12:15:00Z'} |
1.4.0 | GHSA-8cf7-32gw-wr33 | 2022-12-23T00:39:12Z | 2022-12-22T03:32:22Z | null | ['CVE-2022-23539'] | jsonwebtoken unrestricted key type could lead to legacy keys usage | # Overview
Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.
# Am I affected?
You are affected if you are using an algorithm and a key type other than the combinations mentioned below
| Key type | algorithm |
|----------|------------------------------------------|
| ec | ES256, ES384, ES512 |
| rsa | RS256, RS384, RS512, PS256, PS384, PS512 |
| rsa-pss | PS256, PS384, PS512 |
And for Elliptic Curve algorithms:
| `alg` | Curve |
|-------|------------|
| ES256 | prime256v1 |
| ES384 | secp384r1 |
| ES512 | secp521r1 |
# How do I fix it?
Update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, If you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.
# Will the fix impact my users?
There will be no impact, if you update to version 9.0.0 and you already use a valid secure combination of key type and algorithm. Otherwise, use the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and `verify()` functions to continue usage of invalid key type/algorithm combination in 9.0.0 for legacy compatibility.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23539'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}] | {'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:32:22Z', 'nvd_published_at': '2022-12-23T00:15:00Z'} |
1.4.0 | GHSA-68gw-r2x5-7r5r | 2023-06-27T20:24:50Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4686'] | usememos/memos Authorization Bypass Through User-Controlled Key vulnerability | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4686'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637'}] | {'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:38Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-pwhr-p68w-296x | 2023-01-10T15:35:16Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4840'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4840'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:37Z', 'nvd_published_at': '2022-12-29T17:15:00Z'} |
1.4.0 | GHSA-qqv9-gqh5-7h99 | 2023-01-02T20:26:14Z | 2022-12-25T06:30:21Z | null | ['CVE-2022-44381'] | Snipe-IT allows attackers to check whether a user account exists | Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44381'}, {'type': 'WEB', 'url': 'https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:02Z', 'nvd_published_at': '2022-12-25T05:15:00Z'} |
1.4.0 | GHSA-cgp8-4m63-fhh5 | 2022-12-06T16:19:45Z | 2022-12-03T15:30:26Z | null | ['CVE-2021-37533'] | Apache Commons Net vulnerable to information leakage via malicious server | Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client.
The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-net:commons-net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37533'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-net/commit/4fe1bae56e53f32756b1ca3296f3dd2c45e3e060'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-net'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NET-711'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5307'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/03/1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:21:08Z', 'nvd_published_at': '2022-12-03T15:15:00Z'} |
1.4.0 | GHSA-67mh-hw8v-x8v9 | 2022-12-19T14:40:24Z | 2022-12-15T21:30:29Z | null | ['CVE-2021-36573'] | FeehiCMS Unrestricted Upload vulnerability | File Upload vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via crafted image upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36573'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/59'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:33:11Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-5wvv-q5fv-2388 | 2022-12-30T16:57:28Z | 2022-12-30T16:57:28Z | null | [] | hyper-staticfile's location header incorporates user input, allowing open redirect | When `hyper-staticfile` performs a redirect for a directory request (e.g. a request for `/dir` that redirects to `/dir/`), the `Location` header value was derived from user input (the request path), simply appending a slash. The intent was to perform an origin-relative redirect, but specific inputs allowed performing a scheme-relative redirect instead.
An attacker could craft a special URL that would appear to be for the correct domain, but immediately redirects to a malicious domain. Such a URL can benefit phishing attacks, for example an innocent looking link in an email.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0-alpha.1'}, {'fixed': '0.10.0-alpha.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/4db4afb811c553bc3d54a01a9985b9e6dfc5a115'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/f12cadc6666c6f555d29725f5bc45da2103f24ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/stephank/hyper-staticfile'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0072.html'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ppjq-qxhx-m25f | 2022-12-15T21:59:51Z | 2022-12-13T17:16:36Z | null | ['CVE-2022-23505'] | Authentication Bypass for passport-wsfed-saml2 | # Overview
A remote attacker can bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.
# Am I affected?
You are affected if you are using WSFed protocol with the passport-wsfed-saml2 library versions < 4.6.3.
SAML2 protocol is not affected.
# How do I fix it?
Upgrade the library to version 4.6.3.
# Will the fix impact my users?
No, the fix will not impact your users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-ppjq-qxhx-m25f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23505'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/pull/179'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-wsfed-saml2'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:16:36Z', 'nvd_published_at': '2022-12-13T08:15:00Z'} |
1.4.0 | GHSA-x3x3-qwjq-8gj4 | 2022-12-15T22:00:04Z | 2022-12-13T18:30:26Z | null | ['CVE-2022-46364'] | Apache CXF Server-Side Request Forgery vulnerability | A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46364'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1&modificationDate=1670944472739&api=v2'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:45:21Z', 'nvd_published_at': '2022-12-13T17:15:00Z'} |
1.4.0 | GHSA-3rrx-364r-6wf6 | 2022-12-12T22:10:36Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46687'] | Cross-site Scripting in Jenkins Spring Config Plugin | Jenkins Spring Config Plugin 2.0.0 and earlier does not escape build display names shown on the Spring Config view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to change build display names. Spring Config Plugin 2.0.1 escapes build display names shown on the Spring Config view. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:spring-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46687'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/spring-config-plugin/commit/89fea88b24f92233ed31050b8e695eb9b502b8c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/spring-config-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2814'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:10:36Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-52h2-m2cf-9jh6 | 2022-12-12T22:35:41Z | 2022-12-12T22:35:41Z | null | ['CVE-2022-23523'] | linux-loader reading beyond EOF could lead to infinite loop | ### Impact
The linux-loader crate used the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets pointed beyond the end of the file this could lead to an infinite loop. Virtual Machine Monitors using the `linux-loader` crate could enter an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner.
### Patches
The issue has been addressed in 0.8.1
### Workarounds
The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers to not point beyond the end of the file.
### References
See: https://github.com/rust-vmm/linux-loader/pull/125
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'linux-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/security/advisories/GHSA-52h2-m2cf-9jh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23523'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/pull/125'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/commit/a44f152da4f38c538ed492b1efa8515be2047db2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-vmm/linux-loader'}] | {'cwe_ids': ['CWE-119', 'CWE-125', 'CWE-835'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:35:41Z', 'nvd_published_at': '2022-12-13T08:15:00Z'} |
1.4.0 | GHSA-486f-hjj9-9vhh | 2022-12-13T17:36:28Z | 2022-12-13T17:36:28Z | null | ['CVE-2022-23514'] | Inefficient Regular Expression Complexity in Loofah | ## Summary
Loofah `< 2.19.1` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.
## Mitigation
Upgrade to Loofah `>= 2.19.1`.
## Severity
The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
## References
- [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html)
- https://hackerone.com/reports/1684163
## Credit
This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23514'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1684163'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23514.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:36:28Z', 'nvd_published_at': '2022-12-14T14:15:00Z'} |
1.4.0 | GHSA-7gpw-frph-fwrg | 2023-02-08T21:57:03Z | 2022-12-14T21:30:16Z | null | ['CVE-2022-47407'] | TYPO3-EXT-SA-2022-018: Multiple vulnerabilities in extension "Master-Quiz" (fp_masterquiz) | An issue was discovered in the fp_masterquiz (aka Master-Quiz) extension before 2.2.1, and 3.x before 3.5.1, for TYPO3. An attacker can continue the quiz of a different user. In doing so, the attacker can view that user's answers and modify those answers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-masterquiz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-masterquiz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47407'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/fixpunkt/fp-masterquiz/CVE-2022-47407.yaml'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-018'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:57:03Z', 'nvd_published_at': '2022-12-14T21:15:00Z'} |
1.4.0 | GHSA-r3p3-5f35-h6mf | 2023-01-09T20:06:47Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4808'] | usememos/memos Improper Privilege Management vulnerability | Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4808'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:47Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-9p95-fxvg-qgq2 | 2022-12-07T14:15:26Z | 2022-12-06T06:30:17Z | null | ['CVE-2022-25912'] | simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol | The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the `ext` transport protocol, which makes it exploitable via `clone()` method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25912'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:15:26Z', 'nvd_published_at': '2022-12-06T05:15:00Z'} |
1.4.0 | GHSA-6jvc-q2x7-pchv | 2023-01-06T03:20:04Z | 2022-12-28T00:30:23Z | null | ['CVE-2022-2582'] | AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field | The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2582'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-go'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0391'}] | {'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:53:40Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-xqqc-c5gw-c5r5 | 2022-12-14T21:35:24Z | 2022-12-14T21:35:24Z | null | ['CVE-2022-23507'] | Tendermint light client verification not taking into account chain ID | ### Impact
Anyone using the `tendermint-light-client` and related packages to perform light client verification (e.g. IBC-rs, Hermes).
At present, the light client does not check that the chain IDs of the trusted and untrusted headers match, resulting in a possible attack vector where someone who finds a header from an untrusted chain that satisfies all other verification conditions (e.g. enough overlapping validator signatures) could fool a light client.
The attack vector is currently theoretical, and no proof-of-concept exists yet to exploit it on live networks.
### Patches
Users of the light client-related crates can currently upgrade to `v0.28.0`.
### Workarounds
None
### References
- [Light Client specification](https://github.com/tendermint/tendermint/tree/main/spec/light-client) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client-verifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}, {'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}, {'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23507'}, {'type': 'WEB', 'url': 'https://github.com/informalsystems/tendermint-rs/commit/5c32f31b97ac3172775699fe0d4ba6003ca4fb18'}, {'type': 'PACKAGE', 'url': 'https://github.com/informalsystems/tendermint-rs'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:35:24Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-j593-h5v3-45x6 | 2023-01-10T15:38:25Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4734'] | usememos/memos may leak user information to an authenticated user | usememos/memos 0.9.0 and prior has endpoint that leaks user information like names, email, role, and OpenID to an authenticated user. A patch is available at commit 05b41804e33a34102f1f75bb2d69195dda6a1210 on the `main` branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4734'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/05b41804e33a34102f1f75bb2d69195dda6a1210'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4b4421dc-73af-4dec-884c-836f9732cb5b'}] | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:56:48Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-qv6c-367r-3w6q | 2022-12-02T22:26:22Z | 2022-12-02T22:26:22Z | null | ['CVE-2022-46147'] | XBlock vulnerable to Cross-Site Scripting (XSS) | ### Impact
XSS Vulnerability in multiple XBlock Fields. Any platform that has deployed the XBlock will be impacted.
### Patches
https://github.com/openedx/xblock-drag-and-drop-v2/commit/53c4482f9bb6d8c7ccdf5253bd82c84a222b2492
The fix is compatible with all Open edX releases newer than Lilac.
### Workarounds
None.
### References
https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'xblock-drag-and-drop-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/security/advisories/GHSA-qv6c-367r-3w6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46147'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/commit/53c4482f9bb6d8c7ccdf5253bd82c84a222b2492'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/commit/68887d1b4a44325d2de7573d450e41129ba98b1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/releases/tag/v3.0.0'}] | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:26:22Z', 'nvd_published_at': '2022-11-28T21:15:00Z'} |
1.4.0 | GHSA-9p62-x3c5-hr5p | 2022-12-30T18:03:47Z | 2022-12-30T18:03:47Z | null | ['CVE-2022-46178'] | Path Traversal In MeterSpere leads to upload file to any path | ### Summary
MeterSphere allow users to upload file, but not check the file name, may lead to upload file to any path if the file name in upload request is falsified.
### Details
Metersphere's [`FileUtils.java`](https://github.com/metersphere/metersphere/blob/v2.5.0/framework/sdk-parent/sdk/src/main/java/io/metersphere/commons/utils/FileUtils.java#L57) didn't check the filePath.
```java
public static void createFile(String filePath, byte[] fileBytes) {
File file = new File(filePath);
if (file.exists()) {
file.delete();
}
try {
File dir = file.getParentFile();
if (!dir.exists()) {
dir.mkdirs();
}
file.createNewFile();
} catch (Exception e) {
LogUtil.error(e);
}
try (InputStream in = new ByteArrayInputStream(fileBytes); OutputStream out = new FileOutputStream(file)) {
final int MAX = 4096;
byte[] buf = new byte[MAX];
for (int bytesRead = in.read(buf, 0, MAX); bytesRead != -1; bytesRead = in.read(buf, 0, MAX)) {
out.write(buf, 0, bytesRead);
}
} catch (IOException e) {
LogUtil.error(e);
MSException.throwException(Translator.get("upload_fail"));
}
}
```
### Patches
The vulnerability has been fixed in [v2.5.1](https://github.com/metersphere/metersphere/releases/tag/v2.5.1).
https://github.com/metersphere/metersphere/commit/3a890eeeb8a6b0887927c876a73bdb3a99a82138 : add validation for file name.
### Workarounds
It is recommended to upgrade the version to [v2.5.1](https://github.com/metersphere/metersphere/releases/tag/v2.5.1).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/metersphere/metersphere/issues). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.metersphere:metersphere'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/security/advisories/GHSA-9p62-x3c5-hr5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46178'}, {'type': 'PACKAGE', 'url': 'https://github.com/metersphere/metersphere'}, {'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/blob/v2.5.0/framework/sdk-parent/sdk/src/main/java/io/metersphere/commons/utils/FileUtils.java#L5'}, {'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/releases/tag/v2.5.1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:47Z', 'nvd_published_at': '2022-12-29T19:15:00Z'} |
1.4.0 | GHSA-hc5q-26h8-r9wf | 2023-01-10T15:43:56Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4811'] | usememos/memos Improper Authorization vulnerability | In usememos/memos 0.9.0 and prior, an unauthorized user can access any private memo by URL hacking a memo on the editing screen. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4811'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c'}] | {'cwe_ids': ['CWE-285', 'CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:45Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-fr54-72wr-cqvq | 2023-01-09T21:59:21Z | 2022-12-31T21:30:20Z | null | ['CVE-2017-20160'] | express-param vulnerable to Improper Handling of Extra Parameters | A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file `lib/fetchParams.js`. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-param'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20160'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/commit/db94f7391ad0a16dcfcba8b9be1af385b25c42db'}, {'type': 'PACKAGE', 'url': 'https://github.com/flitto/express-param'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217149'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217149'}] | {'cwe_ids': ['CWE-235'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:59:21Z', 'nvd_published_at': '2022-12-31T20:15:00Z'} |
1.4.0 | GHSA-wmxm-6wxc-3xqf | 2023-01-02T16:32:06Z | 2022-12-22T12:30:16Z | null | ['CVE-2022-45347'] | Apache ShardingSphere-Proxy Incomplete Cleanup vulnerability | Apache ShardingSphere-Proxy prior to 5.3.0 when using MySQL as database backend didn't cleanup the database session completely after client authentication failed, which allowed an attacker to execute normal commands by constructing a special MySQL client. This vulnerability has been fixed in Apache ShardingSphere 5.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shardingsphere:shardingsphere-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45347'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjfanning/shardingsphere'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l5rz7j4rg10o7ywtgknh2f5hxnv6yw3l'}] | {'cwe_ids': ['CWE-459'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:02:29Z', 'nvd_published_at': '2022-12-22T11:15:00Z'} |
1.4.0 | GHSA-g5ww-5jh7-63cx | 2022-12-12T22:33:53Z | 2022-12-12T15:30:33Z | null | ['CVE-2022-3509'] | Protobuf Java vulnerable to Uncontrolled Resource Consumption | A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3509'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf/tree/main/java'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:33:53Z', 'nvd_published_at': '2022-12-12T13:15:00Z'} |
1.4.0 | GHSA-w9wc-4xcq-8gr6 | 2022-12-09T20:08:32Z | 2022-12-09T20:08:32Z | null | ['CVE-2022-46157'] | Akeneo PIM Community Edition vulnerable to remote php code execution | ### Impact
Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image.
### Patches
Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability.
Community Edition users must change their Apache HTTP server configuration accordingly to be protected.
The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022.
### Workarounds
Replace any reference to `<FilesMatch \.php$>` in your apache httpd configurations with: `<Location "/index.php">`, as shown in https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39.
<!--
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
--> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'akeneo/pim-community-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.53'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'akeneo/pim-community-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.119'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/security/advisories/GHSA-w9wc-4xcq-8gr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46157'}, {'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/commit/891a2f70a9a200f199de06fe64d376d03787a81a'}, {'type': 'PACKAGE', 'url': 'https://github.com/akeneo/pim-community-dev'}, {'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39'}] | {'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:08:32Z', 'nvd_published_at': '2022-12-09T21:15:00Z'} |
1.4.0 | GHSA-vh43-cc6x-prpr | 2023-01-10T15:48:04Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4848'] | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel | Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4848'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc'}] | {'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:51:51Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.